1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.

Slides:



Advertisements
Similar presentations
5.1 Overview of Network Access Protection What is Network Access Protection NAP Scenarios NAP Enforcement Methods NAP Platform Architecture NAP Architecture.
Advertisements

1 Chapter 2: Networking Protocol Design Designs That Include TCP/IP Essential TCP/IP Design Concepts TCP/IP Data Protection TCP/IP Optimization.
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
4.1 Configuring Network Access Components of a Network Access Services Infrastructure What is the Network Policy and Access Services Role? What is Routing.
1 Routing and Remote Access Service (Week 15, Friday 4/21/2006) © Abdou Illia, Spring 2006.
Module 5: Configuring Access to Internal Resources.
Module 5: Configuring Access for Remote Clients and Networks.
1 Configuring Virtual Private Networks for Remote Clients and Networks.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 11: Planning Network Access.
Module 10: Configuring Virtual Private Network Access for Remote Clients and Networks.
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
CN1260 Client Operating System Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
Hands-On Microsoft Windows Server 2003 Administration Chapter 11 Administering Remote Access Services.
70-270, MCSE/MCSA Guide to Installing and Managing Microsoft Windows XP Professional and Windows Server 2003 Chapter Twelve Implementing Terminal.
Chapter 8: Configuring Network Connectivity. Installing Network Adapters Network adapter cards connect a computer to a network. Installation –Plug and.
MCITP Guide to Microsoft Windows Server 2008 Server Administration (Exam #70-646) Chapter 10 Configuring Remote Access.
Remote Networking Architectures
Virtual Private Network (VPN) © N. Ganesan, Ph.D..
Overview of Routing and Remote Access Service (RRAS) When RRAS was implemented in Microsoft Windows NT 4.0, it added support for a number of features.
Module 11: Supporting Remote Users. Overview Establishing Remote Access Connections Connecting to Virtual Private Networks Configuring Authentication.
Chapter 11: Dial-Up Connectivity in Remote Access Designs
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 14 Remote Access.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 9 Network Policy and Access Services in Windows Server 2008.
Chapter 6 Configuring, Monitoring & Troubleshooting IPsec
Virtual Private Networks (Tunnels). When Are VPN Tunnels Used? VPN with PPTP tunnel Used if: All routers support VPN tunnels You are using MS-CHAP or.
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
Network Services Lesson 6. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Setting up common networking services Understanding.
Windows Server 2008 Chapter 9 Last Update
Guide to Operating System Security Chapter 9 Web, Remote Access, and VPN Security.
Configuring Routing and Remote Access(RRAS) and Wireless Networking
Chapter 20: Getting from the Office to the Road: VPNs BAI617.
1 Week #7 Network Access Protection Overview of Network Access Protection How NAP Works Configuring NAP Monitoring and Troubleshooting NAP.
Module 8: Configuring Virtual Private Network Access for Remote Clients and Networks.
Module 9: Planning Network Access. Overview Introducing Network Access Selecting Network Access Connection Methods Selecting a Remote Access Policy Strategy.
Module 6: Configuring and Troubleshooting Routing and Remote Access
A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e
Objectives Configure routing in Windows Server 2008 Configure Network Address Translation 1.
Chapter 13 – Network Security
11.59 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
70-411: Administering Windows Server 2012
Implementing Network Access Protection
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
1 Week 6 – NPS and RADIUS Install and Configure a Network Policy Server Configure RADIUS Clients and Servers NPS Authentication Methods Monitor and Troubleshoot.
Module 8: Designing Network Access Solutions. Module Overview Securing and Controlling Network Access Designing Remote Access Services Designing RADIUS.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
Module 11: Remote Access Fundamentals
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Module 7 Planning Server and Network Security. Module Overview Overview of Defense-in-Depth Planning for Windows Firewall with Advanced Security Planning.
Module 8: Configuring Network Access Protection
11.59 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
Module 5: Configuring Access for Remote Clients and Networks.
Page 1 TCP/IP Networking and Remote Access Lecture 9 Hassan Shuja 11/23/2004.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network, Enhanced Chapter 11: Internet Authentication Service.
Configuring Network Access Protection
1 Week #5 Routing and NAT Network Overview Configuring Routing Configuring Network Address Translation Troubleshooting Routing and Remote Access.
MICROSOFT TESTS /291/293 Fairfax County Adult Education Courses 1477/1478/1479.
Configure and Security Remote Acess. Chapter 8 Advance Computer Network Lecture Sorn Pisey
1 Welcome to Designing a Microsoft Windows 2000 Network Infrastructure.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY IT375 Window Enterprise Administration Course Name – IT Introduction to Network Security Instructor.
Module 9: Configuring Network Access
Microsoft Windows NT 4.0 Authentication Protocols
Implementing Network Access Protection
Securing the Network Perimeter with ISA 2004
Configuring and Troubleshooting Routing and Remote Access
Server-to-Client Remote Access and DirectAccess
Presentation transcript:

1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1

2 Configuring Remote Access Services in Windows Server 2008 Dial-up networking –Connects remote users using a phone line Virtual Private Networks –Allow client connections to your network from remote locations –Works by creating a secure tunnel for transmitting data packets between two points –VPN tunneling protocols: Point-to-Point Tunneling Protocol (Easiest) Layer 2 Tunneling Protocol (Require Certificate) Secure Socket Tunneling Protocol (Only support 2008 or newer client) 2

3 A VPN Tunnel Point-to-Point Tunneling Protocol (PPTP) Layer Two Tunneling Protocol (L2TP) IP Security (IPSec) tunnel mode IP-in-IP

4 VPN Remote Access Uses Internet to transmit private information Encryption is used Windows Server 2008 uses RRAS as a VPN server Remote computers are configured as VPN clients

5 Corporate Internetwork

6 Implement a VPN through a NAT Server

7 Enable and Configure a VPN Server Enabling packet filters should only be chosen if the server has multiple network cards with the filtered card connected to the Internet and the unfiltered cards connected to VPN traffic

8 VPN Protocols PPTP is the most popular and can function through NAT L2TP requires IPSec to function By default, 128 PPTP ports and 128 L2TP ports available – Can increase the number of ports or – Disable a protocol by setting the number of ports to zero SSTP: New in Only for Client-Site, not for Site-Site –PPP or L2TP over SSL

9 VPN Protocols (continued)

10 Authentication Protocols

11 Configuring Remote Access Servers Control authentication and logging. Server and Client must support common protocol to authenticate and connect –No Authentication –Password Authenticated Protocol –Shiva Password Authentication Protocol –Challenge Handshake Authentication Protocol –Microsoft Challenge Handshake Authentication Protocol –Microsoft Challenge Handshake Authentication Protocol version 2 –Extensible Authentication Protocol Specify whether or not the server is a router for IP, and if it allows IP-based remote access connections Enable broadcast name resolution

12 Allowing Client Access By default, none of the users are granted remote access permission Remote access permission is controlled by their user object –If RRAS does not participate in Active Directory, the user object is stored in the local user account database –If RRAS belongs to an Active Directory domain, the user object is stored in the Active Directory database located on the domain controller

13 Network Access Policies Control who is allowed to access remotely Depends on the domain’s functional level (mixed, 2000 native or 2003 native or 2008) Depend on the machine user is connecting to Composed of Conditions, Constraints, and Settings – Conditions are criteria that must be met in order for remote access policy to apply to a connection – Allow if met constraints and Deny if not – After conditions and constrains are met, settings are applied to the connection

14 Network Access Policy Evaluation

15 Creating a VPN Client Connection Configure VPN clients on client machines, e.g. Win XP Windows Server 2008 can be configured as a VPN client Create VPN connections using the “New Connection” Wizard in XP or earlier and “Set up a connection or network” wizard in Vista and 2008 –Specify IP address (or FQDN) of VPN server –Configure whether or not an initial connection is created –Configure dialing and redialing options –Specify if password and data encryption are required –Configure the network configuration for VPN connection –Configure an Internet connection firewall and Internet connection sharing

16 Routing and Remote Access and DHCP Provide remote access clients with IP addresses during a dial-up connection. –Server Assigned IP Address option. Routing and Remote Access uses DHCP to lease addresses. DHCP leases are released when Routing and Remote Access is shut down. Number of leased addresses can be configured.

17 Troubleshooting Remote Access Software configuration errors by users or administrators –Incorrect phone numbers and IP addresses –Incorrect authentication settings –Incorrectly configured network access policies –Name resolution is not configured –Clients receive incorrect IP options Best troubleshooting tools include: –Log files (System log) –Error messages –Network Monitor –Ipconfig and Ping command line tools Hardware errors can also cause problems

18 Hardware Errors Common hardware troubleshooting tips: –Ensure hardware is on the Microsoft hardware compatibility list –Use ping to determine if the address is reachable –See if you can dial in to a different remote access server –Ensure there is a link light on the network card

19 Resource Kit Utilities RASLIST.EXE RASSRVMON.EXE: Monitor Remote Access –Provides: Server, Port, Summary, and Individual Connection information –Alerting set up to run program of choice RASUSERS.EXE TRACEENABLE.EXE

20 Introduction to Network Policy Server Network Policy Server (NPS) –Role service that provides a framework for creating and enforcing network access policies for client health –Can be used to perform: Configure a RADIUS server Configure a RADIUS proxy Configure and implement Network Access Protection (NAP) 20

21 Introduction to RADIUS RADIUS –Industry-standard protocol that provides centralized authentication, authorization, and accounting for network access devices Components of RADIUS –RADIUS clients  VPN server –Network access servers –RADIUS proxy –RADIUS server  Perform authentication & authorization –User account database 21

22

23

24

25 Server 2008 NPS Console NPS Console –Central utility for managing RADIUS clients and remote RADIUS servers Network health and access policies NAP settings for NAP scenarios Logging settings 25

26 Server 2008 NPS Console 26

27 Server 2008 NPS Console 27