This one is interesting step by step document to configure Remote Access VPN on Windows server. In earlier chapter I installed Remote Access role using Server manager, On the same server manager in the Tools menu, select Routing and Remote access. It will open MMC console for RRAS.

Once RRAS console is open right click on the server hostname and click Configure and Enable Routing and Remote Access.

It start the wizard, On the configuration page select Secure connection between two private networks, It can be used to connection this network to a remote network, such as a branch office as well.

Next screen shows to create Demand-Dial connections to access Remote networks, keep the default yes and press next. Once this wizard is finished it will open another wizard to configure Demand-Dial connection.

After clicking next, select the IP Address Assignment, and it will be Automatically taken from DHCP. Generally this option is for point to point client setup, but and I will keep it default. Click finish to end RRAS wizard.

After finishing Routing and Remote Access server setup wizard finished new Demand-Dial interface wizard opens, Provide this interface some name, I have provided name Azure connection and click next.

Next click on connect using virtual private networking (VPN). On the next screen VPN type is important and select IKEv2. IKEv2 is used in Azure RouteBased and Standard or High Performance VPN gateway, this is one of the IPSec VPN protocol. (When setting up RRAS server for VPN connection only Route-Based Gateway is supported.)

Packets will route through this virtual Demand-dial interface.

Static Routes for Remote Networks is crucial setting. Click Add and enter Remote network (Azure virtual network subnet).

Below setting is not required and I will leave it blank, and Finish the wizard. In this article RRAS server wizards are fully deployed, In the next next blog I will be completing remaining VPN configuration.