CN2140 Server II Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+ Agenda • Chapter 5: Configuring Routing and Remote Access (RRAS) and Wireless Networking • Exercise • Lab • Quiz Routing • The process of transferring data across an internetwork from one LAN to another Hub & Switch • A hub (multi-port repeater) operates at Layer 1 ▫ Receives the incoming signal and recreates it for transmission on all of its ports • A switch examines the destination and source address of data frame, and forwards to the destination port ▫ Most switches operate at Layer 2 Router (Layer 3 Devices) • Determines routes from a source network to a destination network, then send packets to that path • To join networks together over extended distances or WANs ▫ The routers choose the fastest or cheapest route • To connect dissimilar LANs, such as an Ethernet LAN, to a Fiber Distributed Data Interface (FDDI) backbone. Routing Protocols • Used to automatically transmit information about the routing topology and which segments can be reached via which router. • Windows Server 2003 support both ▫ RIPv2 (Routing Information Protocol) ▫ OSPF (Open Shortest Path First) • Windows Server 2008 support only RIPv2 Routing Information Protocol (RIP) • Designed for use only on smaller networks • Broadcast-based protocol ▫ Broadcasts information about available networks on a regular basis, as well as when the network topology changes • RIP v2 ▫ Improve the amount of routing information that was provided by RIP ▫ Increase the security of the routing protocol Open Shortest Path First (OSPF) • Designed for use on significantly larger networks • Each OSPF router maintains a database of routes to all destination networks that it knows of ▫ It routes the traffic using the best (shortest) route ▫ It share database information only with those OSPF routers that it has been configured to share information with Software-based Router • Windows Server 2008 computer can be used to route traffic on a small network ▫ Routing and Remote Access server role Under Network Policy and Access services Static Routes • Manually configured by a router administrator ▫ Static routes do not add any processing overhead on the router • Not appropriate for large or complex environments Windows Server 2008 Routing Protocols • Generally, you do not need routing protocol for small subnets • Windows Server 2008 includes three routing protocols that can be added to the Routing and Remote Access service: ▫ RIPv2 ▫ IGMP Router And Proxy Used for multicast forwarding. ▫ DHCP Relay Agent Routing Table • Provide directions toward destination networks or hosts (Route) ▫ Each route consists of a destination, network mask, gateway interface, and metric • The IP routing table serves as a decision tree that enables IP to decide the interface and gateway through which it should send the outgoing traffic ▫ See Figure 5-5 and Figure 5-6 on Page 106 Routing Table (Cont.) • 0.0.0.0 ▫ Default route • 224.0.0.0 ▫ Entries refer to a separate multicast route • Metric ▫ Lower metric is chosen for the path Routing Table (Cont.) • Four types of routes ▫ Directly attached network routes Gateway can be blank Same subnet, use arp to resolve to MAC address ▫ Remote network routes For subnets that are available across routers and that are not directly attached to the node ▫ Host routes A route to a specific IP address ▫ Default routes Route Command • To configure the routing table from the command line, use the route command-line utility • The Route utility syntax is as follows: route [-f] [-p] [Command [Destination] [mask Netmask] [Gateway] [metric Metric] [if Interface] • See Table 5-1 on Page 108 Demand-Dial Routing • Routing and Remote Access also includes support for demand-dial routing (also known as dial-on-demand routing) ▫ To dial/make a connection automatically whenever the router receives a packet ▫ Drop the connection when idle for certain amount of time ▫ You can use dial-up connection Remote Access • A Windows Server 2008 computer ▫ Can act as a Network Address Translation (NAT ) device Allows internal network clients to connect to the Internet using a single shared IP address ▫ Can provide both NAT and VPN services ▫ Can configure a secure site-to-site connection between two private networks • Dial-up networking (DUN) ▫ Often use unencrypted traffic • Virtual Private Network (VPN) Virtual Private Network (VPN) • Creates a secure point-to-point connection • Rely on secure TCP/IP-based protocols called tunneling protocols ▫ The remote access server authenticates the VPN client and creates a secured connection • A VPN is a logical connection between the VPN client and the VPN server over a public network ▫ In order to secure any data sent over the public network, VPN data must be encrypted Virtual Private Network (VPN) • A VPN connection in Windows Server 2008 consists of the following components: ▫ A VPN server ▫ A VPN client ▫ A VPN connection (the portion of the connection in which the data is encrypted) ▫ A VPN tunnel (the portion of the connection in which the data is encapsulated) Virtual Private Network (VPN) • Two tunneling protocols available with Remote and Routing Access: ▫ Point-to-Point Tunneling Protocol (PPTP) In Windows Server 2k8, PPTP supports only the 128-bit RC4 encryption algorithm ▫ Layer Two Tunneling Protocol (L2TP) L2TP with IPSec to provide a secure, encrypted VPN solution In Windows Server 2k8, L2TP will support the Advanced Encryption Standard (AES) 256-bit, 192bit, 128-bit, and 3DES encryption algorithms by default Network Access Translation (NAT) • A protocol that enables private networks to connect to the Internet ▫ Translates private IP addresses to/from public IP addresses • The NAT process also obscures private networks from external access by hiding private IP addresses from public networks • The only IP address that is visible to the Internet is the IP address of the computer running NAT Network Policy Server (NPS) • After a user submits credentials to create a remote access connection • The remote access connection must be authorized by ▫ Network Policy Server (NPS) RRAS role service ▫ A third-party authentication and authorization service such as a Remote Authentication Dial-In User Service (RADIUS) server Network Policy Server (NPS) • Remote access authorization consists of two steps: ▫ Verifying the dial-in properties of the user account ▫ Verifying any NPS Network Policies that have been applied against the Routing and Remote Access server NPS Network Policies • An NPS Network Policy is a set of permissions or restrictions that is read by a remote access authenticating server that applies to remote access connections • A rule for evaluating remote connections, consists of three components: ▫ Conditions ▫ Constraints ▫ Settings NPS Network Policies • NPS Network Policies are ordered on each Remote Access server ▫ Each policy is evaluated in order from top to bottom ▫ Once the RRAS server finds a match, it will stop processing additional policies • See Figure 5-9 on Page 116 NPS Network Policy • Two NPS Network Policies are preconfigured in Windows Server 2008 ▫ Connections To Microsoft Routing And Remote Access Server Configured to match every remote access connection to the Routing and Remote Access service ▫ Connections To Other Access Servers Configured to match every incoming connection, regardless of network access server type If an incoming connection is being authenticated by a RADIUS server or some other authentication mechanism, this policy will take effect Policy Conditions • Each NPS Network policy is based on policy conditions that determine when the policy is applied • This policy would then match a connection for a user who belongs to the global security group ▫ Only membership in global security groups can serve as a remote policy condition ▫ Universal or domain local security groups cannot be specified as the condition for a remote access policy Policy Settings • An NPS Network policy profile consists of a set of settings and properties that can be applied to a connection ▫ Such as IP Address properties ▫ You can configure an NPS profile by clicking the Settings tab in the policy Properties page • See Figure 5-12 on Page 118 Policy Settings • You can set multilink properties ▫ Enable a remote access connection to use multiple modem connections for a single connection and determine the maximum number of ports (modems) that a multilink connection can use • You can also set Bandwidth Allocation Protocol (BAP) policies ▫ Determine BAP usage and specify when extra BAP lines are dropped • By default, multilink and BAP are disabled ▫ Multilink and BAP must be enabled for the multilink properties of the profile to be enforced Policy Settings • Four encryption options available in the Encryption tab: Dial-up PPTP-based VPN Encryption Type L2TP/IPSec VPN Encryption Type 40-bit key 56-bit DES Strong Encryption (MPPE 56-Bit) 56-bit key 56-bit DES Strongest Encryption (MPPE 128-Bit) 168-bit 3DES Basic Encryption (MPPE 40-Bit) No Encryption 128-bit key Authentication Protocols • Challenge Handshake Authentication Protocol (CHAP) ▫ A generic authentication method that offers encryption of authentication data through the MD5 hashing scheme ▫ CHAP provides compatibility with non-Microsoft clients ▫ The group policy that is applied to accounts using this authentication method must be configured to store passwords using reversible encryption ▫ Passwords must be reset after this new policy is applied ▫ It does not support encryption of connection data Authentication Protocols • Extensible Authentication Protocol-Message Digest 5 Challenge Handshake Authentication Protocol (EAP-MD5 CHAP) ▫ Supports encryption of authentication data through the MD5 hashing scheme ▫ It does not support the encryption of connection data ▫ Provides compatibility with non-Microsoft clients, such as those running Mac OS X Authentication Protocols • MS-CHAP v1 ▫ A one-way authentication method that offers encryption of both authentication data and connection data ▫ The same cryptographic key is used in all connections. MS-CHAP v1 supports older Windows clients, such as Windows 95 and Windows 98 Authentication Protocols • MS-CHAP v2 ▫ A mutual authentication method that offers encryption of both authentication data and connection data ▫ A new cryptographic key is used for each connection and each transmission direction ▫ MS-CHAP v2 is enabled by default in Windows 2000, Windows XP, Windows Server 2003, and Windows Server 2008 Authentication Protocols • EAP-TLS ▫ A certificate-based authentication that is based on EAP ▫ Typically used in conjunction with smart cards ▫ Supports encryption of both authentication data and connection data ▫ The remote access server must be a member of a domain Stand-alone servers do not support EAP-TLS Authentication Protocols • Shiva Password Authentication Protocol (SPAP) ▫ A weakly encrypted authentication protocol that offers interoperability with Shiva remote networking products ▫ SPAP does not support the encryption of connection data • Password Authentication Protocol (PAP) ▫ A generic authentication method that does not encrypt authentication data User credentials are sent over the network in plaintext ▫ PAP does not support the encryption of connection data • Unauthenticated access ▫ Allows remote access connections to connect without submitting credentials Authentication Protocols • See Table 5-2 on Page 120 for authentication requirement Accounting • By default, all remote access attempts are logged to text files ▫ C:\Windows\system32\LogFiles directory • You can also configure logging to a SQL DB for better reporting and event correlation 802.1X • 802.1X is port-based ▫ It can allow or deny access on the basis of a physical port or a logical port Wall jack using an Ethernet cable Wireless access point using the WiFi cards 802.1X Components • Supplicant ▫ The device that is seeking access to the network • Authenticator ▫ The component that requests authentication credentials from supplicants ▫ Forwards the supplicant’s credentials to the Authentication Server (AS) The port on a switch for a wired connection or a wireless access point • Authentication Server (AS) ▫ Verifies the supplicant’s authentication credentials ▫ Required Network Policy Server role or thirdparty RADIUS servers Assignment • Summarize the chapter in your own word ▫ At least 75 words ▫ Due BEFORE class start on Thursday • Lab 5 ▫ Due BEFORE class start on Monday