Configuring and Troubleshooting Routing and Remote Access

Slides:



Advertisements
Similar presentations
Authentication.
Advertisements

5.1 Overview of Network Access Protection What is Network Access Protection NAP Scenarios NAP Enforcement Methods NAP Platform Architecture NAP Architecture.
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
4.1 Configuring Network Access Components of a Network Access Services Infrastructure What is the Network Policy and Access Services Role? What is Routing.
11 TROUBLESHOOTING Chapter 12. Chapter 12: TROUBLESHOOTING2 OVERVIEW  Determine whether a network communications problem is related to TCP/IP.  Understand.
Module 10: Troubleshooting Network Access. Overview Troubleshooting Network Access Resources Troubleshooting LAN Authentication Troubleshooting Remote.
Module 5: Configuring Access for Remote Clients and Networks.
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 11: Planning Network Access.
Module 10: Configuring Virtual Private Network Access for Remote Clients and Networks.
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
CN1260 Client Operating System Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
Hands-On Microsoft Windows Server 2003 Administration Chapter 11 Administering Remote Access Services.
Virtual Private Network (VPN) © N. Ganesan, Ph.D..
Overview of Routing and Remote Access Service (RRAS) When RRAS was implemented in Microsoft Windows NT 4.0, it added support for a number of features.
Chapter 11: Dial-Up Connectivity in Remote Access Designs
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 9 Network Policy and Access Services in Windows Server 2008.
Chapter 6 Configuring, Monitoring & Troubleshooting IPsec
Virtual Private Networks (Tunnels). When Are VPN Tunnels Used? VPN with PPTP tunnel Used if: All routers support VPN tunnels You are using MS-CHAP or.
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
Configuring Routing and Remote Access(RRAS) and Wireless Networking
Chapter 20: Getting from the Office to the Road: VPNs BAI617.
1 Week #7 Network Access Protection Overview of Network Access Protection How NAP Works Configuring NAP Monitoring and Troubleshooting NAP.
Module 8: Configuring Virtual Private Network Access for Remote Clients and Networks.
Module 9: Planning Network Access. Overview Introducing Network Access Selecting Network Access Connection Methods Selecting a Remote Access Policy Strategy.
Configuring Mobile Computing and Remote Access
Module 6: Configuring and Troubleshooting Routing and Remote Access
Objectives Configure routing in Windows Server 2008 Configure Network Address Translation 1.
11.59 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
Configuring and Troubleshooting Remote Access
70-411: Administering Windows Server 2012
Implementing Network Access Protection
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
1 Week 6 – NPS and RADIUS Install and Configure a Network Policy Server Configure RADIUS Clients and Servers NPS Authentication Methods Monitor and Troubleshoot.
Module 8: Designing Network Access Solutions. Module Overview Securing and Controlling Network Access Designing Remote Access Services Designing RADIUS.
20411B 8: Installing, Configuring, and Troubleshooting the Network Policy Server Role Presentation: 60 minutes Lab: 60 minutes After completing this module,
Module 9: Configuring IPsec. Module Overview Overview of IPsec Configuring Connection Security Rules Configuring IPsec NAP Enforcement.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
Module 11: Remote Access Fundamentals
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Module 7 Planning Server and Network Security. Module Overview Overview of Defense-in-Depth Planning for Windows Firewall with Advanced Security Planning.
Module 8: Configuring Network Access Protection
11.59 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
Module 9: Designing Network Access Protection. Scenarios for Implementing NAP Verifying the health of: Roaming laptops Desktop computers Visiting laptops.
Module 11: Implementing ISA Server 2004 Enterprise Edition.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network, Enhanced Chapter 11: Internet Authentication Service.
Welcome Windows Server 2008 安全功能 -NAP. Network Access Protection in Windows Server 2008.
Configuring Network Access Protection
1 Week #5 Routing and NAT Network Overview Configuring Routing Configuring Network Address Translation Troubleshooting Routing and Remote Access.
Module 10: Windows Firewall and Caching Fundamentals.
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
Configure and Security Remote Acess. Chapter 8 Advance Computer Network Lecture Sorn Pisey
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY IT375 Window Enterprise Administration Course Name – IT Introduction to Network Security Instructor.
Windows 10 Common VPN Error Tech Support Number
Virtual Private Networks
Virtual Private Network Access for Remote Networks
Module 9: Configuring Network Access
Configuring Routing and Remote Access (RRAS) and Wireless Networking
Microsoft Windows NT 4.0 Authentication Protocols
Module Overview Installing and Configuring a Network Policy Server
SECURING NETWORK TRAFFIC WITH IPSEC
Implementing Network Access Protection
Securing the Network Perimeter with ISA 2004
Radius, LDAP, Radius used in Authenticating Users
Lesson #10 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 10 Configuring Network and Firewall Settings.
Server-to-Client Remote Access and DirectAccess
Goals Introduce the Windows Server 2003 family of operating systems
Presentation transcript:

Configuring and Troubleshooting Routing and Remote Access

Module Overview Configuring Network Access Configuring VPN Access Overview of Network Policies Overview of the Connection Manager Administration Kit Troubleshooting Routing and Remote Access 2

Configuring Network Access Components of a Network Access Services Infrastructure What Is the Network Policy and Access Services Role? What Is Routing and Remote Access? Network Authentication and Authorization Types of Authentication Methods Integrating DHCP Servers with Routing and Remote Access Service

Components of a Network Access Services Infrastructure Intranet Internet NAP Health Policy Server DHCP Server Health Registration Authority IEEE 802.1X Devices Active Directory VPN Server Restricted Network Perimeter Network Remediation Servers Network Policy Server

What Is the Network Policy and Access Services Role? Enforce health policies Help to secure wireless and wired access Enable remote access solutions Centralize network policy management

What Is Routing and Remote Access? Used to provide remote users access to resources on a private network over Dial-up or VPN services Can be used to provide NAT services Can provide LAN and WAN routing services to connect network segments

Network Authentication and Authorization Verifies the credentials of a connection attempt Uses an authentication protocol to send the credentials from the remote access client to the remote access server in either plain text or encrypted form Authorization: Verifies that the connection attempt is allowed Occurs after successful authentication

Types of Authentication Methods Protocol Description Security Level PAP Uses plaintext passwords. Typically used if the remote access client and remote access server cannot negotiate a more secure form of validation. The least secure authentication protocol. Does not protect against replay attacks, remote client impersonation, or remote server impersonation. CHAP A challenge-response authentication protocol that uses the industry- standard MD5 hashing scheme to encrypt the response. An improvement over PAP in that the password is not sent over the PPP link. Requires a plaintext version of the password to validate the challenge response. Does not protect against remote server impersonation. MS-CHAPv2 An upgrade of MS-CHAP. Two-way authentication, also known as mutual authentication, is provided. The remote access client receives verification that the remote access server that it is dialing in to has access to the user’s password. Provides stronger security than CHAP. EAP Allows for arbitrary authentication of a remote access connection through the use of authentication schemes, known as EAP types. Offers the strongest security by providing the most flexibility in authentication variations.

Integrating DHCP Servers with Routing and Remote Access Service You can provide remote clients with IP configurations by using either: A static pool created on the Routing and Remote Access server for use with remote clients The corporate DHCP server that is located on the corporate LAN DHCP servers that run Windows Server 2008 R2: Provide a predefined user class called the Default Routing and Remote Access Class Are useful for assigning options that are provided to Routing and Remote Access clients only

Configuring VPN Access What Is a VPN Connection? Tunneling Protocols for a VPN Connection What Is VPN Reconnect? Configuration Requirements Completing Additional Tasks

What Is a VPN Connection? Corporate Headquarters Large Branch Office Small Branch Office VPN Server VPN Server VPN Server Medium Branch Office VPN Home Office with VPN Client VPN Server Remote User with VPN Client

Tunneling Protocols for a VPN Connection Windows Server 2008 supports four VPN tunneling protocols: PPTP L2TP/IPsec SSTP IKEv2

What Is VPN Reconnect? The VPN Reconnect feature maintains connectivity across network outages. It requires Windows Server 2008 R2 or Windows 7. VPN Reconnect: Provides seamless and consistent VPN connectivity Uses the Internet Key Encryption version 2 (IKEv2) technology Automatically re-establishes VPN connections when connectivity is available Maintains the connection if users move between different networks Makes the connection status transparent to users

Configuration Requirements VPN server configuration requirements include: Two network interfaces (public and private) IP Address allocation (static pool or DHCP) Authentication provider (NPS/Radius or the VPN server) DHCP relay agent considerations Membership in the Local Administrators group or equivalent

Completing Additional Tasks Configure static packet filters ü Configure services and ports ü Adjust logging levels for routing protocols ü Configure number of available VPN ports ü Create a Connection Manager profile for users ü Add Certificate Services ü Increase remote access security ü Increase VPN security ü Consider implementing VPN Reconnect ü

Overview of Network Policies What Is a Network Policy? Process for Creating and Configuring a Network Policy How Are Network Policies Processed?

What Is a Network Policy? A network policy consists of the following elements: Conditions Constraints Settings

Process for Creating and Configuring a Network Policy Determine authorization by user or group ü Determine appropriate settings for the user account’s network access permissions ü Configure the New Network Policy Wizard: Configure Network Policy conditions Configure Network Policy constraints Configure Network Policy settings ü

How Are Network Policies Processed? START Yes No Go to next policy Are there policies to process? Does connection attempt match policy conditions? No Yes Yes Is the remote access permission for the user account set to Deny Access? No Reject connection attempt No Yes Is the remote access permission for the user account set to Allow Access? Reject connection attempt Is the remote access permission on the policy set to Deny remote access permission? Yes No Yes Accept connection attempt No Does the connection attempt match the user object and profile settings?

Overview of the Connection Manager Administration Kit What Is the Connection Manager Administration Kit? Process for Configuring a Connection Profile Distributing the Connection Profile to Users

What Is the Connection Manager Administration Kit? Allows you to customize users’ remote connection experience by creating predefined connections on remote servers and networks Creates an executable file that can be run on a client computer to establish a network connection that you have designed Reduces Help Desk requests related to the configuration of RAS connections Assists in problem resolution because the configuration is known Reduces the likelihood of user errors when they configure their own connection objects

Process for Configuring a Connection Profile The CMAK Connection Profile Wizard assists in the process of creating custom connection profiles for users Use the CMAK Connection Profile Wizard to configure: The target operating system Support for VPN Support for Dial-up, including the custom phone book Proxy Custom Help file Custom support information

Distributing the Connection Profile to Users The connection profile can be distributed to users in the following ways: As part of an image for new computers On removable media for the user to install manually With software distribution tools, such as Systems Management Server or System Center Configuration Manager 2007

Troubleshooting Routing and Remote Access Authentication and Accounting Logging Configuring Remote Access Logging Configuring Remote Access Tracing Resolving General VPN Problems Troubleshooting Other Issues

Authentication and Accounting Logging There are three types of logging for Network Policy Server: Event logging for auditing and troubleshooting connection attempts Logging authentication and accounting requests to a local file Logging authentication and accounting requests to a SQL server database

Configuring Remote Access Logging You can configure remote access logging to: Log errors only Log errors and warnings Log all events Not log any events Log additional routing and remote access information

Configuring Remote Access Tracing You can configure remote access tracing by using: The Netsh command: Netsh ras diagnostics set rastracing * enabled (enables tracing on all components in RAS) The Registry: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing Tracing consumes resources, so you should use it for troubleshooting only and then disable it

Resolving General VPN Problems

Troubleshooting Other Issues Common problems regarding remote access include: Error 800: VPN unreachable Error 721: Remote computer not responding Error 741/742: Encryption mismatch L2TP/IPsec issues EAP-TLS issues

Summary Configuring Network Access Configuring VPN Access Overview of Network Policies Overview of the Connection Manager Administration Kit Troubleshooting Routing and Remote Access 30