Module 5: Designing Security for Internal Networks.

Slides:



Advertisements
Similar presentations
Internet Protocol Security (IP Sec)
Advertisements

Enabling Secure Internet Access with ISA Server
Guide to Network Defense and Countermeasures Second Edition
1 Chapter 2: Networking Protocol Design Designs That Include TCP/IP Essential TCP/IP Design Concepts TCP/IP Data Protection TCP/IP Optimization.
Chapter 10 Securing Windows Server 2008 MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration.
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
Module 5: Configuring Access for Remote Clients and Networks.
Network Isolation Using Group Policy and IPSec Paula Kiernan Senior Consultant Ward Solutions.
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Module 3 Windows Server 2008 Branch Office Scenario.
Module 10: Configuring Virtual Private Network Access for Remote Clients and Networks.
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
Chapter 7 HARDENING SERVERS.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
70-270, MCSE/MCSA Guide to Installing and Managing Microsoft Windows XP Professional and Windows Server 2003 Chapter Twelve Implementing Terminal.
Lesson 19: Configuring Windows Firewall
Internet Protocol Security (IPSec)
1 Enabling Secure Internet Access with ISA Server.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.
Security Data Transmission and Authentication
Chapter 6 Configuring, Monitoring & Troubleshooting IPsec
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
Module 10: Designing an AD RMS Infrastructure in Windows Server 2008.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 9: Securing Network Traffic Using IPSec.
1 Week #7 Network Access Protection Overview of Network Access Protection How NAP Works Configuring NAP Monitoring and Troubleshooting NAP.
Implementing Network Security
Module 8: Configuring Virtual Private Network Access for Remote Clients and Networks.
Module 9: Planning Network Access. Overview Introducing Network Access Selecting Network Access Connection Methods Selecting a Remote Access Policy Strategy.
Using Windows Firewall and Windows Defender
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
Implementing Network Access Protection
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Windows 7 Firewall.
Module 9: Configuring IPsec. Module Overview Overview of IPsec Configuring Connection Security Rules Configuring IPsec NAP Enforcement.
Module 3: Designing IP Addressing. Module Overview Designing an IPv4 Addressing Scheme Designing DHCP Implementation Designing DHCP Configuration Options.
Module 11: Remote Access Fundamentals
Module 7 Planning Server and Network Security. Module Overview Overview of Defense-in-Depth Planning for Windows Firewall with Advanced Security Planning.
Module 8: Configuring Network Access Protection
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
Module 5: Configuring Access for Remote Clients and Networks.
Module 11: Implementing ISA Server 2004 Enterprise Edition.
Module 9: Fundamentals of Securing Network Communication.
IT:Network:Apps.  RRAS does nice job of routing ◦ NAT is nice ◦ BASIC firewall ok but somewhat weak  Communication on network (WS to SRV) is in clear.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
Module 8: Planning and Troubleshooting IPSec. Overview Understanding Default Policy Rules Planning an IPSec Deployment Troubleshooting IPSec Communications.
Module 8: Managing Terminal Services. Overview Use and manage Terminal Services RemoteApp programs Use and manage Terminal Services Gateway Optimize and.
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
Configuring Network Access Protection
Hands-On Microsoft Windows Server 2003 Networking Chapter 9 IP Security.
1 Week #5 Routing and NAT Network Overview Configuring Routing Configuring Network Address Translation Troubleshooting Routing and Remote Access.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 10: Planning and Managing IP Security.
Module 7: Implementing Security Using Group Policy.
Securing Data Transmission and Authentication. Securing Traffic with IPSec IPSec allows us to protect our network from within IPSec secures the IP protocol.
Module 10: Windows Firewall and Caching Fundamentals.
Understanding, Configuring, and Securing TCP/IP Networks Lesson 11.
Module 8 Implementing Security Using Group Policy.
Securing Access to Data Using IPsec Josh Jones Cosc352.
Security Data Transmission and Authentication Lesson 9.
Windows Vista Configuration MCTS : Network Security.
Virtual Private Network Access for Remote Networks
Configuring Windows Firewall with Advanced Security
Securing the Network Perimeter with ISA 2004
Module 8: Securing Network Traffic by Using IPSec and Certificates
Implementing TMG Server Publishing
Lesson #10 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 10 Configuring Network and Firewall Settings.
Server-to-Client Remote Access and DirectAccess
Module 8: Securing Network Traffic by Using IPSec and Certificates
Presentation transcript:

Module 5: Designing Security for Internal Networks

Module Overview Designing Windows Firewall Implementation Overview of IPSec Designing IPSec Implementation

Methods for Configuring Windows Firewall You can configure Windows Firewall by using: Basic Firewall configuration in Control Panel Windows Firewall with Advanced Security Group Policy

Benefits of IPSec Benefits of IPSec are: Authentication of communication Ensuring that data is not modified in transit Encrypting to secure communication Integrating with Windows Firewall rules as part of Network Access Protection (NAP) Protecting communication between two hosts or two networks

Connection Security Rules Connection security rules: Are new in Windows Server 2008 and Windows Vista Replace IPSec policies from previous versions of Windows Determine which network traffic is affected by IPSec Must exist on both hosts to be effective Apply to all traffic between hosts Can be applied to specific profiles

Types of Connection Security Rules Rule typeDescription Isolation Restricts connections based on criteria such as user, computer, or certificates Server-to-server Authenticates communication based on individual computer IP addresses or subnets Tunnel Secures communication between two computers that are acting as routers between two networks Authentication exemption Prevents specific computers or IP addresses from the requirement to authenticate Custom Allows access to options not available in the Wizard for creating other options

IPSec Authentication Authentication requirements specify when authentication is performed.  Request for inbound and outbound  Require for inbound and request for outbound  Require for inbound and outbound Authentication method specifies how authentication is performed.  Kerberos V5 (user, computer, or both)  NTLMv2 (computer)  Computer certificate  Preshared key

Deployment Methods for Connection Security Rules MethodDescription Windows Firewall with Advanced Security Is suitable for configuring a small number of hosts Is prone to errors during creation Netsh Is suitable for scripting Is configured in the “netsh advfirewall consec” context Group Policy Allows rules to be deployed to a large number of computers easily Reduces the chance of data entry errors during configuration Requires all computers to be a member of a domain Windows PowerShell Is suitable for scripting Accesses network settings through WMI objects

Determining the Authentication Method Authentication method Use Kerberos V5 security protocol Users and computers running Windows 2000 (and later versions) that are part of an Active Directory domain Public key certificate Internet access Remote access to corporate resources External business partners On computers that do not run the Kerberos V5 security protocol Preshared secret key When both computers must manually configure IPSec

Co-existence with IPSec Policies IPSec policies are still required for earlier versions of Windows operating systems IPSec policies can be used by Windows Vista and Windows Server 2008 IPSec policies and connection security rules can be applied at the same time

Integration with Windows Firewall Rules Windows Firewall rules can apply to specific users and computers Authentication by IPSec provides the user or computer identity to Windows Firewall rules Windows Firewall rules can require a secure connection for NAP

Guidelines for Designing IPSec Implementation Deploy with Group Policy Avoid combining IPSec policies and connection security rules Test thoroughly before implementation Use only when appropriate in your security plan