From: David Carl on
I have been using sbs2003 with 2-nic / ISA configuration. I am now upgrading
to new server and sbs2008. I realize I need to get a router. We have 14
workstations on the LAN and 6 more people work from home full time currently
using XP VPN. Just about everyone uses OWA and/or RWW from time to time when
not in the office. My question is this. I am looking at Cisco RV042,
because I want 2 WAN ports to add a second DSL and balance remote users, but
there are VPN tunnel limits. Am I going to just open ports my router
firewall and SBS takes care of the rest or do I need to be concerned about
the routers max tunnel limit. I asked these questions of the Cisco TS and
they started pointing me to a series 1941 that sells for $1500, and I think
that's a bit pricey for what I am trying to do. I know this is really not an
SBS question, but would appreciate any guidance. Thank you.
From: Cliff Galiher - MVP on
In your current configuration, ISA is also providing full security, so when
you move to SBS 2008, you need to consider that as well. The RV042 is a
simple router and provides no security features whatsoever. You'd want to
deploy an additional firewall appliance between the router and your network,
which adds quite a bit of complexity. Or alternatively, you can purchase a
good firewall appliance that also does routing (most SMB firewalls do) that
also has the features you need, like dual WAN ports.

As far as keeping your current features, OWA and RWW are HTTPS traffic which
no router should be interfering with. VPN support gets a bit more sticky as
you haven't indicated the type of VPN you use. PPTP VPNs can have an
endpoint behind a NAT router as long as the router knows how to handle GRE
packets. In this case, any restrictions on VPN tunnels that the router has
*usually* (but not always) applies to how many tunnels it is the end-point
for. Since SBS is the end-point in this configuration, the VPN limits would
not apply.

L2TP/IPSec tunnels cannot operate behind a NAT, however, so you'd be moving
your end-point from SBS to the router and, as above, that is usually the
deciding factor on how VPN restrictions are applied. In this scenario, you'd
want to make sure your device has the capacity for the number of concurrent
VPN tunnels you usually have open.

-Cliff


"David Carl" <DavidCarl(a)discussions.microsoft.com> wrote in message
news:765A8B7F-4754-4B91-A685-BE12C19C1D47(a)microsoft.com...
> I have been using sbs2003 with 2-nic / ISA configuration. I am now
> upgrading
> to new server and sbs2008. I realize I need to get a router. We have 14
> workstations on the LAN and 6 more people work from home full time
> currently
> using XP VPN. Just about everyone uses OWA and/or RWW from time to time
> when
> not in the office. My question is this. I am looking at Cisco RV042,
> because I want 2 WAN ports to add a second DSL and balance remote users,
> but
> there are VPN tunnel limits. Am I going to just open ports my router
> firewall and SBS takes care of the rest or do I need to be concerned about
> the routers max tunnel limit. I asked these questions of the Cisco TS and
> they started pointing me to a series 1941 that sells for $1500, and I
> think
> that's a bit pricey for what I am trying to do. I know this is really not
> an
> SBS question, but would appreciate any guidance. Thank you.

From: Joe on
Cliff Galiher - MVP wrote:

> VPN you use. PPTP VPNs can
> have an endpoint behind a NAT router as long as the router knows how to
> handle GRE packets. In this case, any restrictions on VPN tunnels that
> the router has *usually* (but not always) applies to how many tunnels it
> is the end-point for. Since SBS is the end-point in this configuration,
> the VPN limits would not apply.
>

I'd go a bit further and say that there must be a router limit on PPTP
passthrough, because in addition to forwarding the two protocols
involved, it must associate them. The router must know that it has to
accept unsolicited protocol 47 packets from an external IP address which
currently maintains a TCP/1723 session. It needs to maintain a lookup
table containing these entries, and there will be a limit to the number
of table entries. There are a number of protocols which need such lookup
tables, FTP being another.

That does not mean there is necessarily a low limit on VPN tunnels, as
with some loss of speed, these entries can be shared in the NAT table,
which will have quite a large maximum size. But if the router
specification explicitly states a limit on PPTP passthrough connections,
you should believe it, as the implementation will have optimised the
table structures for speed, and there will be a fixed number of entries
in each of a number of different small tables.

--
Joe
From: David Carl on
In reading the documentatation of the RV042, it seems to have a firewall that
blocks everything and allows for 50 access rules, which would be more than
enough as we currently are only using 16 on our ISA. What "security
features" does this simple router not have that I should be concerned about?
What Cisco product (or other vendor) would you recommend for a small SBS2008
environment that i describedin my first post. Thanks.


"Cliff Galiher - MVP" wrote:

> In your current configuration, ISA is also providing full security, so when
> you move to SBS 2008, you need to consider that as well. The RV042 is a
> simple router and provides no security features whatsoever. You'd want to
> deploy an additional firewall appliance between the router and your network,
> which adds quite a bit of complexity. Or alternatively, you can purchase a
> good firewall appliance that also does routing (most SMB firewalls do) that
> also has the features you need, like dual WAN ports.
>
> As far as keeping your current features, OWA and RWW are HTTPS traffic which
> no router should be interfering with. VPN support gets a bit more sticky as
> you haven't indicated the type of VPN you use. PPTP VPNs can have an
> endpoint behind a NAT router as long as the router knows how to handle GRE
> packets. In this case, any restrictions on VPN tunnels that the router has
> *usually* (but not always) applies to how many tunnels it is the end-point
> for. Since SBS is the end-point in this configuration, the VPN limits would
> not apply.
>
> L2TP/IPSec tunnels cannot operate behind a NAT, however, so you'd be moving
> your end-point from SBS to the router and, as above, that is usually the
> deciding factor on how VPN restrictions are applied. In this scenario, you'd
> want to make sure your device has the capacity for the number of concurrent
> VPN tunnels you usually have open.
>
> -Cliff
>
>
> "David Carl" <DavidCarl(a)discussions.microsoft.com> wrote in message
> news:765A8B7F-4754-4B91-A685-BE12C19C1D47(a)microsoft.com...
> > I have been using sbs2003 with 2-nic / ISA configuration. I am now
> > upgrading
> > to new server and sbs2008. I realize I need to get a router. We have 14
> > workstations on the LAN and 6 more people work from home full time
> > currently
> > using XP VPN. Just about everyone uses OWA and/or RWW from time to time
> > when
> > not in the office. My question is this. I am looking at Cisco RV042,
> > because I want 2 WAN ports to add a second DSL and balance remote users,
> > but
> > there are VPN tunnel limits. Am I going to just open ports my router
> > firewall and SBS takes care of the rest or do I need to be concerned about
> > the routers max tunnel limit. I asked these questions of the Cisco TS and
> > they started pointing me to a series 1941 that sells for $1500, and I
> > think
> > that's a bit pricey for what I am trying to do. I know this is really not
> > an
> > SBS question, but would appreciate any guidance. Thank you.
>
From: Cliff Galiher - MVP on
Access rules are easy, as they just bolt on top of the routing engine.
After all, the routing engine already has to look at IP and port (if NAT is
involved) so adding a simple layer to block IPs or ports is trivial.

But a good business firewall does several other things. They can monitor
the state of a connection to prevent certain attacks (sometimes called
stateful packet inspection.) Many are application aware, so they can
inspect certain types of traffic for abuses, such as buffer-overflow
attempts in HTTP headers or SMTP violations, or even the ability to inspect
attachments in SMTP or binary downloads (HTTP, FTP, etc) for intentionally
malicious acts (there are several attack vectors in these protocols.)

And the very best can even authenticate connections via AD, perform HTTPS
inspection (via SSL Bridging) and a few other fancy tricks. ISA, in fact,
falls in this last category. You may look at the rules and thing "20 rules,
easy" but it is *what* those rules do that suddenly things become very
impressive.

For me, I'm still a big ISA/TMG fan. I prefer to buy an ISA "appliance"
(what is an appliance but a headless server with a preconfigured OS), but
Sonicwall and Watchguard also make good devices.

Also, don't forget, that ISA provided quite a bit of network reporting that,
although not security related, you may have gotten accustomed to. ISA could
do this because SBS sat at the network edge. With 2008, the change in
to;pology means that SBS isn't there to monitor all traffic, so many people
are surprised to find they can't generate detailed network usage reports
anymore in SBS. If you used that functionality, you'll want to make sure
your edge device can step in provide those types of reports so you can make
the transition.

-Cliff

"David Carl" <DavidCarl(a)discussions.microsoft.com> wrote in message
news:79DA7C9B-4DBC-405A-BBA0-2D37780E9CE5(a)microsoft.com...
> In reading the documentatation of the RV042, it seems to have a firewall
> that
> blocks everything and allows for 50 access rules, which would be more than
> enough as we currently are only using 16 on our ISA. What "security
> features" does this simple router not have that I should be concerned
> about?
> What Cisco product (or other vendor) would you recommend for a small
> SBS2008
> environment that i describedin my first post. Thanks.
>
>
> "Cliff Galiher - MVP" wrote:
>
>> In your current configuration, ISA is also providing full security, so
>> when
>> you move to SBS 2008, you need to consider that as well. The RV042 is a
>> simple router and provides no security features whatsoever. You'd want
>> to
>> deploy an additional firewall appliance between the router and your
>> network,
>> which adds quite a bit of complexity. Or alternatively, you can purchase
>> a
>> good firewall appliance that also does routing (most SMB firewalls do)
>> that
>> also has the features you need, like dual WAN ports.
>>
>> As far as keeping your current features, OWA and RWW are HTTPS traffic
>> which
>> no router should be interfering with. VPN support gets a bit more sticky
>> as
>> you haven't indicated the type of VPN you use. PPTP VPNs can have an
>> endpoint behind a NAT router as long as the router knows how to handle
>> GRE
>> packets. In this case, any restrictions on VPN tunnels that the router
>> has
>> *usually* (but not always) applies to how many tunnels it is the
>> end-point
>> for. Since SBS is the end-point in this configuration, the VPN limits
>> would
>> not apply.
>>
>> L2TP/IPSec tunnels cannot operate behind a NAT, however, so you'd be
>> moving
>> your end-point from SBS to the router and, as above, that is usually the
>> deciding factor on how VPN restrictions are applied. In this scenario,
>> you'd
>> want to make sure your device has the capacity for the number of
>> concurrent
>> VPN tunnels you usually have open.
>>
>> -Cliff
>>
>>
>> "David Carl" <DavidCarl(a)discussions.microsoft.com> wrote in message
>> news:765A8B7F-4754-4B91-A685-BE12C19C1D47(a)microsoft.com...
>> > I have been using sbs2003 with 2-nic / ISA configuration. I am now
>> > upgrading
>> > to new server and sbs2008. I realize I need to get a router. We have
>> > 14
>> > workstations on the LAN and 6 more people work from home full time
>> > currently
>> > using XP VPN. Just about everyone uses OWA and/or RWW from time to
>> > time
>> > when
>> > not in the office. My question is this. I am looking at Cisco RV042,
>> > because I want 2 WAN ports to add a second DSL and balance remote
>> > users,
>> > but
>> > there are VPN tunnel limits. Am I going to just open ports my router
>> > firewall and SBS takes care of the rest or do I need to be concerned
>> > about
>> > the routers max tunnel limit. I asked these questions of the Cisco TS
>> > and
>> > they started pointing me to a series 1941 that sells for $1500, and I
>> > think
>> > that's a bit pricey for what I am trying to do. I know this is really
>> > not
>> > an
>> > SBS question, but would appreciate any guidance. Thank you.
>>