Chapter 12: Remote Access and Virtual Private Networks

Slides:



Advertisements
Similar presentations
1 Chapter 2: Networking Protocol Design Designs That Include TCP/IP Essential TCP/IP Design Concepts TCP/IP Data Protection TCP/IP Optimization.
Advertisements

Module 5: Configuring Access for Remote Clients and Networks.
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 11: Planning Network Access.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 14: Troubleshooting Remote Connections.
Hands-On Microsoft Windows Server 2003 Administration Chapter 11 Administering Remote Access Services.
70-270, MCSE/MCSA Guide to Installing and Managing Microsoft Windows XP Professional and Windows Server 2003 Chapter Twelve Implementing Terminal.
Chapter 8: Configuring Network Connectivity. Installing Network Adapters Network adapter cards connect a computer to a network. Installation –Plug and.
MCITP Guide to Microsoft Windows Server 2008 Server Administration (Exam #70-646) Chapter 10 Configuring Remote Access.
Remote Networking Architectures
Network Address Translation, Remote Access and Virtual Private Networks BSAD 146 Dave Novak Sources: Network+ Guide to Networks, Dean 2013.
Virtual Private Network (VPN) © N. Ganesan, Ph.D..
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Overview of Routing and Remote Access Service (RRAS) When RRAS was implemented in Microsoft Windows NT 4.0, it added support for a number of features.
Module 11: Supporting Remote Users. Overview Establishing Remote Access Connections Connecting to Virtual Private Networks Configuring Authentication.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
Virtual Private Networks (Tunnels). When Are VPN Tunnels Used? VPN with PPTP tunnel Used if: All routers support VPN tunnels You are using MS-CHAP or.
Windows Server 2008 Chapter 9 Last Update
Guide to Operating System Security Chapter 9 Web, Remote Access, and VPN Security.
Configuring Routing and Remote Access(RRAS) and Wireless Networking
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
Chapter 12 Chapter 12: Remote Access and Virtual Private Networks.
Module 9: Planning Network Access. Overview Introducing Network Access Selecting Network Access Connection Methods Selecting a Remote Access Policy Strategy.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
11.59 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
70-411: Administering Windows Server 2012
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
Module 8: Designing Network Access Solutions. Module Overview Securing and Controlling Network Access Designing Remote Access Services Designing RADIUS.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Point-to-Point Tunneling Protocol [PPTP] Team: Invincibles Deepak Tripathi Habibeh Deyhim Karthikeyan Gopal Satish Madiraju Tusshar RakeshNLN.
11.59 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
Page 1 TCP/IP Networking and Remote Access Lecture 9 Hassan Shuja 11/23/2004.
Network Infrastructure Microsoft Windows 2003 Network Infrastructure MCSE Study Guide for Exam
Using Routing and Remote Access Chapter Five. Exam Objectives in this Chapter:  Plan a routing strategy Identify routing protocols to use in a specified.
Remote Access and Long-Distance Communications. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Typical Telephone.
Chapter Eight Internetworking with Remote Access.
Configure and Security Remote Acess. Chapter 8 Advance Computer Network Lecture Sorn Pisey
Windows Vista Configuration MCTS : Advanced Networking.
Virtual Private Networks
Top-Down Network Design Chapter Eleven Selecting Technologies and Devices for Enterprise Networks Copyright 2010 Cisco Press & Priscilla Oppenheimer.
MTA Network Fundamental Cram Sesion
Chapter 11: Enterprise and Distributed Networks
Chapter Objectives In this chapter, you will learn:
Network Access and Transmission Methods
Module 9: Configuring Network Access
Instructor Materials Chapter 2: Point-to-Point Connections
Virtual Private Networks
WAN Transport Methods Chapter 7.
Virtual Private Network (VPN)
Configuring Routing and Remote Access (RRAS) and Wireless Networking
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network, Enhanced Chapter 1: Networking Overview.
Microsoft Windows NT 4.0 Authentication Protocols
Understand Wide Area Networks (WANs)
CONNECTING TO THE INTERNET
Remote Access Lecture 2.
Configuring and Troubleshooting Routing and Remote Access
Examining Network Protocols
Chapter 2: Point-to-Point Connections
Network+ Guide to Networks 6th Edition
Virtual Private Network (VPN)
Server-to-Client Remote Access and DirectAccess
Goals Introduce the Windows Server 2003 family of operating systems
Cengage Learning: Computer Networking from LANs to WANs
EEC4113 Data Communication & Multimedia System Chapter 1: Introduction by Muhazam Mustapha, July 2010.
Virtual Private Networks (VPN)
Topic 12: Virtual Private Networks
Presentation transcript:

Chapter 12: Remote Access and Virtual Private Networks

Key Terms access server – A device that connects several different types of communication devices and telecommunication lines to a network, providing network routing for these types of communications. aggregate link – Linking two or more communications channels, such as ISDN channels so that they appear as one channel, but with the combined speed of all channels in the aggregate. Bandwidth Allocation Control Protocol (BACP) – Similar to BAP, but is able to select a preferred client when two or more clients vie for the same bandwidth. Bandwidth Allocation Protocol (BAP) – A protocol that works with Multilink in Windows 2000 Server that enables the bandwidth or speed of a remote connection to be allocated on the basis of the needs of an application, with the maximum allocation equal to the maximum speed of all channels aggregated via Multilink. bits per second (bps) – Number of binary bits (0s or 1s) sent in one second, a measure used to gauge network, modem, and telecommunications speeds. callback security – Used for remote communications verification, the remote server calls back the accessing workstation to verify the access is from an authorized telephone number. Challenge Handshake Authentication Protocol (CHAP) – An encrypted handshake protocol designed for standard IP- or PPP-based exchange of passwords. It provides a reasonably secure, standard, cross-platform method for sender and receiver to negotiate a connection.

Key Terms CHAP with Microsoft extensions (MS-CHAP) – A Microsoft-enhanced version of CHAP that can negotiate encryption levels and that uses the highly secure RSA RC4 encryption algorithm to encrypt communications between client and host. CHAP with Microsoft extensions version 2 (MS-CHAP v2) – An enhancement of MS-CHAP that provides better authentication and data encryption and that is especially well suited for VPNs. data communications equipment (DCE) – A device that converts data from a DTE, such as a computer, to be transmitted over a telecommunications line. data terminal equipment (DTE) – A computer or computing device that prepares data to be transmitted over a telecommunications line to which it attaches by using a DCE, such as a modem. DHCP Relay Agent – A server or computer that broadcasts IP configuration information between the DHCP server on a network and the client acquiring an address, such for remote connections and when they are on different networks and thus transmissions must go through one or more routers. digital subscriber line (DSL) – A technology that uses advanced modulation technologies on regular telephone lines for high-speed networking at speeds of up to 60 Mbps between subscribers and a telecommunications company.

Key Terms Extensible Authentication Protocol (EAP) – An authentication protocol employed by network clients that use special security devices such as smart cards, token cards, and others that use certificate authentication. frame relay – A WAN communications technology that relies on packet switching and virtual connection techniques to transit at from 56 Kbps to 45 Mbps. Integrated Services Digital Network (ISDN) – A telecommunications standard for delivering data services over digital telephone lines with a current practical limit of 1.536 Mbps and a theoretical limit of 622 Mbps. Internet Authentication Service (IAS) – Used to establish and maintain security for RAS, Internet, and VPN dial-in access and can be employed with RADIUS. IAS can use certificates to authenticate client access. Layer Two Tunneling Protocol (L2TP) – A protocol that transports PPP over a VPN, intranet, or Internet. L2TP works similarly to PPTP, but unlike PPTP, L2TP uses an additional network communications standard, called Layer Two Forwarding, that enables forwarding on the basis of MAC addressing. line device – A DCE such as a modem or ISDN adapter that connects to a telecommunications line.

Key Terms Microsoft Point-to-Point Encryption (MPPE) – A starting to ending point encryption technique that uses special encryption keys varying in length from 40 to 128 bits. modem – A modulator/demodulator that converts a transmitted digital signal to an analog signal for a telephone line. It also converts a received analog signal to a digital signal for use by a computer. Multilink or Multilink PPP – A capability of RAS to aggregate multiple data streams into one logical network connection for the purpose of using more than one modem, ISDN channel, or other communication line in a single logical connection. Password Authentication Protocol (PAP) – A non-encrypted plain-text password authentication protocol. This represents the lowest level of security for exchanging passwords via PPP or TCP/IP. Silva’s PAP (SPAP) is a version that is used for authenticating remote access devices and network equipment manufactured by Silva (now Intel Network Systems, Inc.). Point-to-Point Protocol (PPP) – A widely used remote communication protocol that supports IPX/SPX, NetBEUI, and TCP/IP for point-to-point communication (such as between a remote PC and a Windows 2000 server on a network). Point-to-Point Tunneling Protocol (PPTP) – A remote communication protocol that enables connectivity to a network through the Internet and connectivity through intranets and VPNs. Remote Access Services (RAS) – Microsoft software services that enable off-site workstations to access a Windows 2000 server through telecommunications lines, the Internet, or intranets.

Key Terms Remote Authentication Dial-In User Service (RADIUS) – A protocol and service set up on one RAS or VPN server, such as in a domain when there are multiple RAS or VPN servers to coordinate authentication and to keep track of remote dial-in statistics for all RAS and VPN servers. Serial Line Internet Protocol (SLIP) – An older remote communications protocol that is used by UNIX computers. The modern compressed SLIP (CSLIP) version uses header compression to reduce communications overhead. Shiva’s Password Authentication Protocol (SPAP) – See Password Authentication Protocol. T-carrier – A dedicated leased telephone line that can be used for data communications over multiple channels for speeds of up to 44.736 Mbps. Telephone Application Programming Interface (TAPI) – An interface for communication line devices (such as modems) that provides line device functions, such as call holding, call receiving, call hang-up, and call forwarding. terminal adapter (TA) – Popularly called a digital modem, links a computer or a fax to an ISDN line. Universal Modem Driver – A modem driver standard used on recently developed modems. virtual private network (VPN) – A private network that is like a tunnel through a larger network – such as the Internet, an enterprise network, or both – that is restricted only to designated member clients. X.25 – An older packet-switching protocol for connecting remote networks at speeds up to 2.048 Mbps.

Learning Objectives Explain how remote access and virtual private network (VPN) services work Explain how to implement remote access communications devices and protocols Configure remote access services, security, dial-up connectivity, and client access

Learning Objectives (continued) Configure VPN services, security, dial-up connectivity, and client access Troubleshoot remote access, VPN services, and client connectivity

Early Remote Access Methods An early method for accessing a network, which is still used, is to connect to a workstation through remote access software such as Carbon Copy

Accessing a Workstation Remotely Figure 12-1 Remotely accessing a workstations on a network

Microsoft Remote Access A modern way to access a network remotely is by using Microsoft Remote Access Services (RAS) in Windows 2000 Server

Using RAS Figure 12-2 Remotely accessing a network through Microsoft RAS

Virtual Private Network Virtual private network: A private network that is like a tunnel through a larger network – such as the Internet, an enterprise network, or both – that is restricted only to designated member clients

Planning Tip Use a VPN to save money on modems and telephone lines for remote access to a network

VPN Architecture Figure 12-3 VPN network architecture

Operating Systems Than Can Connect to RAS MS-DOS Windows 3.1 and 3.11 Windows NT (all versions) Windows 95 Windows 98 Windows 2000 Server and Professional

Connection Types Supported by RAS Asynchronous modems Synchronous modems through an access server Null modem connections Regular dial-up telephone lines Leased telecommunications lines, such as T-carrier

Connection Types Supported by RAS (continued) ISDN lines (and digital modems) X.25 lines DSL lines Frame relay lines

T-Carrier T-carrier: A dedicated leased telephone line that can be used for data communications over multiple channels for speeds of up to 44.736 Mbps and beyond Two common varieties of T-carrier are: T-1 at 1.544 Mbps T-3 at 44.736 Mbps

Frame Relay Frame relay: A WAN communications technology that relies on packet switching and virtual connection techniques to transmit at from 56 Kbps to 45 Mbps

ISDN Integrated Services Digital Network (ISDN): A telecommunications standard for delivering data services over digital telephone lines with a current practical limit of 1.536 Mbps and a theoretical limit of 622 Mbps

X.25 An older packet-switching protocol for connecting remote networks at speeds up to 2.048 Mbps

DSL Digital subscriber line (DSL): A technology that uses advanced modulation technologies on regular telephone lines for high-speed networking at speeds of up to 60 Mbps between subscribers and a telecommunications company

Telephony Interfaces RAS supports telephony interfaces that include: Universal Modem Driver: A modem driver standard used on recently developed modems Telephone Application Programming Interface: An interface for communication line devices (such as modems) that provides line device functions, such as call holding, call receiving, call hang-up, and call forwarding

Transport and Remote Communication Protocols RAS supports protocols such as: TCP/IP NWLink NetBEUI PPP PPTP L2TP

Using Modems One of the most common ways to connect through RAS is by using modems either at the RAS server end, the client end, or both Cable TV modems are another possibility, but verify that the end-to-end connections can be made secure

ISDN Connectivity Digital “modems” can be used to connect a RAS server to ISDN, but these are really terminal adapters (TAs) and not modems, because ISDN is digital and does not use modulation/demodulation A design advantage of ISDN is that you can aggregate multiple lines to appear as one super fast connection

Access Server An effective way to connect different telecommunications and WAN media to RAS is through an access server For example, an access server can provide the following types of connectivity: Modems ISDN X.25 T-carrier

Access Server Architecture Figure 12-4 Using an access server

Remote Access Protocols Serial Line Internet Protocol (SLIP): An older remote communications protocol that is used by UNIX computers. The modern compressed SLIP (CSLIP) version uses header compression to reduce communications overhead. Point-to-Point Protocol (PPP): A widely used remote communication protocol that supports IPX/SPX, NetBEUI, and TCP/IP for point-to-point communication.

Table 12-1 SLIP and PPP Compared

Remote Access Protocols (continued) Point-to-Point Tunneling Protocol (PPTP): A remote communication protocol that enables connectivity to a network through the Internet and connectivity through intranets and VPNs

Remote Access Protocols (continued) Layer Two Tunneling Protocol (L2TP): A protocol that transports PPP over a VPN, intranet, or Internet. L2TP works similarly to PPTP, but unlike PPTP, L2TP uses an additional network communications standard, called Layer Two Forwarding, that enables forwarding on the basis of MAC addressing

General RAS Configuration Steps Configure a Windows 2000 server with RAS, including the appropriate protocols Configure a DHCP Relay Agent (if IP addresses are assigned via DHCP) Configure RAS security Configure a dial-up and remote connection Configure RAS on client workstations

Configuring RAS Use the Routing and Remote Access tool to install RAS

Figure 12-5 Configuring routing and RAS Installing RAS Figure 12-5 Configuring routing and RAS

Installing RAS (continued) Figure 12-6 Selecting the option to install RAS

Routing and Remote Access Options

Installing RAS (continued) Figure 12-7 IP address assignment options

RAS Installation Tip If you configure RAS for AppleTalk, then users access RAS through the Guest account, which cannot have a password

RAS Properties You can configure RAS properties after RAS is installed by right-clicking the RAS server in the tree of the Routing and Remote Access tool and then clicking Properties

Viewing a RAS Server’s Properties Figure 12-8 RAS server properties

DHCP Relay Agent If you configure RAS to use DHCP to assign IP addresses, then you must configure a DHCP Relay Agent: Double-click the RAS server in the tree of the Routing and Remote Access tool Click IP Routing in the tree Right-click DHCP Relay Agent and click Properties Enter the IP address of the RAS server, click Add, and then click OK

Multilink If you plan to use an aggregated connection, such as for ISDN or multiple modems, configure Multilink and Bandwidth Allocation Protocol in the RAS Properties PPP tab

Multilink and BAP Multilink: A capability of RAS to aggregate multiple data streams into one logical network connection for the purpose of using more than one modem, ISDN channel, or other communication line in a single logical connection Bandwidth Allocation Protocol (BAP): A protocol that works with Multilink in Windows 2000 Server that enables the bandwidth or speed of a remote connection to be allocated on the basis of the needs of an application, with the maximum allocation equal to the maximum speed of all channels aggregated via Multilink

BACP Bandwidth Allocation Control Protocol: Similar to BAP, but BACP is able to select a preferred client when two or more clients vie for the same bandwidth

Configuring Multilink and BAP/BACP Figure 12-9 Configuring Multilink and BAP

Security Set at the Client Set up security on the client’s account properties via the Dial-in tab, including whether to use a remote access policy for security and callback security

Callback Options No Callback: access is allowed on the first dial-up attempt Set By Caller: the server calls back a number provided by the remote computer Always Callback to: the server calls back a number that has already been entered in the Dial-in tab

Configuring Dial-in Security Figure 12-10 Configuring dial-in security for a user account

Remote Access Policies Configure remote access policies and a profile to secure the RAS server and to manage access including: Dial-in constraints IP address assignment rules Authentication Encryption Allowing Multilink connections

Configuring Remote Access Policies Figure 12-11 Granting remote access as a RAS policy

Authentication Options There are several authentication options that can be set in a remote access policies profile: Extensible Authentication Protocol (EAP): An authentication protocol employed by network clients that use special security devices such as smart cards, token cards, and others that use certificate authentication

Authentication Options (continued) Challenge Handshake Authentication Protocol (CHAP): An encrypted handshake protocol designed for standard IP- or PPP-based exchange of passwords. It provides a reasonably secure, standard, cross-platform method for sender and receiver to negotiate a connection. CHAP with Microsoft extensions (MS-CHAP): A Microsoft-enhanced version of CHAP that can negotiate encryption levels and that uses the highly secure RSA RC4 encryption algorithm to encrypt communications between client and host

Authentication Options (continued) CHAP with Microsoft extensions version 2 (MS-CHAP v2): An enhancement of MS-CHAP that provides better authentication and data encryption and that is especially well suited for VPNs Password Authentication Protocol (PAP): A non-encrypted plain-text password authentication protocol. This represents the lowest level of security for exchanging passwords via PPP or TCP/IP

Authentication Options (continued) Silva’s Password Authentication Protocol (SPAP): A version of PAP that is used for authenticating remote access devices and network equipment manufactured by Silva (now Intel Network Systems, Inc.)

Configuring Authentication Figure 12-12 Configuring authentication

Encryption Options The RAS encryption options incorporate IPSec and Microsoft Point-to-Point Encryption (MPPE) MPPE: A starting to ending point encryption technique that uses special encryption keys varying in length from 40 to 128 bits

Encryption Selections No Encryption: Clients do not employ data encryption Basic: Intended for clients using 40-bit encryption key MPPE or IPSec Strong: Intended for clients using 56-bit encryption key MPPE or IPSec

Encryption Note Originally the beta version of Windows 2000 Server included strongest encryption for 128-key MPPE or IPSec encryption, but this option is omitted in the first release of Windows 2000 Server. Expect strongest encryption to be included later in an update.

Dial-in and VPN Remote Access Tabs

Configuring a Dial-up Connection for a RAS Server Use the Network and Dial-up Connections tool to configure a new dial-up connection for a RAS server

Creating a New Connection Figure 12-13 Creating a new connection

General Steps to Configure a VPN Set up the network connectivity, such as through a WAN adapter, access server, or router Install the Routing and Remote Access Service, configuring it as a VPN server Establish the remote access policies and profile, including setting up EAP authentication Configure the number of PPTP and L2TP ports

Design Tip If you select to use a static pool of IP addresses when you install the VPN server, the upper limit of addresses that can be assigned is 253

Figure 12-14 Providing a range of addresses for a VPN server Static Address Set Up Figure 12-14 Providing a range of addresses for a VPN server

Configuring VPN Server Remote Access Policies Configure VPN remote access policies and a profile using the same steps as for configuring a RAS server

Configuring Ports Configure the number of ports to equal those available through the WAN connection

Steps for Configuring Ports To configure the number of ports: Right-click Ports in the tree under the server in the Routing and Remote Access tool Click Properties Double-click WAN Miniport (PPTP) and set the number of ports Double-click WAN Miniport (L2TP) and set the number of ports

Steps for Configuring Ports (continued) Figure 12-15 Configuring the number of ports

Hardware Troubleshooting Tips for RAS and VPN Servers Use the Add/Remove Hardware tool or the Device Manager to test modems and WAN adapters Use the Network and Dial-up Connections tool to check dial-up and WAN connections Make sure access servers are working Make sure modem lines are properly connected and working

Software Troubleshooting Tips for RAS and VPN Servers Make sure that the Remote Access Auto Connection Manager and Remote Access Connection Manager services are started Make sure the RAS or VPN server is enabled Use the Ports option to check the status of ports Make sure all IP parameters are properly configured

RAS and VPN Client Troubleshooting Tips Check the dial-up networking and RAS setup on the client Make sure that clients are using the right protocols Check the dial-in security on the client’s user account Check the client’s modem to make sure it is working and set for compatible communications with the server

Chapter Summary RAS and VPN servers enable clients to remotely access Windows 2000 Server, such as those who telecommute Remote access can be configured through many types of WAN connectivity, such as dial-up telephone lines, high-speed lines, Internet connections, and routers

Chapter Summary RAS and VPN servers are compatible with remote access protocols such as PPP, PPTP, and L2TP Manage RAS and VPN servers using remote access policies and profiles