Module 8: Securing Network Traffic by Using IPSec and Certificates

Slides:



Advertisements
Similar presentations
Internet Protocol Security (IP Sec)
Advertisements

Certification Authority. Overview  Identifying CA Hierarchy Design Requirements  Common CA Hierarchy Designs  Documenting Legal Requirements  Analyzing.
Module 10: Troubleshooting Network Access. Overview Troubleshooting Network Access Resources Troubleshooting LAN Authentication Troubleshooting Remote.
Chapter 9 Deploying IIS and Active Directory Certificate Services
Module 5: Configuring Access for Remote Clients and Networks.
Network Isolation Using Group Policy and IPSec Paula Kiernan Senior Consultant Ward Solutions.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
CN1276 Server Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
Internet Protocol Security (IPSec)
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
Security Data Transmission and Authentication
What is in Presentation What is IPsec Why is IPsec Important IPsec Protocols IPsec Architecture How to Implement IPsec in linux.
Chapter 6 Configuring, Monitoring & Troubleshooting IPsec
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
Microsoft ® Official Course Module 9 Configuring Applications.
Protocol Basics. IPSec Provides two modes of protection –Tunnel Mode –Transport Mode Authentication and Integrity Confidentiality Replay Protection.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 9: Securing Network Traffic Using IPSec.
Module 9: Planning Network Access. Overview Introducing Network Access Selecting Network Access Connection Methods Selecting a Remote Access Policy Strategy.
Implementing Network Access Protection
Configuring Encryption and Advanced Auditing
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Module 14: Configuring Server Security Compliance
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Module 9: Configuring IPsec. Module Overview Overview of IPsec Configuring Connection Security Rules Configuring IPsec NAP Enforcement.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Module 9: Fundamentals of Securing Network Communication.
IT:Network:Apps.  RRAS does nice job of routing ◦ NAT is nice ◦ BASIC firewall ok but somewhat weak  Communication on network (WS to SRV) is in clear.
Maintaining Network Health. Active Directory Certificate Services Public Key Infrastructure (PKI) Provides assurance that you are communicating with the.
Module 8: Planning and Troubleshooting IPSec. Overview Understanding Default Policy Rules Planning an IPSec Deployment Troubleshooting IPSec Communications.
Module 9: Designing Public Key Infrastructure in Windows Server 2008.
Overview Managing a DHCP Database Monitoring DHCP
Hands-On Microsoft Windows Server Implementing Microsoft Internet Information Services Microsoft Internet Information Services (IIS) –Software included.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
Securing Data with Internet Protocol Security (IPSec) Designing IPSec Policies Planning IPSec Deployment.
Module 5: Designing Security for Internal Networks.
Hands-On Microsoft Windows Server 2003 Networking Chapter 9 IP Security.
Module 1: Configuring Routing by Using Routing and Remote Access.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 10: Planning and Managing IP Security.
Module 7: Implementing Security Using Group Policy.
Module 2: Introducing Windows 2000 Security. Overview Introducing Security Features in Active Directory Authenticating User Accounts Securing Access to.
Securing Data Transmission and Authentication. Securing Traffic with IPSec IPSec allows us to protect our network from within IPSec secures the IP protocol.
Creating and Managing Digital Certificates Chapter Eleven.
Module 10: Windows Firewall and Caching Fundamentals.
Module 10: Implementing Administrative Templates and Audit Policy.
Module 3 Planning for Active Directory®
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
Securing Access to Data Using IPsec Josh Jones Cosc352.
Security Data Transmission and Authentication Lesson 9.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
11 SECURING NETWORK TRAFFIC WITH IPSEC Chapter 6.
Chapter 5 Network Security Protocols in Practice Part I
Module 9: Configuring Network Access
Module 10: Managing and Monitoring Network Access
SECURING NETWORK TRAFFIC WITH IPSEC
Implementing Network Access Protection
Configuring and Troubleshooting Routing and Remote Access
Understand Networking Services
Server-to-Client Remote Access and DirectAccess
Goals Introduce the Windows Server 2003 family of operating systems
Module 8: Securing Network Traffic by Using IPSec and Certificates
Install AD Certificate Services
Unit 8 Network Security.
Advanced Computer Networks
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

Module 8: Securing Network Traffic by Using IPSec and Certificates

Overview Implementing IPSec Implementing IPSec with Certificates Monitoring IPSec

Lesson: Implementing IPSec Multimedia: The Role of IPSec in a Network Infrastructure What Is IPSec? How IPSec Secures Traffic What Is an IPSec Security Policy? How IPSec Policies Work Together Guidelines for Balancing Security and Performance How to Assign or Unassign an IPSec Policy on a Computer

Multimedia: The Role of IPSec in a Network Infrastructure The objective of this presentation is to describe how IPSec is used to ensure secure private communications over IP networks At the end of this presentation, you will be able to: Explain what IPSec is Describe how IPSec works Describe how IPSec policies work

What Is IPSec? IPSec is an industry-defined set of standards that verifies, authenticates, and encrypts data at the IP packet level. IPSec is used to provide data security for network transmissions Benefits of IPSec: Mutual authentication before and during communications Confidentiality through encryption of IP traffic Integrity of IP traffic by rejecting modified traffic Prevention against replay attacks

How IPSec Secures Traffic IPSec Policy 1 Active Directory TCP Layer IPSec Driver Security Association Negotiation (ISAKMP) 2 Encrypted IP Packets 3

What Is an IPSec Security Policy? IPSec uses rules and policies to secure network traffic Rules are composed of: A filter A filter action An authentication method Default polices include: Client (Respond Only) Server (Request Security) Secure Server (Require Security)

How IPSec Policies Work Together No policy assigned Client (Respond Only) Server (Request Security) Secure Server (Require Security) No IPSec No communication IPSec

Guidelines for Balancing Security and Performance Properly balancing minimal, standard, and high security levels requires: Assessing the risk and determining the appropriate level of security Identifying valuable information Determining how the policies can best be implemented Ensuring that management and technology requirements are in place Providing all users with both secure and efficient access

How to Assign or Unassign an IPSec Policy on a Computer Your instructor will demonstrate how to: Add an IP Security Management Console and then assign or unassign an IPSec policy for a local computer policy Assign or unassign an IPSec policy for an Active Directory-based Group Policy

Practice: Implementing IPSec In this practice, you will assign an IPSec policy

Lesson: Implementing IPSec with Certificates What Is a Certificate? Common Uses of Certificates Why Use Certificates with IPSec to Secure Network Traffic? Multimedia: Certificate Enrollment How to Configure IPSec to Use a Certificate

What Is a Certificate? Certificates are an electronic credential that authenticates a user on the Internet and intranets Certificates: Securely bind a public key to the entity that holds the corresponding private key Are digitally signed by the issuing certificate authority (CA) Verify the identity of a user, computer, or service that presents the certificate Contain details about the issuer and the subject

Common Uses of Certificates Internet Authentication Encrypting File System Secure E-Mail Software Code Signing Smart Card Logon Digital Signatures IP Security

Why Use Certificates with IPSec to Secure Network Traffic? IP Security Configure IPSec to use certificates: To allow an enterprise to interoperate with other organizations that trust the same CA When you need a higher level of security than provided by the Kerberos protocol or preshared keys For clients that are not part of an Active Directory structure or do not support the Kerberos protocol

Multimedia: Certificate Enrollment The objective of this presentation is to provide a high-level overview of certificate enrollment At the end of this presentation, you will be able to: Define certificate enrollment Describe how certificate enrollment works

How to Configure IPSec to Use a Certificate Your instructor will demonstrate how to configure IPSec to use a certificate

Practice: Implementing IPSec with Certificates In this practice, you will implement IPSec with a certificate

Lesson: Monitoring IPSec IP Security Monitor Guidelines for Monitoring IPSec Policies How to Stop and Start the IPSec Services How to View IPSec Policy Details

IP Security Monitor Use the IP Security Monitor to view details about IPSec policies such as: Active IPSec policy details Name Description Date last modified Store Path Organizational unit and Group Policy object (GPO) name Main mode statistics Information from the Internet Key Exchange Quick mode statistics Information about the IPSec driver

Guidelines for Monitoring IPSec Policies To help isolate the cause of a communication issue: Stop the IPSec Policy Agent on the computers and use the ping command to verify communications between them Restart the IPSec Policy Agent and use the IP Security Monitor to confirm that a security association is established between the computers, and the policy is in effect Use IP Security Policy Management to verify that the policies are assigned to both computers Use IP Security Policy Management to review the policies and ensure they are compatible with each other Restart the IP Security Monitor to ensure that all changes are applied

How to Stop and Start the IPSec Services Your instructor will demonstrate how to: Stop and start the IPSec services by using the Windows interface Stop and start the IPSec services by using the command prompt

How to View IPSec Policy Details Your instructor will demonstrate how to: View IPSec Active Policy details by using the IPSec Security Monitor View IPSec Active Policy Main Mode Security Associations by using the IP Security Monitor

Practice: Monitoring IPSec In this the practice, you will monitor IPSec

Lab A: Securing Network Traffic In this lab, you will secure network traffic

Course Evaluation