CN1260 Client Operating System Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+

Slides:



Advertisements
Similar presentations
Encrypting Wireless Data with VPN Techniques
Advertisements

Security in Wireless Networks Juan Camilo Quintero D
1 Chapter 2: Networking Protocol Design Designs That Include TCP/IP Essential TCP/IP Design Concepts TCP/IP Data Protection TCP/IP Optimization.
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
4.1 Configuring Network Access Components of a Network Access Services Infrastructure What is the Network Policy and Access Services Role? What is Routing.
Module 5: Configuring Access for Remote Clients and Networks.
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
1 Configuring Virtual Private Networks for Remote Clients and Networks.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 11: Planning Network Access.
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
CN1176 Computer Support Kemtis Kunanuraksapong MSIS with Distinction MCT, MCTS, MCDST, MCP, A+
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 14: Troubleshooting Remote Connections.
Hands-On Microsoft Windows Server 2003 Administration Chapter 11 Administering Remote Access Services.
70-270, MCSE/MCSA Guide to Installing and Managing Microsoft Windows XP Professional and Windows Server 2003 Chapter Twelve Implementing Terminal.
Chapter 8: Configuring Network Connectivity. Installing Network Adapters Network adapter cards connect a computer to a network. Installation –Plug and.
Chapter 8: Configuring Network Connectivity. 2/24 Objectives Learn how to configure a network adapter Learn about the Network and Sharing Center Learn.
Remote Networking Architectures
Virtual Private Network (VPN) © N. Ganesan, Ph.D..
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 14 Remote Access.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 9 Network Policy and Access Services in Windows Server 2008.
Virtual Private Networks (Tunnels). When Are VPN Tunnels Used? VPN with PPTP tunnel Used if: All routers support VPN tunnels You are using MS-CHAP or.
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
Using Mobile Computers Lesson 12. Objectives Understand wireless security Configure wireless networking Use Windows mobility controls Synchronize data.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Troubleshooting Mobile Connectivity Problems Lesson 4.
Configuring Routing and Remote Access(RRAS) and Wireless Networking
CN2140 Server II Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
Chapter 20: Getting from the Office to the Road: VPNs BAI617.
Module 8: Configuring Virtual Private Network Access for Remote Clients and Networks.
Module 9: Planning Network Access. Overview Introducing Network Access Selecting Network Access Connection Methods Selecting a Remote Access Policy Strategy.
Configuring Mobile Computing and Remote Access
Module 6: Configuring and Troubleshooting Routing and Remote Access
CN2140 Server II Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
11.59 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
CN1260 Client Operating System Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
Configuring and Troubleshooting Remote Access
70-411: Administering Windows Server 2012
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—-3-1 Wireless LANs Implementing a WLAN.
CN1260 Client Operating System Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
1 Week 6 – NPS and RADIUS Install and Configure a Network Policy Server Configure RADIUS Clients and Servers NPS Authentication Methods Monitor and Troubleshoot.
Module 8: Designing Network Access Solutions. Module Overview Securing and Controlling Network Access Designing Remote Access Services Designing RADIUS.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
Module 11: Remote Access Fundamentals
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
11.59 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
Page 1 TCP/IP Networking and Remote Access Lecture 9 Hassan Shuja 11/23/2004.
1 Week #5 Routing and NAT Network Overview Configuring Routing Configuring Network Address Translation Troubleshooting Routing and Remote Access.
Lesson 10: Configuring Network Settings MOAC : Configuring Windows 8.1.
Using Routing and Remote Access Chapter Five. Exam Objectives in this Chapter:  Plan a routing strategy Identify routing protocols to use in a specified.
CN1260 Client Operating System Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
Configure and Security Remote Acess. Chapter 8 Advance Computer Network Lecture Sorn Pisey
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Wireless Security.
Windows Vista Configuration MCTS : Advanced Networking.
Using Mobile Computers Lesson 12. Objectives Understand wireless security Configure wireless networking Use Windows mobility controls Synchronize data.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY IT375 Window Enterprise Administration Course Name – IT Introduction to Network Security Instructor.
CN2668 Routers and Switches Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
Module Overview Overview of Wireless Networks Configure a Wireless Network.
Virtual Private Networks
Module 9: Configuring Network Access
Microsoft Windows NT 4.0 Authentication Protocols
Configuring and Troubleshooting Routing and Remote Access
Server-to-Client Remote Access and DirectAccess
Presentation transcript:

CN1260 Client Operating System Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+

Agenda Chapter 4: Troubleshooting Mobile Connectivity Problems Quiz Exercise

Wireless Networks Most wireless networks : b, g, or n ▫All standard are backward compatibility except a ▫See Table 4-1 on Page 82

Wireless Operating Modes Wireless adapters can run in one of two operating modes: ▫Independent basic service set (IBSS)  Also known as ad hoc ▫Extended service set (ESS)  Also known as infrastructure, where hosts connects to a wireless access point using a wireless adapter

Wireless Security Wired Equivalent Privacy (WEP) ▫Very weak Wi-Fi Protected Access (WPA) or WPA2 ▫Temporal Key Integrity Protocol (TKIP) ▫WPA2 : Advanced Encryption Standard (AES) ▫Rotate the keys and change the way keys are derived ▫Personal mode and Enterprise mode

Personal Mode Both WPA and WPA2 can run in both personal and enterprise mode Personal mode ▫Designed for home and small office networks  Authentication via a pre-shared key or password  The session keys are changed often and handled in the background

Enterprise Mode Authentication using IEEE 802.1X and Extensible Authentication Protocol (EAP) ▫802.1X provides an authentication framework for wireless LANs, allowing a user to be authenticated by a central authority such as a RADIUS server Enterprise mode uses two sets of keys: the session keys and group keys ▫Both sets of keys are generated dynamically and are rotated to help safeguard the integrity of keys over time. ▫The encryption keys could be supplied through a certificate or smart card

Configuring Wireless Adapters Identified by the service set identifier, or SSID If the SSID is not broadcasted, you will have to enter the SSID manually ▫The SSID can be up to 32 characters long ▫See Figure 4-1 on Page 84

Using Group Policies and Scripts With group policies ▫Configure a client to automatically connect to wireless network ▫Keep the computer from connecting to other wireless networks Scripts or netsh command ▫Carry the configuration information using USB flash drives

Bootstrap Wireless Profile Can be created on the wireless client ▫Authenticates the computer to the wireless network ▫Connects to the network ▫Attempts to authenticate to the domain Authentication can be done either by using ▫Username and password combination ▫Security certificates from a public key infrastructure (PKI)

Wireless Connection Problems If you don’t see any wireless networks, check: ▫The wireless device is on ▫The wireless device is enabled in the Network and Sharing Center ▫The correct wireless device driver is installed and enabled

Wireless Connection Problems (Cont.) Signal Strength ▫The distance from access point cause the slower network performance If connection drops frequently or poor performance, you should: ▫Check to make sure the wireless access point and wireless device are transmitting at maximum power ▫Try to move closer ▫Try adjusting or replace the antenna of the wireless access point

Connectivity Problems If you cannot connect to a wireless network but you could before ▫Check the settings, especially the encryption algorithm and the key ▫Check if the access point is powered on and working properly If you maintain steady signal strength and have intermittent connections ▫Check for interference from another device such as radio or any other network device

Remote Access Remote access server (RAS) ▫Enables users to connect remotely using various protocols and connection types Virtual private network (VPN) ▫Links two computers through a wide-area network such as the Internet ▫The data will be encapsulated and encrypted ▫See Figure 4-3 on Page 90

VPN Connection Routing and Remote Access Server (RRAS) ▫Under Network Policy and Access Service server role Servers can receive requests from remote access users located on the Internet ▫Authenticate these users ▫Authorize the connection requests ▫Either block the requests or route the connections to private internal network segments

VPN Connection (Cont.) The five types of tunneling protocols: ▫Point-to-Point Tunneling Protocol (PPTP)  Weak encryption technology ▫Internet Protocol Security (IPSec)  Authenticating and encrypting each IP packet of a data stream ▫Layer 2 Tunneling Protocol (L2TP)  Used with IPSec to provide security  A computer certificate or a preshared key is required

VPN Connection (Cont.) The five types of tunneling protocols: ▫Internet Key Exchange version 2 (IKEv2)  It uses IPSec for encryption while supporting VPN Reconnect (also called Mobility)  Enables VPN to reestablish if the line was dropped ▫Secure Socket Tunneling Protocol (SSTP)  Uses HTTPS protocol over TCP port 443 ▫Both IKEv2 and SSTP does not require a client computer certificates or preshared key

RADIUS Remote Authentication Dial In User Service ▫a networking protocol that provides centralized authentication, authorization, and accounting management for computers to connect and use a network service

VPN Authentication Password Authentication Protocol (PAP) ▫Uses plain text (unencrypted passwords) ▫The least secure authentication Challenge Handshake Authentication Protocol (CHAP) ▫A challenge-response authentication ▫Uses md5 hashing scheme to encrypt the response Microsoft CHAP version 2 (MS-CHAP v2) ▫Provides two-way authentication (mutual authentication) Extensible Authentication Protocol (EAP-MS-CHAPv2) ▫A universal authentication framework  Allows third-party vendors to develop custom authentication schemes  Provides mutual authentication methods that support password-based user or computer authentication.

Split Tunneling By default the “Use Default Gateway on the Remote Network” option is enabled ▫Means split tunneling is not enabled ▫All traffics will go through ‘corporate’ server If “Use Default Gateway on Remote Network” option is unchecked ▫All traffic that is not part of the vpn will use your own internet connection

Troubleshooting VPN Connection Make sure that the client computer can connect to the Internet Verify the server name or IP address Verify that the user has the correct digital certificate and that the digital certificate is valid Verify the user credentials including the domain name if necessary ▫Check authentication and encryption methods Verify the user is authorized for remote access by checking the user properties or by checking the network policies

Troubleshooting VPN Connection If you are using LT2P with IPSec going through a NAT device ▫Make sure that you have the proper registry settings Make sure that the firewall is configured to allow the VPN connection Verify that you have enough PPTP or L2TP ports available to handle the new connection

Troubleshooting VPN Connection Issues after successful connection ▫Verify that routing is configured properly by pinging a remote host through the VPN ▫Verify that you have the proper name resolution for internal resources ▫Verify that the VPN connection has the proper IP configuration including that there are enough DHCP addresses available

DirectAccess A new feature introduced with Windows 7 and Windows Server 2008 R2 Provides seamless intranet connectivity to DirectAccess client computers when they are connected to the Internet ▫DirectAccess connections are automatically established ▫IPSec and Internet Protocol version 6 (IPv6) are required

DirectAccess (Cont.) On server side, two NICs are needed ▫One that is connected directly to the Internet ▫One that is connected to the intranet ▫DirectAccess servers must be a member of an AD DS domain Client must use Windows 7 Enterprise or Windows 7 Ultimate and be members of an AD DS domain

DirectAccess (Cont.) On the DirectAccess server ▫At least two consecutive, public IPv4 addresses assigned to the network adapter are required At least one domain controller and DNS server that is running Windows Server 2008 R2 A public key infrastructure (PKI) to issue computer certificates, and optionally, smart card certificates for smart card authentication and health certificates for NAP

Assignment Submit these before class over on Thursday ▫Fill in the blank ▫Multiple Choice ▫True / False Submit these before class start on Monday ▫Lab 4