Quick Start Tutorial
This tutorial is designed to help you with the initial server configurations,
which is critical for the functioning of the entire VPN system. By following
the steps in this tutorial, you will get a basic understanding of how
K-Secure VPN™ works - both on the server side and on the client side.
Examples in this tutorial can also be used as the basis to easily customize
K-Secure VPN™ so it serves your needs better.
There are three sections in this tutorial. If you are using the
(including the Evaluation Copy) of K-Secure VPN™ Server and
do not want to deal with rules yet, then Section I is all that
you need. Otherwise, please read through both section I and section II since not all features
are available in the Standard Edition.
Section III introduces Proxy Agent, an advanced feature in K-Secure VPN™
that allows any client to share resources that are only accessible to itself. This
section requires a level of understanding of the internal working of K-Secure VPN™ Server.
It is included in this tutorial for advanced users only.
In a real life scenario, you will go through this tutorial with 3 computers - 1 server computer and
2 client computers. If you plan to go with this setup, make sure
a) the two client computers cannot connect to each other at any port
(this is easy to do if these two client computers are on different networks) and
b) the only port allowed to the server computer is the listening port of
K-Secure VPN™ Server (we will
define the port in Step 1 of this tutorial).
For testing purposes, we use 2 computers in this tutorial:
- Computer #1 (Computer Name: JOHN-PC IP: 192.168.0.200)
This computer will be referred to both as the Server Computer
and Client Computer #1;
On this computer we install both the server and the client.
K-Secure VPN™ Server will be listening on port 1989;
K-Secure VPN™ Client will be installed for user #1 (John);
- Computer #2 (Computer Name: AMY-PC IP: 192.168.2.199)
This computer will be referred to as Client Computer #2 in this tutorial;
On this machine we'll install K-Secure VPN™ Client for user #2 (Amy);
For best results, please make sure:
There is no way for Computer #1 to connect to Computer #2 at any port; and
The only port for Computer #2 to connect to Computer #1 is
port 1989 (the listening port of K-Secure VPN™ Server in this tutorial);
Section I: A Basic VPN
In this section we create two users inside a group. We'll transfer configurations for each of the two users to
a different client computer and finally, make sure these client computers
can interconnect with each other inside our VPN.
- Define the External IP and Port
- Create a Group
- Create Users
- Start the Server
- Export Configurations
- Import Configurations on the Client Side
- Test VPN with Windows Networking
- Test VPN with Remote Desktop Connection
Section II: Creating Rules
In this section we create a rule on the server side to capture all web connections originated
from client machines. With this rule in effect, all web activities on a client computer will go
through our server.
- Create a Rule
- Test the Rule
Section III: Extending Your VPN with a Proxy Agent
In this section we create a special rule, called a Proxy Rule
on the server side so
a particular VPN client becomes a Proxy Agent
and make connections, on behalf of other
VPN clients, to resources that are only accessible to itself.
- Introducing Proxy Agents
- Assigning a Virtual IP to the Proxy Agent
- Creating the Proxy Rule
- Testing the Proxy Rule