Unable to Configure PPTP for a Two-Way Trust Between PDCs with Single NIC

ID: Q246478


The information in this article applies to:
  • Microsoft Windows NT Server version 4.0


SYMPTOMS

When you try to configure Point to Point Tunneling Protocol (PPTP) between two servers running Microsoft Windows NT Server 4.0, each functioning as a primary domain controller (PDC) and each having only a single network adapter installed, you are not successful, although a two-way trust relationship is already established between the servers.

In addition, you may receive one or more error messages when you attempt to resolve this issue by any of the following means:

  • Adding the Microsoft IPX/SPX (Internetwork Packet Exchange/Sequenced Packet Exchange) protocol.


  • Changing the addresses configured for the Remote Access Service (RAS) assigned static address pool.


  • Trying to use Transmission Control Protocol/Internet Protocol (TCP/IP) and the net use command to a share on the opposite computer.


  • Configuring a single virtual private network (VPN) to dial only one-way, associating the server network basic input/output system (NetBIOS) name with the IP address that the PPTP server assigns to the client VPN connection, and then trying to use the net use command from the PPTP client to a share on the PPTP server.


  • Adding the Windows Internet Name Service (WINS) to each of the servers, to assist in NetBIOS name resolution.


CAUSE

This behavior can occur when the servers each have only one network adapter installed with no additional dial-up connection to a wide area network (WAN), and therefore do not have either of the two configurations Microsoft recommends for a PPTP tunneling server.


RESOLUTION

To resolve this issue, use one of the two configurations Microsoft recommends:

  1. A server with only a single network adapter, which is connected to the local area network (LAN), but with a dial-up connection to a WAN.


  2. OR
  3. A server with two network adapters, one configured for PPTP to dial out to a WAN node and the other connected to the LAN.


To work around the limitation of both servers' having only one network adapter and no additional RAS dial-up device, give each network adapter a second, arbitrary IP address. Because of the complexity of this workaround, the instructions for it are organized as five procedures to be performed on both servers:
  1. Setting up the required configuration


  2. Providing two or more VPN interfaces correctly configured for RAS


  3. Verifying basic TCP/IP connectivity


  4. Adding a second IP address to the network adapter


  5. Setting up the two-way trust relationship


IMPORTANT: Attempting to use only one network adapter on a PPTP server without an additional dial-up device presents special configuration problems that you may or may not be able to overcome. Please fully explore using the options Microsoft recommends before attempting this procedure, and be aware that Microsoft cannot guarantee the results of following this procedure.

  1. Setting up the required configuration

    Install the necessary networking software on each server, and then make sure both servers have the necessary configurations:


    1. Make sure that Windows NT Server 4.0 and the latest service pack are installed.


    2. Configure the server as the PDC of its domain.


    3. Install NetBIOS Enhanced User Interface (NetBEUI) and TCP/IP, and then configure the servers to use these protocols. You do not need to use NetBEUI on your local LAN, but you do need to configure RAS to use it over your private tunnel connection.


    4. Install PPTP.


    5. Download and apply the latest PPTP hotfix. You can obtain it at:


    6. ftp://ftp.microsoft.com/bussys/winnt/winnt-public/fixes/usa/NT40/hotfixes-postSP3/pptp3-fix/
      NOTE: If you are running Windows NT Service Pack 4 or later, you do not need to install the PPTP hotfix because it is included in those versions.
  2. Providing two or more VPN interfaces correctly configured for RAS

    Make sure that each server has at least two correctly configured VPN interfaces. VPNs for use with PPTP are configured in the RAS setup when you install PPTP; the following procedure explains how to add a VPN to RAS after you install PPTP:


    1. Specify the number of VPNs you want to make available to PPTP:


      1. In Control Panel, double-click Network, and then click the Protocols tab.


      2. Click Point To Point Tunneling Protocol, and then click Properties.


      3. In the Number Of Virtual Private Networks box, type or click the number of VPNs you want to use, and then click OK.


      4. When you are prompted to install the RAS Setup program, click OK.


    2. For each VPN you want to configure in RAS Setup:

      1. Click Add.


      2. In the RAS Capable Devices box, click the VPN, and then click OK.


      3. In the Remote Access Setup dialog box, click the VPN, and then click Configure.


      4. Click to select the Dial out and Receive calls check box, and then click OK.


      5. In the Remote Access Setup dialog box, click the appropriate VPN, and then click Network.


      6. Under Dial Out Protocols, click NetBEUI and TCP/IP.


      7. Configure the NetBEUI protocol:


        1. Click Configure, next to NetBEUI.


        2. Click Entire Network, and then click OK.


      8. Configure TCP/IP:


        1. Click Configure, next to TCP/IP.


        2. Click Entire Network.


        3. Configure a static address pool, using a unique range of arbitrary IP addresses that are not in use on your network:


          1. Click Use Static Address Pool.


          2. In the appropriate boxes, type the beginning and ending IP addresses of the static pool, and then click OK.


      9. Click to select the Require Microsoft Encrypted Authentication check box, and then click OK.


      IMPORTANT: Remember to repeat the procedure in step 2 for each VPN that you need to configure.


    3. Click Continue, click Close, and then click Yes to restarting the server.


  3. Verifying basic TCP/IP connectivity

    Verify that there is basic TCP/IP connectivity between the two servers before you attempt to configure a connection that uses PPTP:


    1. Make sure that the router is able to pass GRE 47 packets and also that TCP/IP port 1723 is open on the router.


    2. Test the connectivity between the two servers by using the ping command.


  4. Adding a second IP address to the network adapter

    Add a second, arbitrary IP address to the network adapter on each server, freeing the original IP address to be the dialing number for the VPN connection. You can either:

    • add the address to your existing network adapter
    • OR
    • add the Microsoft Loopback Adapter (a virtual adapter), and then add the address to that.


    The following two sets of steps give instructions for these alternative methods. However, these methods are not supported PPTP configurations, and Microsoft cannot guarantee the results from following either procedure.

    Method 1

    On each server, replace the IP address your network adapter uses with a second, arbitrary IP address, and use the original valid IP address to create a VPN connection:

    1. Add a unique, arbitrary IP address to your network adapter, one that is not in use on your network:


      1. In Control Panel, double-click Network, and then click the Protocols tab.


      2. Click TCP/IP Protocol, and then click Properties.


      3. Click the IP Address tab, and then click Advanced.


      4. In the IP Addresses group, click Add, and then type the arbitrary IP address in the IP Address box.


      5. In the Subnet Mask box, type the default subnet mask for the IP address class.


      6. Click Add.


    2. Under IP Addresses, click the original IP address, and then click Remove.


    3. Restart the computer to bind TCP/IP to the arbitrary network adapter IP address.


    4. Add the original valid IP address to the network adapter as a secondary IP address.
      NOTE: Once NetBIOS is no longer bound to the original IP address that is valid on the local LAN, clients on the local LAN cannot make NetBIOS connections to that interface.


    Method 2

    On each server, add the Microsoft Loopback Adapter, and then configure it with an arbitrary IP address:


    1. Install the Microsoft Loopback Adapter:


      1. In Control Panel, double-click Network.


      2. On the Adapters tab, click Add.


      3. Click MS Loopback Adapter, and then click OK.


      4. Type the path to the setup files, click Continue, and then click Close.


    2. Configure the Loopback Adapter:


      1. In the Adapter list, click MS Loopback Adapter.


      2. In the IP Address box, type an arbitrary IP address that is not in use on your network.


      3. In the Subnet Mask box, type the default subnet mask for the IP address class, and then click OK. You do not have to type the default gateway address.


    3. When you are prompted to restart the computer, click Yes.


  5. Setting up the two-way trust relationship

    Add an entry to the Lmhosts file on each server, and then configure the two-way trust:




    1. Create an Lmhosts file entry to associate the new, arbitrary network adapter IP address with the opposite server's NetBIOS name, using the #PRE and #DOM:<opposite domain name> options, along with an entry for the <opposite domain name> 0x1c entry.

      For example:

      The server you connect to has the NetBIOS name Batman and is the PDC of the domain Gotham. Batman is using an arbitrary IP address of 185.124.60.10. Add the following lines in the Lmhosts file on your server:
      
      185.124.60.10     Batman   #PRE   #DOM:Gotham
      185.124.60.10     ''Gotham         \0x1c''    #PRE 
      • Replace 185.124.60.10 with the IP address of the opposite PDC.
      • Replace Batman with the NetBIOS name of the opposite PDC.
      • Replace Gotham with the name of the opposite Windows NT domain.


      IMPORTANT: Correct spacing of these entries is imperative. There must be a total of 20 characters between the quotation marks. These 20 characters are the domain name plus the appropriate number of spaces to pad up to 15 characters plus the backslash (\) plus the NetBIOS hex representation of the service type (0x1c). To help you know where the sixteenth character is, copy this pattern line to your Lmhosts file:
      
      # IP Address    ''123456789012345*7890'' 
      Line up the quotation marks in the comment line with those in this pattern line by adding or removing spaces from the comment line, and place the backslash on the sixteenth column (the one marked with the asterisk in the pattern line). You must use spaces between the name and the backslash; do not use the TAB key.


    2. To preload the Lmhosts file, type the following at the command prompt and press ENTER:
      nbtstat -R
      The -R must be uppercase. After carrying out the command, you should receive the following message:


    3. Successful purge and preload of the NBT Remote Cache Name Table.
    4. To verify the NetBIOS name cache, type the following at the command prompt, and then press ENTER:
      nbtstat -c
      The -c must be lowercase.


    5. On each server, use the opposite server's original valid IP address as the dialing number to create a VPN connection. That is, Server A now dials in to Server B, and Server B now dials in to Server A.


    6. Follow the standard procedures for setting up a two-way trust in User Manager for Domains. After a delay for completing the trust each way (it may take as long as five minutes), you should receive the following message:


    7. Trust relationship with <opposite domain name> successfully established.


MORE INFORMATION

For additional information about using the Lmhosts file, please see the following articles in the Microsoft Knowledge Base:

Q180094 How to Write an LMHOSTS File for Domain Validation
Q163409 NetBIOS Suffixes (16th Character of the NetBIOS Name)

Additional query words: nt 4.0 point tunneling protocol primary domain

Keywords : nt 4.0
Version : winnt:4.0
Platform : winnt
Issue type : kbprb


Last Reviewed: January 26, 2000
© 2000 Microsoft Corporation. All rights reserved. Terms of Use.