Skip to main content
Windows has many network services too and you might already be knowing that it can become a router or a VPN Server too. Let us see how to use the Windows server 2012 as a router by installing the Remote Access role to it.
PS − Server should have 2 network cards – One inside the LAN and the other facing the internet.
To add the Remote Access role, we should follow the steps given below.
Step 1 − Go to, Server Manager → Manage → Add Roles and Features → Next → Check Role-based or feature-based installation → Check Select a server from the server pool → Next.
Once all of it is done, then at the list of the roles find Remote Access and check it → A pop-up window will open.
Remote Access
Step 2 − Click “Add Features” → Next.
Remote Access Features
Step 3 − Click Next.
Remote Access Combines
Step 4 − Check on the DirectAccess and VPN(RAS) and Routing check boxes.
RAS
Step 5 − Click Install and wait for it to be installed completely.
Installed Completely
After the installation is done, let us now see the setup of the router. For this, we need to follow the steps given below.
Step 1 − Go to, Server Manager → Tools → Routing and Remote Access.
Routing
Step 2 − Right click → and then again click on Configure and Enable Routing and Remote Access as shown in the following screenshot.
Enable Routing
Step 3 − Select the Network address translation (NAT) option → Next.
NAT
Step 4 − Now choose your Ethernet card that will be facing your internet site as shown in the following image and then → Next.
Ethernet Card
Step 5 − Choose I will set up name and address services later as we have already set up the DHCP and DNS and then → Next.
DHCP DNS
Step 6 − Click the Finish button.
Finished
Now let us see how to make the VPN Setup to allow the employees to connect from home. To do this, we must follow the steps given below.
Step 1 − Go to, Server Manager → Tools → Routing and Remote Access → Right click → and then again click on Configure and Enable Routing and Remote Access → Custom Configuration and then → Next.
Configure and Enable Routing
Step 2 − VPN Access and then → Next.
VPN Access
Step 3 − Click the Finish button.

Comments

Popular posts from this blog

C is a general-purpose, procedural, imperative computer programming language developed in 1972 by Dennis M. Ritchie at the Bell Telephone Laboratories to develop the UNIX operating system. C is the most widely used computer language. It keeps fluctuating at number one scale of popularity along with Java programming language, which is also equally popular and most widely used among modern software programmers. Audience This tutorial is designed for software programmers with a need to understand the C programming language starting from scratch. This tutorial will give you enough understanding on C programming language from where you can take yourself to higher level of expertise. Prerequisites Before proceeding with this tutorial, you should have a basic understanding of Computer Programming terminologies. A basic understanding of any of the programming languages will help you in understanding the C programming concepts and move fast on the learning track. Execute
C is a general-purpose, high-level language that was originally developed by Dennis M. Ritchie to develop the UNIX operating system at Bell Labs. C was originally first implemented on the DEC PDP-11 computer in 1972. In 1978, Brian Kernighan and Dennis Ritchie produced the first publicly available description of C, now known as the K&R standard. The UNIX operating system, the C compiler, and essentially all UNIX application programs have been written in C. C has now become a widely used professional language for various reasons − Easy to learn Structured language It produces efficient programs It can handle low-level activities It can be compiled on a variety of computer platforms Facts about C C was invented to write an operating system called UNIX. C is a successor of B language which was introduced around the early 1970s. The language was formalized in 1988 by the American National Standard Institute (ANSI). The UNIX OS was totally written in C. Today C
Properly defining the fields in a table is important to the overall optimization of your database. You should use only the type and size of field you really need to use; don't define a field as 10 characters wide if you know you're only going to use 2 characters. These types of fields (or columns) are also referred to as data types, after the  type of data  you will be storing in those fields. MySQL uses many different data types broken into three categories: numeric, date and time, and string types. Numeric Data Types: MySQL uses all the standard ANSI SQL numeric data types, so if you're coming to MySQL from a different database system, these definitions will look familiar to you. The following list shows the common numeric data types and their descriptions: INT  - A normal-sized integer that can be signed or unsigned. If signed, the allowable range is from -2147483648 to 2147483647. If unsigned, the allowable range is from 0 to 4294967295. You can specify a widt