Module 10: Troubleshooting Network Access. Overview Troubleshooting Network Access Resources Troubleshooting LAN Authentication Troubleshooting Remote.

Slides:



Advertisements
Similar presentations
5.1 Overview of Network Access Protection What is Network Access Protection NAP Scenarios NAP Enforcement Methods NAP Platform Architecture NAP Architecture.
Advertisements

Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
4.1 Configuring Network Access Components of a Network Access Services Infrastructure What is the Network Policy and Access Services Role? What is Routing.
11 TROUBLESHOOTING Chapter 12. Chapter 12: TROUBLESHOOTING2 OVERVIEW  Determine whether a network communications problem is related to TCP/IP.  Understand.
1 Routing and Remote Access Service (Week 15, Friday 4/21/2006) © Abdou Illia, Spring 2006.
Module 5: Configuring Access to Internal Resources.
Module 5: Configuring Access for Remote Clients and Networks.
Module 4: Implementing User, Group, and Computer Accounts
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 11: Planning Network Access.
Hands-On Microsoft Windows Server 2003 Administration Chapter 11 Administering Remote Access Services.
70-270, MCSE/MCSA Guide to Installing and Managing Microsoft Windows XP Professional and Windows Server 2003 Chapter Twelve Implementing Terminal.
Virtual Private Network (VPN) © N. Ganesan, Ph.D..
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Module 11: Supporting Remote Users. Overview Establishing Remote Access Connections Connecting to Virtual Private Networks Configuring Authentication.
Module 8: Implementing Administrative Templates and Audit Policy.
Event Viewer Was of getting to event viewer Go to –Start –Control Panel, –Administrative Tools –Event Viewer Go to –Start.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
VPN Scenarios © N. Ganesan, Ph.D.. Chapter Objectives.
Chapter 6 Configuring, Monitoring & Troubleshooting IPsec
Virtual Private Networks (Tunnels). When Are VPN Tunnels Used? VPN with PPTP tunnel Used if: All routers support VPN tunnels You are using MS-CHAP or.
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
Network and Active Directory Performance Monitoring and Troubleshooting NETW4008 Lecture 8.
1 Chapter Overview Monitoring Server Performance Monitoring Shared Resources Microsoft Windows 2000 Auditing.
Module 3: Planning and Troubleshooting Routing and Switching.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 9: Securing Network Traffic Using IPSec.
September 18, 2002 Introduction to Windows 2000 Server Components Ryan Larson David Greer.
Implementing Dynamic Host Configuration Protocol
1 Week #7 Network Access Protection Overview of Network Access Protection How NAP Works Configuring NAP Monitoring and Troubleshooting NAP.
Module 8: Configuring Virtual Private Network Access for Remote Clients and Networks.
Module 9: Planning Network Access. Overview Introducing Network Access Selecting Network Access Connection Methods Selecting a Remote Access Policy Strategy.
Module 6: Configuring and Troubleshooting Routing and Remote Access
Module 10: Configuring Windows XP Professional to Operate in Microsoft Networks.
Chapter 13 – Network Security
Implementing Network Access Protection
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Module 7: Fundamentals of Administering Windows Server 2008.
Module 12: Routing Fundamentals. Routing Overview Configuring Routing and Remote Access as a Router Quality of Service.
1 Week 6 – NPS and RADIUS Install and Configure a Network Policy Server Configure RADIUS Clients and Servers NPS Authentication Methods Monitor and Troubleshoot.
Module 8: Designing Network Access Solutions. Module Overview Securing and Controlling Network Access Designing Remote Access Services Designing RADIUS.
20411B 8: Installing, Configuring, and Troubleshooting the Network Policy Server Role Presentation: 60 minutes Lab: 60 minutes After completing this module,
Module 9: Configuring IPsec. Module Overview Overview of IPsec Configuring Connection Security Rules Configuring IPsec NAP Enforcement.
Module 11: Remote Access Fundamentals
Module 8: Configuring Network Access Protection
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
Module 5: Configuring Access for Remote Clients and Networks.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
Module 8: Planning and Troubleshooting IPSec. Overview Understanding Default Policy Rules Planning an IPSec Deployment Troubleshooting IPSec Communications.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network, Enhanced Chapter 11: Internet Authentication Service.
Module 4: Configuring and Troubleshooting DHCP
Configuring Network Access Protection
1 Week #5 Routing and NAT Network Overview Configuring Routing Configuring Network Address Translation Troubleshooting Routing and Remote Access.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 10: Planning and Managing IP Security.
Module 10: Windows Firewall and Caching Fundamentals.
Module 10: Implementing Administrative Templates and Audit Policy.
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
Securing Access to Data Using IPsec Josh Jones Cosc352.
远程访问策略是如何处理的 Are there policies to process? START Does connection attempt match policy conditions? Yes 拒绝尝 试的连接 Is the Ignore User Dialin Properties attribute.
Windows 10 Common VPN Error Tech Support Number
Module 9: Configuring Network Access
Module 3: Enabling Access to Internet Resources
Module Overview Installing and Configuring a Network Policy Server
Module 10: Managing and Monitoring Network Access
Implementing Network Access Protection
Configuring and Troubleshooting Routing and Remote Access
Module 8: Securing Network Traffic by Using IPSec and Certificates
Implementing TMG Server Publishing
Server-to-Client Remote Access and DirectAccess
Module 8: Securing Network Traffic by Using IPSec and Certificates
Presentation transcript:

Module 10: Troubleshooting Network Access

Overview Troubleshooting Network Access Resources Troubleshooting LAN Authentication Troubleshooting Remote Access

Lesson: Troubleshooting Network Access Resources Network Access Logs Network Access Events Network Access Tools Process for Troubleshooting Resources for LAN Connections Process for Troubleshooting Resources for Remote Connections

Network Access Logs LogUse Windows Authentication and Windows Accounting logs Used to track network access usage and authentication attempts; especially useful for troubleshooting remote access policy issues PPP logs Used to troubleshoot the failure of a PPP connection IAS logs Used to track network access usage and authentication attempts Audit and Oakley logging Used to monitor IPSec-related events and troubleshoot unsuccessful L2TP/IPSec connections IKE tracing log Used to troubleshoot IKE interoperability under controlled circumstances

Network Access Events Event LogUse System log Contains information from various services that run on the system and log information regarding their status Records errors and warnings related to network access problems Security log Used to troubleshoot Kerberos or IPSec authentication failures Shows logging failures when a user tries to authenticate

Network Access Tools ToolUse Remote access diagnostics Used to collect detailed logs and information about a remote access connection Network Monitor Used to find answers to network access problems and possible solutions Netdom Used to verify servers and trusts and to reset trusts Kerbtray Used to see if Kerberos tickets were granted out of the local cache IP Security Monitor Used to view details about an active IPSec policy that is applied to a domain or locally, and to view statistics associated with the key-exchange process Standard network troubleshooting tools Used to view client IP configuration and packet transfers

Process for Troubleshooting Resources for LAN Connections User cannot logon Determine if widespread problem or only one user View system logs to isolate problem Tools to use:  Kerbtray  Standard networking troubleshooting tools  Event logs Set logs and events on local computer WidespreadOne user Verify that standard networking troubleshooting has been completed Trust issues tools:  Netdom Authenticated Switch issue tools:  IAS logs Domain controller issues tools:  Standard networking troubleshooting tools  Netdom DNS issues tools:  DNS troubleshooting tools Kerberos and certificate issues tools:  Kerbtray

Process for Troubleshooting Resources for Remote Connections User cannot logon Determine if widespread problem or only one user View Routing and Remote Access system log to isolate problem Tools to use:  Windows accounting and authentication logs  IAS logs Set logs and events on remote access server WidespreadOne user Authentication issues tools:  Sys log  IAS log  Windows accounting and authentication logs  PPP logs Resource access issue tools:  Standard networking troubleshooting tools Certificates issues tools:  Event logs  IAS logs  Windows accounting and authentication logs Remote access policy issues tools:  Event logs  IAS logs  Windows accounting and authentication logs Verify that standard networking troubleshooting has been completed

Practice: Identifying Network Access Troubleshooting Resources In this practice, you will identify network access troubleshooting resources

Lesson: Troubleshooting LAN Authentication Causes of LAN Authentication Errors Security Event Logging Audit Account Logon Events Audit Logon Events Guidelines for Troubleshooting LAN Access

Causes of LAN Authentication Errors No connectivity to network resources Inability to reach domain controller Physical device problems Trust paths for NTLM and Kerberos

Security Event Logging Audit CategoryDescription Audit Account Logon Events Determine whether to audit each instance of a user logging on to or logging off from another computer in which the domain controller is used to validate the account. Generated when a domain user account is authenticated on a domain controller. The event is logged in the domain controller's security log. Audit Logon Events Determine whether to audit each instance of a user logging on to or logging off from a local computer. Generated when a local user is authenticated on a local computer. The event is logged in the local security log.

Audit Account Logon Events If enabled, an entry is logged for each user who is validated against the domain controller Most common events: EventDescription 672 Authentication service ticket successful 673 A ticket granting service ticket was granted 675 Pre-authentication failed; user typed in wrong password 678 An account was successfully mapped to a domain account

Audit Logon Events If enabled, an entry is logged when a local user is authenticated on a local computer Most common events: EventDescription 528 A user successfully logged on to a computer 529 Logon failure; a logon attempt was made with an unknown user name or a known user name with an invalid password 540 A user successfully logged on to a network

Guidelines for Troubleshooting LAN Access Identify the symptoms of the problem Select resources to use Isolate the problem

Practice: Troubleshooting LAN Network Access In this practice, you will troubleshoot LAN authentication based on a given scenario

Lesson: Troubleshooting Remote Access Certificate Validation Authentication Using IAS Logs Demonstration: Monitoring Remote Access by Using IAS Demonstration: Examining IAS Authentication and Accounting Log Files PPP Logging Remote Access Connections Wireless Access Authentication Common VPN Problems Demonstration: Creating and Testing Outbound VPN Connections Process for Troubleshooting Dial-Up Access Problems Guidelines for Troubleshooting Remote Access

Certificate Validation With client certificates you need to:  Check the date range  Ensure that the certificate has not been revoked  Ensure that the certificate has a valid signature With computer certificates you need to:  Verify that the ROOT CA certificate has been installed

Authentication Using IAS Logs Using IAS logs you can verify that the  Wireless access point can reach the IAS server  IAS server/wireless access point pair is configured with a common shared secret  IAS server can reach a global catalog server and an Active Directory domain controller  Computer accounts of the IAS servers are members for the Routing and Remote Access and IAS servers group for the appropriate domains  User or computer account is not locked out, expired, or disabled  Connection is authorized by a remote access policy  Changes to Active Directory are not impacting the functionality of the IAS servers

Demonstration: Monitoring Remote Access by Using IAS This objective of this demonstration is to explain how an Internet Authentication Service server can log remote access You will learn how to:  Enable logging in IAS  Open log files to view account logs  Explain how to use IAS to monitor remote access usage

Demonstration: Examining IAS Authentication and Accounting Log Files The objective of this demonstration is to examine the raw log file and to show how to use iasparse.exe to parse the log file

PPP Logging PPP connection process  Negotiate the use of the link  Authenticate the remote access client  Use callback  Negotiate the use of network protocols PPP logging  Lack of entries indicates that the connection failed  Authentication failure clues

Remote Access Connections If you have a failed connection attempt, you should check the  Remote access policy settings  User account connection settings If you have a connection attempt that is accepted when it should be rejected, you should check the  Parameters of connection in remote access policy If you are unable to reach locations beyond the remote access server, you should check that  The protocol is enabled  The remote access server’s IP address pool is accurate

Wireless Access Authentication MS-CHAP v2 credentials on a wireless client can  Send a user name and password combination to be validated against a user account in Active Directory Wireless client network can  Use Windows XP to view the properties of the wireless network connection Wireless access point troubleshooting tools can  Troubleshoot low signal strength and coverage area issues  Use standard or proprietary wireless protocols  Support SNMP

Common VPN Problems IssueTroubleshooting strategy TCP connection timeout Check port 1723 Packet filtering Verify that packets are not being blocked Winsock Proxy client Ensure that there is not a proxy client enabled Tunneling protocol Ensure that the server supports the protocol Certificates Verify that machine certificates are installed on the VPN server PPTP connections Verify user password length NAT-T Verify that the client supports IPSec NAT Traversal (NAT-T)

Demonstration: Creating and Testing Outbound VPN Connections The objective of this demonstration is to show how and where VPN tunnels are specified You will learn how to:  Create an outbound VPN connection  Specify the address of the VPN server (host name or IP address)  Specify user account permissions to the VPN server  Verify and test the IP address assigned within the VPN tunnel

Process for Troubleshooting Dial-Up Access Problems IssueTroubleshooting strategy Client computer Check error messages Verify setup of physical hardware Verify network connection configuration Remote access server Check error messages Check Event Viewer logs Trace remote access connections

Guidelines for Troubleshooting Remote Access Identify the symptoms of the problem Select resources to use Isolate the problem

Practice: Troubleshooting Remote Access Authentication In this practice, you will troubleshoot remote access based on a given scenario

Lab A: Troubleshooting Network Access Exercise 1:Troubleshooting LAN Access Exercise 2: Troubleshooting Remote Access Authentication