Module Advanced Networking
Module Advanced Networking
The names of actual companies and products mentioned herein may be the
trademarks of their respective owners.
To obtain authorization for uses other than those specified above, please visit
the Microsoft Copyright Permissions web page at
http://www.microsoft.com/permission/copyrgt/img-req.htm.
This content is proprietary and confidential, and is intended only for users
described in the content provided in this document. This content and
information is provided to you under a Non-Disclosure Agreement and cannot
be distributed. Copying, disclosing all or any portion of the content and/or
information included in this document is strictly prohibited.
Table of Contents
Introduction .................................................................................. 5
Internet Connection Sharing (ICS) ................................................ 7
What Is Internet Connection Sharing?....................................................7
Network Address Translation ..................................................................7
DHCP Allocator .....................................................................................8
DNS Proxy and Resolver ........................................................................8
Discovery and Control ......................................................................... 10
Hardware Requirements .......................................................................11
Verifying Configuration .........................................................................12
Host IP Addressing.............................................................................. 13
Client IP Addressing ............................................................................ 13
Troubleshooting....................................................................................14
Troubleshooting ICS Client Configuration ............................................... 15
Troubleshooting Connectivity from the ICS Client to the Internet .............. 15
Troubleshooting Connectivity from the ICS Client to the Internet .............. 16
Things to Remember ........................................................................... 17
Bridge .......................................................................................... 19
Troubleshooting....................................................................................22
Remote Desktop .......................................................................... 23
Remote Desktop Features .....................................................................23
Remote Desktop Components ...............................................................23
Remote Desktop Protocol 5.1 ............................................................... 23
Remote Desktop Connection................................................................. 24
Remote Desktop Web Connection.......................................................... 24
Remote Desktop vs. NetMeeting ........................................................... 25
Configuration and Use...........................................................................26
Enable Remote Desktop ....................................................................... 26
Configuring a Client Connection ............................................................ 28
Remote Desktop Web Connection.......................................................... 34
Remote Desktop and Remote Assistance Compared..............................35
Intended Purpose and Audience ............................................................ 35
Troubleshooting....................................................................................36
Connectivity Issues with RDC ............................................................... 36
Visual Issues in RDC Sessions............................................................... 38
Feature Issues in RDC Sessions ............................................................ 39
Performance Issues with RDC ............................................................... 39
VPN.............................................................................................. 41
Incoming VPN Connections ...................................................................43
Troubleshooting....................................................................................46
Windows Messenger .................................................................... 49
Login Issues ....................................................................................... 49
Audio/Video Conferencing Considerations............................................... 49
Table of Figures
Figure 1: Autodial configuration in Dial-up Connection Properties .............................................. 9
Figure 2: ICS Host configuration...........................................................................................10
Figure 3: ICS Client configuration .........................................................................................11
Figure 4: ICS configuration..................................................................................................12
Figure 5: Network Bridge.....................................................................................................19
Figure 6: Bridged Network Connection Properties ...................................................................20
Figure 7: Bridge Properties ..................................................................................................20
Figure 8: Remote Desktop Connection ..................................................................................25
Figure 9: Remote Tab in System Properties ...........................................................................26
Figure 10: Remote Sessions Warning ....................................................................................27
Figure 11: Add Remote Desktop Users.................................................................................. 27
Figure 12: Establish a Client Session .................................................................................... 28
Figure 13: Remote Connection General Tab........................................................................... 29
Figure 14: Remote Connection Display Tab ........................................................................... 30
Figure 15: Remote Connection Local Resources Tab ............................................................... 31
Figure 16: Remote Connection Programs Tab ........................................................................ 32
Figure 17: Remote Connection Experience Tab ...................................................................... 33
Figure 18: RDC Behind a PC NAT ......................................................................................... 37
Figure 19: RDC behind a Hardware NAT................................................................................ 38
Figure 20: Create VPN ........................................................................................................ 41
Figure 21: VPN Configuration .............................................................................................. 42
Figure 22: Configure Incoming Connection............................................................................ 44
Figure 23: Configure Direct connection ................................................................................. 45
Advanced Networking
Introduction
Module Objectives:
● Discuss Internet Connection Sharing.
5
Advanced Networking
First, Network Address Translation, which does the passing and translating of
network data from the private network to the public Internet. Then there is the
DHCP allocator, which is a means of handing out IP addresses to the clients on
the network. Next, there is the DNS Proxy and Resolver, which is used to
resolve name queries for the internal network. Windows has autodial
functionality, if the external connection is not always on. And finally, Windows
XP ICS allows automatic discovery and control by the network clients.
Internet Connection Sharing is the same in both the Home and Professional
versions of Windows XP.
One of the new technologies that Windows XP introduces into this is called NAT
traversal. NAT traversal allows Internet applications that use specific
technologies such as DirectPlay, Instant Messaging, Real-Time Communications
or streaming media, to run on client computers of the private network, without
requiring any manual configuration by the user. Some Internet applications
that use this technology are the Remote Assistance utility built in to Windows
XP, and games that use DirectPlay version 8 or version 4.
7
It should be noted that while they have largely the same functionality, NAT is
not an application or Winsock proxy server, like Microsoft’s Proxy Server
product. NAT works at a much lower level, requiring no configuration of the
application, or installation of client software to enable its functionality. Because
of this, it is transparent to the client – it just works.
DHCP Allocator
The DHCP allocator in Windows XP ICS provides IP configuration information to
the clients on the internal network – it functions like a mini-DHCP server. This
functionality has not changed from versions of ICS in previous releases of
Windows.
When the network client, which is configured for DHCP starts, it sends a DHCP
Discover request to the ICS host. The ICS host sends IP configuration
information to the client, such as an IP address in the private IP address range
from 192.168.0.2 through 254, and a default gateway and DNS server address
of 192.168.0.1 (which is the IP address of the ICS host itself on the internal
side).
This functionality is not the same as a full-blown DHCP server. For example, it
is not configurable: it cannot be disabled, aside from disabling ICS itself, and
the IP address range that it uses is always the same and cannot be changed or
expanded.
The DNS Proxy on the ICS host automatically relays a name resolution request
for an external resource from a client out to its own DNS server on the
Internet. When that reply comes back, the DNS Proxy does two things: it sends
the response back to the client that requested it, and it also caches that
response in its own DNS cache. In this way, if that name resolution request
comes through again, the DNS Proxy can simply directly respond to the
request, instead of having to forward it on and wait for the reply.
While DNS Proxy functionality has always been in ICS, the DNS Resolver
functionality was first introduced into ICS in Windows Me–this is now in
Windows XP. The DNS Resolver is a sort of mini-DNS server for the internal
network. Previously, without this feature, for an internal client to resolve the
name of another internal client, the first client had to rely on some form of
NetBIOS name resolution, while still using DNS for external name resolution.
Now, the client can go to the same DNS server to resolve either external OR
internal names.
8
Advanced Networking
Autodial
Autodial takes these factors into account, and will generally keep a shared
Internet connection alive, even if the user on the ICS hosts either logs off or
switches to a different user.
The only time autodial will fail is if credentials have never been stored on the
dial-up connection, and no one is logged on to the ICS host at the time autodial
tries to make the connection (or if the user logged on to the ICS host does not
have the correct credentials for the dial-up connection).
9
Discovery and Control
Discovery and control of the ICS host by the clients is a new feature of
Windows XP ICS. It is enabled on the ICS host in the same area where ICS is
enabled (and autodial as well, if the shared connection is dial-up). When
enabled, the ICS host advertises its presence and availability to be controlled
using a proprietary protocol named the ICS Simple Beacon Protocol.
10
Advanced Networking
The disable button does just that – it disables (or disconnects) the shared
Internet connection, and this will affect every user on the network.
The Properties button gives a few details of the connection, but also leads to a
Settings button that allows the client user to enable, disable or configure
shared services, such as a published FTP server, just as if the user were at the
ICS host.
Hardware Requirements
There are no specific hardware requirements for Internet Connection Sharing,
other than that there be an Internet Connection to share. In other words, at
least two connections must be present. Any outbound connection listed in the
network connections folder will have ICS listed on the Advanced tab, with the
option to enable or disable it shown as a check box, along with the options to
enable the autodial and Discovery and Control options.
Note: ICS set up on only one adapter at a time on the host machine at a time.
11
Verifying Configuration
3. In Control Panel, click “Network and Internet Connections” found under “Pick
a category.”
4. Under “or pick a Control Panel icon,” click the Network Connections icon.
5. Right-click the connection that you use to connect to the Internet. For
example, if you connect to the Internet using a modem, right-click the
connection that you want under Dial-up.
8. Under Internet Connection Sharing, verify that “Allow other network users to
connect through this computer’s Internet connection” check box is selected.
12
Advanced Networking
While in Network Connections verify that the home adapter has been setup
correctly.
Host IP Addressing
Addressing for the shared adapter on the ICS host is provided by the ISP, and
can be either static or dynamic. Internal addressing on the home adapter is
static and ICS clients obtain IP addresses provided by ICS on the host
machine.
Client IP Addressing
Clients obtain their IP addresses from the ICS host DHCP Allocator component.
Ensure that when connected, the ICS client obtains an address in the
192.168.0.x range, with a subnet mask of 255.255.255.0. Clients should also
receive a DNS server configuration from the host. When connected they should
be configured to use the ICS host address (192.168.0.1) as their DNS Server
address.
13
Troubleshooting
Although ICS is straightforward and simple in its presentation to the customer,
there are areas where there may be problems.
The first of these may occur if the ICS host is incorrectly configured, which can
cause routing problems. One of the most common issues is where the user
adds a default gateway setting to the internal network adapter. Since the
adapter is set by ICS to a specific IP address of 192.168.0.1, this enables the
default gateway configuration to be set, and many users seeing this believe
that it must be configured, and may do so. This would be incorrect, though. In
general, each computer on a network, no matter how many network
connections, should have only one default gateway. In the case of an ICS host,
that default gateway should be set on the shared connection, and on no other
connection. Often, the shared connection is configured via DHCP, so no specific
configuring is needed.
To find out if this is the problem, the “route print” command can be used to
view the route table. Also, the IPCONFIG /ALL command will show if more than
one connection has a default gateway setting.
The next issue can occur with applications run on client computers that connect
to the Internet. If these applications expect to be directly connected to the
Internet, especially if they assume that they have a valid IP address, their
functionality might be impaired. Some applications, such as the Remote
Assistance application built into Windows XP, and games that use DirectPlay,
have been taken into account for this issue, and use NAT traversal to assist in
overcoming it.
Finally, if a problem does come up, tracing can be enabled on the ICS host to
determine where the problem is occurring. This can be configured by either
using the Netsh command or changing the registry to enable tracing on the
IPNATHLP component. Netsh command is: “Netsh ras set tracing ipnathlp
enabled”. The registry is located at:
HKLM\Software\Microsoft\Tracing\IPNATHLP. If done by changing the registry,
the computer must be rebooted for the tracing to begin. Enabling via the netsh
command does not require a reboot.
With Tracing enabled, a trace log file named IPNATHLP.LOG is created in the
Windows\Tracing folder, which traces all packets that go through the ICS host
– very useful for troubleshooting.
● Disable ICS and then test for connectivity to the Internet from the ICS
host computer.
14
Advanced Networking
● If the connection is lost once enabling ICS but home network connectivity
is working, verify that the correct adapter has been shared.
● Verify that the client machines can browse the Private network.
○ If it fails:
○ If this fails:
15
■ Test on ICS host to eliminate DNS issue.
Once connectivity from the ICS host to the Internet has been established, the
next step is to check the configuration on the ICS client computers. The
configuration settings on the client that must be checked are:
● Verify that the client machines can browse the Private network.
You can also assign a unique static IP address to the client machines in the
range of 192.168.0.2 to 192.168.0.254. For example, you can assign the
following static IP address, subnet mask, and default gateway:
● IP Address 192.168.0.2
This configuration is only recommended for specific networking needs and for
testing connectivity issues. (Refer to KB article Q306126)
● If it fails:
16
Advanced Networking
● If this fails:
Things to Remember
With connectivity issues involving Internet Connection Sharing, it is important
to narrow down the issue to the specific area that the problem resides. With
ICS, not only may the problem be an application problem (like Internet
Explorer), it could also be a network connectivity problem.
The Network Setup Wizard can only be run on computers running Windows 98,
Windows 98SE, Windows Me, Windows XP Home Edition and Windows XP
Professional. ICS only supports 5 client machines per Internet connection.
Not all applications may be able to communicate through the ICS host without
special configuration support from the manufacturer. If Web browsing from the
ICS client to the Internet is functioning, then ICS is working correctly.
17
Advanced Networking
Bridge
Network Bridge in Microsoft® Windows® XP provides an easy way to connect
several network segments to make them appear as a single network. All
bridged adapters on the bridging computer appear as a single network
interface to applications and protocols.
Creating a Bridge
Bridges are created by using two methods in Windows XP:
● Manual Creation.
● Configures TCP/IP and Service bindings in the properties for the bridge.
When you have created a bridge, the bridged connections are grouped in the
Network Connections folder as shown below.
19
Modification of the participating adapters is not recommended; therefore only
limited properties are available, as shown below.
20
Advanced Networking
In addition to the network configuration, the bridge properties also enable you
to add or remove specific network connections from the bridge configuration,
as shown in the Adapters portion of the interface above.
If you need to modify individual network interface properties, press the Shift
key, right-click, and select the properties for the interface.
Note:
If you want to see how a bridge appears in the Windows XP Network
Connections folder, create one yourself. If you only have one network adapter
on the computer, install the “Microsoft Loopback Adapter” using the Add
Hardware wizard. This is a software-implemented network adapter that only
connects to the local machine. Even though it doesn’t connect you to another
network, it does give you the ability to bridge this new network connection with
your existing NIC connection.
The Windows XP Bridge driver binds to multiple network adapter drivers, and
shows a single bridge connection in the Network Connections folder. This
causes all bridged network segments to appear as a single virtual network
adapter. This is advantageous because the bridge’s behavior effectively
combines the bridged network segments into a single logical segment and
presents only a single virtual interface to transport drivers. The single virtual
interface causes the network binding structure to reflect a logical arrangement
of the network.
For example, the TCP/IP driver expects to be able to associate each adapter
with an IP subnet. When a single subnet number is shared by more than one
adapter, TCP/IP behaves undesirably. It sends all outbound IP packets to the
first shared-subnet adapter it was bound to in the absence of host-route entries
in the IP routing table. The bridge’s status as an intermediate driver solves this
problem.
21
Troubleshooting
What should you do if you cannot create a bridge?
● Verify need for the bridge and eliminate any potential topology issues.
What should you do if the bridge is not functioning properly after it is created?
● Verify that the interface configurations have not changed after the bridge
was created.
● If one or more adapter does not support promiscuous mode, test the
bridge in Compatibility Mode.
22
Advanced Networking
Remote Desktop
Remote Desktop provides the ability to gain access to and operate a remote
computer. While this capability is based on Terminal Services, it provides
functionality well beyond that of the Terminal Services provided by Windows
2000.
Unlike the 2000 Terminal Services, Remote Desktop can handle high screen
resolutions and color depths. It will display in as many colors as the client
computer will support, up to 24-bit. While this capability is configurable by the
client, and can be overridden by the remote host; it is handled automatically in
most cases.
Many of the new features of Remote Desktop are provided by Remote Desktop
Protocol 5.1. We’ll detail those items later in the lesson.
● Since your local file systems appear in the session’s Explorer views, files
can easily be transferred from one machine to the other.
23
● If you launch a program in the remote session that has audio output, the
sound comes out of the client’s speakers.
● If you are running an application that uses a serial port, like a bar-code
reader, it will utilize the port on the client machine.
● If you print from a remote application, the default printer will be the
client’s default printer, so it will print where you are.
● If you copy data to the clipboard from the remote session, it can be
pasted into the local session, or vice-versa.
The Remote Desktop Connection tool is installed by default when you install
Windows XP Professional or Home Edition. You can also install this tool
manually on a computer running Windows 95, Windows 98, Windows NT, or
Windows 2000 Professional. There is a utility on the Windows XP Pro CD that
installs the Remote Desktop Connection on these non-XP clients.
Remote Desktop Web Connection can establish a Remote Desktop session with
a remote computer, even if Remote Desktop Connection is not installed on the
client computer. Remote Desktop Web Connection must be installed on a Web
server with Internet Information Services and Active Server Pages enabled.
24
Advanced Networking
Remote Desktop is a console session, making the remote session the sole
active point of control. NetMeeting uses joint control, leaving the host
computer accessible from the console. NetMeeting allows anyone near the
machine to observe all activity
25
Configuration and Use
Remote Desktop is configured on the target computer – the computer with the
desktop you want to use remotely. Then, the client software is used to make a
connection to that computer.
● In the Remote Desktop section, put a check in the box to allow users to
connect remotely.
26
Advanced Networking
27
Configuring a Client Connection
Now that we have enabled Remote Desktop and granted access rights to users,
we need to configure a client to make a connection to it.
The initial dialog that it opens is all that is needed to launch a Remote Desktop
Connection. Entering the remote machine name, the authorized username, and
pressing Connect is all that is necessary.
Launch the Remote Desktop Connection tool by selecting: Start > All Programs
> Accessories > Communications > Remote Desktop Connection. In the dialog,
enter the Remote Computer Name and an authorized username.
28
Advanced Networking
29
Connection Configuration – Display
The Display tab can be used to specify the color depth and screen resolution of
the Remote Desktop. Although Remote Desktop can auto-detect and configure
these settings, customization for special circumstances or applications may be
appropriate. The default is full screen and 24-bit color, or the color depth of the
client, which ever is lower.
At the bottom there is a check box to enable or disable the connection bar. This
bar provides window controls for the full screen session. The controls can be
used to minimize, maximize, restore, or close the Remote Desktop window.
The connection bar provides controls similar to a window title bar. This is
necessary since there are no such controls on the desktop.
30
Advanced Networking
● Sounds can be played on the remote speakers, the client speakers, or not
at all.
● The ability to have a remote session print to a client’s printer has obvious
benefits, but the option to have it print in the remote location can be
configured here.
31
Connection Configuration – Programs
The Programs tab is especially useful when configuring a connection in order to
repeatedly perform a specific function. This could be running a report or
checking mail. This option relieves the user of navigating the remote UI to
launch the application each time. This tab allows you to configure a specific
program to be launched at the start of the session.
32
Advanced Networking
● Desktop Background
● Themes
● Bitmap caching
33
Remote Desktop Web Connection
In addition to the Remote Desktop Connection software included with Windows
XP, there is a web-based option. This option is called the Remote Desktop Web
Connection.
Like the regular client, this software creates a connection to the Remote
Desktop host using TCP port 3389. The only difference is that you do not need
to have the full client installed on the client computer. You simply connect to a
web page that loads the Remote Desktop Web Connection ActiveX control, and
can then logon to the Remote Desktop computer.
Benefits
Following are a few benefits of the Remote Desktop Web Connection.
● Users who are away from their computers can use Remote Desktop Web
Connection to gain secure access to their primary workstation or favorite
Terminal Server from any computer running Windows and Internet
Explorer.
● The delivery of extranet applications is also now possible with the Remote
Desktop Web Connection. Corporations that want to deploy Terminal
Server to serve up a set of applications using the Remote Desktop Web
connections to their vendors, suppliers, can now do so easily,
inexpensively, and efficiently over the Internet.
Installation
The Remote Desktop Web Connection can be downloaded from the following
location to install on a web server:
http://www.microsoft.com/windowsxp/downloads/tools/rdwebconn.mspx
34
Advanced Networking
In many ways, Remote Desktop and Remote Assistance are very much alike.
They are both capable of providing a remote control session for a computer for
a user who is not at the physical location of the machine.. They are both built
on the Terminal Services architecture. They both require permission to
establish a session, and either session type can be terminated from either
machine. Despite all those similarities, they are quite different.
Remote Desktop
● Remote Desktop is designed for frequent accesses by an individual or
small group of users.
Remote Assistance
● Remote Assistance is intended for one-time or infrequent access for
troubleshooting and resolving a problem, or demonstrating a technique.
35
Troubleshooting
Issues with Remote Desktop fall into three basic categories.
Local administrators have access rights by default. All others must be granted
remote access privileges. This can also be done via the remote tab of system
properties. Remember that all external connections to Windows XP machines
are blocked if the user does not have a password.
36
Advanced Networking
NAT Variants
There are several types of NATs that may be encountered and each requires a
different process to troubleshoot failures. Each accepts Internet-bound
communication from its clients then uses its own IP address to communicate on
the public, or Internet side. The NAT tracks the communications, and sends the
return responses to the appropriate client. This allows multiple machines to use
a single external connection, and provides a measure of anonymity to the
clients. The most frequently encountered NAT types are:
37
With this workaround, all Remote Desktop Connections from outside the NAT to
machines behind the NAT will be limited to Machine A, so Machine B in the
diagram could never receive a Remote Desktop connection.
The only option with a hardware NAT is the same as workaround 2 in the
previous case. Use the NAT configuration tools to forward communication on
port 3389 to Machine A, then make the Remote Desktop connection to the
external IP address of the NAT router. The session communication will be
automatically forwarded to Machine A.
Trying to transmit a 32-bit desktop wallpaper at a lower color depth can result
in poor appearance. Disabling the transmission of the desktop background is
the easiest resolution.
38
Advanced Networking
The Experience tab has a connection speed setting that automatically changes
the visuals transmitted during the session. Make sure the connection speed is
set to the actual speed, or lower. Using the Custom setting and manually
disabling features may be appropriate.
● On the Display tab, consider reducing screen resolution and color depth.
● On the Local Resources tab, turn off audio redirection if it is not needed
for the task being performed.
39
40
Advanced Networking
VPN
Virtual Private Networking (VPN) offers affordable, secure access for home and
small offices operating over any networking technology over which IP packets
can be sent.
VPN Connection
A VPN is a simulated private network that has links across shared or public
networks, such as the Internet or a corporate network. Although VPN
connections go through these public networks, their data is encapsulated and
secured while crossing these shared paths.
41
VPN Configuration
To configure a VPN client connection, right click the icon and choose Properties.
42
Advanced Networking
The first screen of the wizard is an introductory one; click Next to create an
incoming connection icon; choose Set up an advanced Connection, and click
Next. The wizard gives two choices, to Accept incoming connections or to
Connect directly to another computer. Choose the first option and click Next.
The next screen allows you choose which devices will allow incoming
connections. You can do it with Direct connections via a parallel port or by a
serial port or you can choose a modem if you have one. If you have an infrared
port, that will be listed here as well. You can also choose to configure the
properties of these devices at this point. Clicking Next, you are prompted
whether you want to allow virtual private connections to this computer. Choose
to allow it and click Next.
The next screen lists the users that are configured on this computer. You can
check the boxes of the users that you want to allow to connect to this box. At
this point, you can also configure the properties of some of these users
changing their passwords. You can configure the call back options, which allows
the user to call in to this computer. They will then be disconnected and this
computer can then call them back at a specific call back number or at a
number that a caller specifies. This will help to save toll charges for the user.
Clicking Next goes to the Networking Software screen. Here, you can enable or
disable the items that you want to be used for this connection. For example,
the Internet Protocol (TCP/IP), File and Printer Sharing, Client for Microsoft
Networks. From here, you can also configure the properties of these items. For
example, with Internet Protocol (TCP/IP), you can specify to either assign IP
addresses to the people calling in using a DHCP server on the network or you
can specify a set of IP addresses that will be assigned to these users. You can
also check to allow the calling computer to specify its own IP address. Once
these items are selected, click Next. You get a summary screen and then you
can click Finish.
43
You now have an incoming connections icon. The Properties dialog has three
tabs: General, Users and Networking.
The Users screen for incoming connections allows you to select which users will
be allowed to connect to this machine. Again, you can change the properties of
this user or you can create a new user at this point from this screen, giving a
user name, full name and a password for that user. You also have two other
options down here. The first of which will require all users to secure their
passwords and data and the other which will always allow directly connected
devices, such as Palm Talk computers, to connect without providing a
password.
Finally, on the Networking tab you can select which network components to
enable or disable by checking the box. You can configure the properties of
those items or install new items, clients, services or other protocols.
44
Advanced Networking
45
Troubleshooting
Troubleshooting for VPN connections involves the following components:
● Network Connectivity
The steps below assume a Point to Point Tunneling Protocol (PPTP) VPN, which
is the type of VPN server provided by Windows XP Professional. If the customer
is using an alternate type of VPN (Layer 2 Tunneling Protocol – L2TP), or using
third party VPN client software, only the first two troubleshooting processes
apply. This is because there are different requirements for PPTP and L2TP.
As a test, create a new network connection for the VPN and test. Note any
error messages and use the Knowledge Base for further troubleshooting.
Network Connectivity
Once you have determined that the connection is set up properly on the client,
test basic connectivity between the client and server using ping. Resolve any
connectivity issues before continuing with further troubleshooting.
Note that these two tools do not establish a VPN connection – they just verify
that the two computers can pass the right types of traffic for a PPTP VPN
connection to succeed. PPTP uses TCP port 1723 and that GRE 47 packets.
Also note that if the connection uses L2TP or third party VPN software, you will
need to collaborate with the support organization for the VPN server software
to troubleshoot further. The following steps do not apply.
46
Advanced Networking
3. Next, open a CMD window on the server computer and run the pptpsrv
command.
4. Then open a CMD window on the client and run the command: pptpclnt
<servername>, replacing “<servername>” with the computer name or
IP address of the server computer.
b. If the connection fails, but you don’t see any indication of why it
fails on the server, troubleshoot basic connectivity.
This last type of failure indicates that a firewall or router between the
computers is likely not passing the type of traffic required to establish the
connection. If the two computers are on home networks, consider the
following:
● Check the configuration and documentation for any routers in use at the
edge of the home networks. You may need to recommend that the
customer check the configuration of the routers, and configure them to
pass VPN traffic. Configuration for TCP 1723 passthrough is
straightforward, but it is less common to have an option for GRE 47. In
most cases home routers enable this when you choose to allow VPN
traffic.
● Try connecting each computer directly to the Internet rather than through
a router as a test. Before doing this, verify the computers are configured
with a software firewall.
47
● If third party firewall software is in use, consider disabling that protection
and testing with the Windows XP firewall, either Internet Connection
Firewall or Windows Firewall, depending on the service pack level of the
computer.
If the server is another type, consult with the support organization for that
operating system or device for further assistance.
48
Advanced Networking
Windows Messenger
Windows Messenger is an Instant Messaging client that includes real time
communications tools for Instant Messaging to other Internet users, voice and
video communication, and online collaboration. It is installed by default on
Windows XP Home edition and Windows XP Professional edition. Windows
Messenger is comparable to version 4.0 of MSN Messenger.
Because MSN Messenger has been updated several times with new features
and functionality, it is the recommended Instant Messaging client for home
users.
For this reason, this document focuses only on a few key elements of Windows
Messenger that could impact support.
Login Issues
Failures with logon to the Passport service are a top support issue. For
information on resolving these issues, see the following Knowledge Base
article:
Common Solutions for Windows Messenger Account Logon Problems (307294)
Audio requirements:
Both parties should have a full duplex sound card and one of the following:
● Audio headset with microphone that plugs into the sound card
Video requirements:
● For video conferencing, one or both parties need a supported video
capture device such as a USB webcam.
49
Before launching the wizard, you should make sure all programs that utilize
A/V devices are closed. Also, make sure any cameras, speakers, and
microphones are properly plugged-in and powered on. The wizard helps the
user configure the following:
Note:
Any time you change the configuration of the A/V system, the Audio and Video
Wizard should be re-run. For example, if you specify that you are using a
headset, AEC will be disabled to conserve system resources. If you switch, to a
speaker/microphone setup, re-run the wizard to enable AEC and recalibrate the
volume.
50