Microsoft Windows NT 4.0 Authentication Protocols

Slides:



Advertisements
Similar presentations
1 Chapter 2: Networking Protocol Design Designs That Include TCP/IP Essential TCP/IP Design Concepts TCP/IP Data Protection TCP/IP Optimization.
Advertisements

Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
Module 5: Configuring Access for Remote Clients and Networks.
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
1 Configuring Virtual Private Networks for Remote Clients and Networks.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 11: Planning Network Access.
Module 10: Configuring Virtual Private Network Access for Remote Clients and Networks.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 14: Troubleshooting Remote Connections.
Hands-On Microsoft Windows Server 2003 Administration Chapter 11 Administering Remote Access Services.
70-270, MCSE/MCSA Guide to Installing and Managing Microsoft Windows XP Professional and Windows Server 2003 Chapter Twelve Implementing Terminal.
Chapter 8: Configuring Network Connectivity. Installing Network Adapters Network adapter cards connect a computer to a network. Installation –Plug and.
MCITP Guide to Microsoft Windows Server 2008 Server Administration (Exam #70-646) Chapter 10 Configuring Remote Access.
Windows 2000 Remote Access. Remote Access Overview With Windows 2000 remote access, remote access clients connect to remote access servers and are transparently.
VPN – Virtual Private Networking. VPN A Virtual Private Network (VPN) connects the components of one network over another network. VPNs accomplish this.
Remote Networking Architectures
Virtual Private Network (VPN) © N. Ganesan, Ph.D..
Overview of Routing and Remote Access Service (RRAS) When RRAS was implemented in Microsoft Windows NT 4.0, it added support for a number of features.
Module 11: Supporting Remote Users. Overview Establishing Remote Access Connections Connecting to Virtual Private Networks Configuring Authentication.
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 14 Remote Access.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
Virtual Private Networks (Tunnels). When Are VPN Tunnels Used? VPN with PPTP tunnel Used if: All routers support VPN tunnels You are using MS-CHAP or.
Virtual Private Networks Alberto Pace. IT/IS Technical Meeting – January 2002 What is a VPN ? u A technology that allows to send confidential data securely.
Worldwide Product Marketing Group United States - Spain - UK - France - Germany - Singapore - Taipei Barricade™ VPN Broadband Routers (4 and 8 port)
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 23 Virtual Private Networks (VPNs)
Windows Server 2008 Chapter 9 Last Update
Guide to Operating System Security Chapter 9 Web, Remote Access, and VPN Security.
Configuring Routing and Remote Access(RRAS) and Wireless Networking
Chapter 12 Chapter 12: Remote Access and Virtual Private Networks.
Module 8: Configuring Virtual Private Network Access for Remote Clients and Networks.
Module 9: Planning Network Access. Overview Introducing Network Access Selecting Network Access Connection Methods Selecting a Remote Access Policy Strategy.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
Chapter 13 – Network Security
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
11.59 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
70-411: Administering Windows Server 2012
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
Module 8: Designing Network Access Solutions. Module Overview Securing and Controlling Network Access Designing Remote Access Services Designing RADIUS.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
Module 11: Remote Access Fundamentals
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
11.59 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
Module 5: Configuring Access for Remote Clients and Networks.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
Page 1 TCP/IP Networking and Remote Access Lecture 9 Hassan Shuja 11/23/2004.
Network access security methods Unit objective Explain the methods of ensuring network access security Explain methods of user authentication.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network, Enhanced Chapter 11: Internet Authentication Service.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
1 Week #5 Routing and NAT Network Overview Configuring Routing Configuring Network Address Translation Troubleshooting Routing and Remote Access.
Virtual Private Networks
Virtual Private Network Access for Remote Networks
Module 9: Configuring Network Access
Virtual Private Networks
Virtual Private Network (VPN)
Virtual Private Network
Configuring Routing and Remote Access (RRAS) and Wireless Networking
Configuring and Troubleshooting Routing and Remote Access
Virtual Private Networks (VPN)
Virtual Private Network (VPN)
Server-to-Client Remote Access and DirectAccess
Goals Introduce the Windows Server 2003 family of operating systems
Virtual Private Networks
Introduction to Network Security
Chapter 12: Remote Access and Virtual Private Networks
Virtual Private Networks (VPN)
Virtual Private Network zswu
Presentation transcript:

Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft Challenge Handshake Authentication Protocol (MS-CHAP) Shiva Password Authentication Protocol (SPAP) Point-to-Point Tunneling Protocol (PPTP)

Microsoft Windows 2000 Authentication Protocols Support the Windows NT 4.0 authentication protocols Extensible Authentication Protocol (EAP) Remote Authentication Dial-In User Service (RADIUS) Internet Protocol Security (IPSec) Layer Two Tunneling Protocol (L2TP) Bandwidth Allocation Protocol (BAP)

Extensible Authentication Protocol (EAP) Is an extension to the Point-to-Point protocol (PPP) Works with dial-up, PPTP, and L2TP clients Allows arbitrary authentication mechanisms to validate a dial-in connection Supports authentication by using generic token cards, MD5-CHAP, and TLS Allows vendors to supply new client and server authentication modules

Remote Authentication Dial-In User Service (RADIUS) RADIUS provides Remote user authentication that is vendor-independent. Scaleable authentication designs for performance. Fault-tolerant designs for reliability. Windows 2000 can act as a RADIUS client or server.

Windows 2000 Can Act as a RADIUS Client Is typically an ISP dial-up server Receives authentication requests Forwards the requests to a RADIUS server A Windows 2000 RADIUS client Can also forward accounting information Is configured on the remote access server’s Securities tab

Windows 2000 Can Act as a RADIUS Server A RADIUS server validates the RADIUS client request. Windows 2000 uses Internet Authentication Services (IAS) to perform authentication. IAS stores accounting information from RADIUS clients in log files. IAS is one of the optional components you can add.

Internet Protocol Security (IPSec) Consists of a set of security protocols and cryptographic protection services Ensures secure private communications over IP networks Provides aggressive protection against private network and Internet attacks Negotiates a security association (SA) with clients that acts as a private key to encrypt the data flow

Layer Two Tunneling Protocol Similar to PPTP Creates an encrypted tunnel Does not provide encryption Works with encryption technologies such as IPSec

Differences Between L2TP and PPTP L2TP does not require an IP-based transit network. L2TP supports header compression. L2TP supports tunnel authentication. L2TP uses IPSec for encryption and PPTP uses PPP encryption.

Bandwidth Allocation Protocol (BAP) and Bandwidth Allocation Control Protocol (BACP) Dynamically add or drop links on demand Are PPP control protocols Provide bandwidth on demand 10

Allowing Inbound Dial-Up Connections

Configuring Devices for Incoming Connections

Allowing Virtual Private Connections Click Next on the Devices For Incoming Connections page. Select either to allow or not allow virtual private connections on the Incoming Virtual Private Connection page.

Specifying Users and Callback Options

Selecting Networking Components Choose the networking components to enable for incoming calls. Install additional networking components.

Dial-Up Connections

Connections to a Virtual Private Network (VPN) Create a VPN by using tunneling protocols such as PPTP or L2TP. Create secure connections across an untrusted network. Select Connect To A Private Network Through The Internet. Decide if you want to select Automatically Dial This Initial Connection. Enter the host name or IP address to which you are connecting. Specify who can use the connection.

Direct Connection to Another Computer Through a Cable Select Connect Directly To Another Computer. Select whether your computer will be the host or the guest for the connection. Select the port that is connected to the other computer. Specify the users who can use this connection. Decide if you want a shortcut icon on your desktop.