Module Overview Installing and Configuring a Network Policy Server

Slides:



Advertisements
Similar presentations
5.1 Overview of Network Access Protection What is Network Access Protection NAP Scenarios NAP Enforcement Methods NAP Platform Architecture NAP Architecture.
Advertisements

Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
Lesson 17: Configuring Security Policies
Module 10: Troubleshooting Network Access. Overview Troubleshooting Network Access Resources Troubleshooting LAN Authentication Troubleshooting Remote.
1 Routing and Remote Access Service (Week 15, Friday 4/21/2006) © Abdou Illia, Spring 2006.
Module 5: Configuring Access for Remote Clients and Networks.
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 11: Planning Network Access.
Chapter 7 HARDENING SERVERS.
Hands-On Microsoft Windows Server 2003 Administration Chapter 5 Administering File Resources.
Hands-On Microsoft Windows Server 2003 Administration Chapter 3 Administering Active Directory.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
Module 8: Implementing Administrative Templates and Audit Policy.
Implementing RADIUS AAA Phil & Rick. Content Terms and Concepts Access Control What is AAA? Benefits of AAA What is RADIUS? Microsoft IAS Overview Installation.
11 SYSTEMS ADMINISTRATION AND TERMINAL SERVICES Chapter 12.
Event Viewer Was of getting to event viewer Go to –Start –Control Panel, –Administrative Tools –Event Viewer Go to –Start.
Windows Server 2008 Chapter 6 Last Update
Chapter 6 Configuring, Monitoring & Troubleshooting IPsec
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
Module 4 Managing Client Access. Module Overview Configuring the Client Access Server Role Configuring Client Access Services for Outlook Clients Configuring.
1 Chapter Overview Monitoring Server Performance Monitoring Shared Resources Microsoft Windows 2000 Auditing.
Ch 11 Managing System Reliability and Availability 1.
Configuring Routing and Remote Access(RRAS) and Wireless Networking
Module 5: Managing Public Folders. Overview Managing Public Folder Data Managing Network Access to Public Folders Publishing an Outlook 2003 Form Discussion:
September 18, 2002 Introduction to Windows 2000 Server Components Ryan Larson David Greer.
Hands-On Microsoft Windows Server 2008
Chapter 6 Configuring Windows Server 2008 Printing
70-411: Administering Windows Server 2012
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Module 7: Fundamentals of Administering Windows Server 2008.
1 Week 6 – NPS and RADIUS Install and Configure a Network Policy Server Configure RADIUS Clients and Servers NPS Authentication Methods Monitor and Troubleshoot.
Module 8: Designing Network Access Solutions. Module Overview Securing and Controlling Network Access Designing Remote Access Services Designing RADIUS.
20411B 8: Installing, Configuring, and Troubleshooting the Network Policy Server Role Presentation: 60 minutes Lab: 60 minutes After completing this module,
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
Module 9: Configuring IPsec. Module Overview Overview of IPsec Configuring Connection Security Rules Configuring IPsec NAP Enforcement.
Module 11: Remote Access Fundamentals
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
Module 11: Implementing ISA Server 2004 Enterprise Edition.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network, Enhanced Chapter 11: Internet Authentication Service.
Module 6: Managing Client Access. Overview Implementing Client Access Servers Implementing Client Access Features Implementing Outlook Web Access Introduction.
Guide to MCSE , Second Edition, Enhanced1 The Windows XP Security Model User must logon with: Valid user ID Password User receives access token Access.
Troubleshooting Security Issues Lesson 6. Skills Matrix Technology SkillObjective Domain SkillDomain # Monitoring and Troubleshooting with Event Viewer.
Lesson 12: Configuring Remote Management
1 Week #5 Routing and NAT Network Overview Configuring Routing Configuring Network Address Translation Troubleshooting Routing and Remote Access.
Module 10: Windows Firewall and Caching Fundamentals.
1 Active Directory Administration Tasks And Tools Active Directory Administration Tasks Active Directory Administrative Tools Using Microsoft Management.
1 Chapter 13: RADIUS in Remote Access Designs Designs That Include RADIUS Essential RADIUS Design Concepts Data Protection in RADIUS Designs RADIUS Design.
Configuring the User and Computer Environment Using Group Policy Lesson 8.
远程访问策略是如何处理的 Are there policies to process? START Does connection attempt match policy conditions? Yes 拒绝尝 试的连接 Is the Ignore User Dialin Properties attribute.
Module 9: Configuring Network Access
Module 9: Preparing to Administer a Server
Module 3: Enabling Access to Internet Resources
Administering Windows Server 2012
Microsoft Windows NT 4.0 Authentication Protocols
Module 10: Managing and Monitoring Network Access
Global Catalog and Flexible Single Master Operations (FSMO) Roles
SECURING NETWORK TRAFFIC WITH IPSEC
Implementing Network Access Protection
Securing the Network Perimeter with ISA 2004
Configuring and Troubleshooting Routing and Remote Access
Objectives Differentiate between the different editions of Windows Server 2003 Explain Windows Server 2003 network models and server roles Identify concepts.
Implementing TMG Server Publishing
Server-to-Client Remote Access and DirectAccess
Goals Introduce the Windows Server 2003 family of operating systems
Bethesda Cybersecurity Club
Securing Windows 7 Lesson 10.
Module 9: Preparing to Administer a Server
Presentation transcript:

Installing, Configuring, and Troubleshooting the Network Policy Server Role Service

Module Overview Installing and Configuring a Network Policy Server Configuring RADIUS Clients and Servers NPS Authentication Methods Monitoring and Troubleshooting a Network Policy Server 2

Installing and Configuring a Network Policy Server What Is a Network Policy Server? Tools Used for Managing a Network Policy Server

What Is a Network Policy Server? Windows Server 2008 Network Policy Server (NPS): RADIUS server RADIUS proxy NAP policy server

Tools Used for Managing a Network Policy Server Tools used to manage NPS include: NPS MMC Console Netsh command line to configure all aspects of NPS, such as: NPS Server Commands RADIUS Client Commands Connection Request Policy Commands Remote RADIUS Server Group Commands Network Policy Commands Network Access Protection Commands Accounting Commands

Configuring RADIUS Clients and Servers What Is a RADIUS Client? What Is a RADIUS Proxy? What Is a Connection Request Policy? Configuring Connection Request Processing

What Is a RADIUS Client? NPS is a RADIUS server RADIUS clients are network access servers, such as: Wireless access points 802.1x authenticating switches VPN servers Dial-up servers RADIUS clients send connection requests and accounting messages to RADIUS servers for authentication, authorization, and accounting

What Is a RADIUS Proxy? A RADIUS proxy receives connection attempts from RADIUS clients and forwards them to the appropriate RADIUS server or another RADIUS proxy for further routing A RADIUS proxy is required for: Service providers offering outsourced dial-up, VPN, or wireless network access services Providing authentication and authorization for user accounts that are not Active Directory members Performing authentication and authorization using a database that is not a Windows account database Load-balancing connection requests among multiple RADIUS servers Providing RADIUS for outsourced service providers and limiting traffic types through the firewall

What Is a Connection Request Policy? Connection Request policies are sets of conditions and settings that designate which RADIUS servers perform the authentication and authorization of connection requests that NPS receives from RADIUS clients Connection Request policies include: Conditions, such as: Framed Protocol Service Type Tunnel Type Day and Time restrictions Settings, such as: Authentication Accounting Attribute Manipulation Advanced settings Custom Connection Request policies are required to forward the request to another proxy or RADIUS server or server group for authorization and authentication, or to specify a different server for accounting information

Configuring Connection Request Processing Configuration Description Local vs. RADIUS authentication Local authentication takes place against the local security account database or Active Directory. Connection policies exist on that server. RADIUS authentication forwards the connection request to a RADIUS server for authentication against a security database. RADIUS maintains a central store of all the connection policies. RADIUS server groups Used where one or more RADIUS servers are capable of handling connection requests. The connection requests are load-balanced on criteria specified during the creation of the RADIUS server group if there is more than one RADIUS server in the group. Default ports for accounting and authentication using RADIUS The ports required for accounting and authentication requests being forwarded to a RADIUS server are UDP 1812/1645 and UDP 1813/1646.

NPS Authentication Methods Password-Based Authentication Methods Using Certificates for Authentication Required Certificates for NPS Authentication Methods Deploying Certificates for PEAP and EAP

Password-Based Authentication Methods Authentication methods for an NPS server include: MS-CHAPv2 MS-CHAP CHAP PAP Unauthenticated access

Using Certificates for Authentication With NPS, you use certificates for network access authentication because: Provide for stronger security Eliminate need for less secure, password-based authentication

Required Certificates for NPS Authentication Methods You require the following certificates to deploy certificate-based authentication in NPS: CA certificate in the Trusted Root Certification Authorities certificate store for the Local Computer and Current User Client computer certificate in the certificate store of the client Server certificate in the certificate store of the NPS server User certificate on a smart card

Deploying Certificates for PEAP and EAP For Domain Computer and User accounts, use the auto-enrollment feature in Group Policy Nondomain member enrollment requires an administrator to request a user or computer certificate using the CA Web Enrollment tool The administrator must save the computer or user certificate to a floppy disk or other removable media, and manually install the certificate on the nondomain member computer The administrator can distribute user certificates on a smart card

Monitoring and Troubleshooting a Network Policy Server Methods Used to Monitor NPS Logging NPS Accounting Configuring SQL Server Logging Configuring NPS Events to Record in the Event Viewer

Methods Used to Monitor NPS NPS monitoring methods include: Event logging The process of logging NPS events in the System Event log Useful for auditing and troubleshooting connection attempts Logging user authentication and accounting requests Useful for connection analysis and billing purposes Can be in a text format Can be in a database format within a SQL instance

Logging NPS Accounting Use the NPS console to configure logging: Open NPS from the Administrative Tools menu 1 In the console tree, click Accounting 2 In the details pane, click Configure Local File Logging 3 On the Settings tab, select the information to be logged 4 On the Log File tab, select the log type and the frequency or size attributes of the log files to be generated 5 Log files should be stored on a separate partition from the system partition: If RADIUS accounting fails due to a full hard disk, NPS stops processing connection requests

Configuring SQL Server Logging You can use SQL to log RADIUS accounting data: Requires SQL to have a stored procedure named report_event NPS formats accounting data as an XML document Can be a local or remote SQL Server database

Configuring NPS Events to Record in the Event Viewer How do I configure NPS events to be recorded in Event Viewer? NPS is configured by default to record failed connections and successful connections in the event log You can change this behavior on the General tab of the Properties sheet for the network policy Common request failure events What information does the failure event record? What information does the success event record? What is Schannel logging, and how do I configure it? Schannel is a security support provider that supports a set of Internet security protocols You can configure Schannel logging in the following Registry key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\ SecurityProviders\SCHANNEL\EventLogging

Summary Installing and Configuring a Network Policy Server Configuring RADIUS Clients and Servers NPS Authentication Methods Monitoring and Troubleshooting a Network Policy Server 21