1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.

Slides:



Advertisements
Similar presentations
1 Chapter 2: Networking Protocol Design Designs That Include TCP/IP Essential TCP/IP Design Concepts TCP/IP Data Protection TCP/IP Optimization.
Advertisements

Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
Module 5: Configuring Access for Remote Clients and Networks.
SCSC 455 Computer Security Virtual Private Network (VPN)
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
1 Configuring Virtual Private Networks for Remote Clients and Networks.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 11: Planning Network Access.
Module 10: Configuring Virtual Private Network Access for Remote Clients and Networks.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 14: Troubleshooting Remote Connections.
Hands-On Microsoft Windows Server 2003 Administration Chapter 11 Administering Remote Access Services.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
70-270, MCSE/MCSA Guide to Installing and Managing Microsoft Windows XP Professional and Windows Server 2003 Chapter Twelve Implementing Terminal.
Chapter 8: Configuring Network Connectivity. Installing Network Adapters Network adapter cards connect a computer to a network. Installation –Plug and.
MCITP Guide to Microsoft Windows Server 2008 Server Administration (Exam #70-646) Chapter 10 Configuring Remote Access.
Windows 2000 Remote Access. Remote Access Overview With Windows 2000 remote access, remote access clients connect to remote access servers and are transparently.
VPN – Virtual Private Networking. VPN A Virtual Private Network (VPN) connects the components of one network over another network. VPNs accomplish this.
Remote Networking Architectures
Virtual Private Network (VPN) © N. Ganesan, Ph.D..
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
VPN TUNNELING PROTOCOLS PPTP, L2TP, L2TP/IPsec Ashkan Yousefpour Amirkabir University of Technology.
Overview of Routing and Remote Access Service (RRAS) When RRAS was implemented in Microsoft Windows NT 4.0, it added support for a number of features.
Module 11: Supporting Remote Users. Overview Establishing Remote Access Connections Connecting to Virtual Private Networks Configuring Authentication.
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 14 Remote Access.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
Virtual Private Networks (Tunnels). When Are VPN Tunnels Used? VPN with PPTP tunnel Used if: All routers support VPN tunnels You are using MS-CHAP or.
Virtual Private Networks Alberto Pace. IT/IS Technical Meeting – January 2002 What is a VPN ? u A technology that allows to send confidential data securely.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 23 Virtual Private Networks (VPNs)
Windows Server 2008 Chapter 9 Last Update
Guide to Operating System Security Chapter 9 Web, Remote Access, and VPN Security.
Configuring Routing and Remote Access(RRAS) and Wireless Networking
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
Chapter 12 Chapter 12: Remote Access and Virtual Private Networks.
Module 8: Configuring Virtual Private Network Access for Remote Clients and Networks.
Module 9: Planning Network Access. Overview Introducing Network Access Selecting Network Access Connection Methods Selecting a Remote Access Policy Strategy.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
Chapter 13 – Network Security
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
11 SECURING COMMUNICATIONS Chapter 7. Chapter 7: SECURING COMMUNICATIONS2 CHAPTER OBJECTIVES  Explain how to secure remote connections.  Describe how.
11.59 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
70-411: Administering Windows Server 2012
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
Module 8: Designing Network Access Solutions. Module Overview Securing and Controlling Network Access Designing Remote Access Services Designing RADIUS.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
Module 11: Remote Access Fundamentals
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Point-to-Point Tunneling Protocol [PPTP] Team: Invincibles Deepak Tripathi Habibeh Deyhim Karthikeyan Gopal Satish Madiraju Tusshar RakeshNLN.
11.59 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
Module 5: Configuring Access for Remote Clients and Networks.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
Page 1 TCP/IP Networking and Remote Access Lecture 9 Hassan Shuja 11/23/2004.
Network access security methods Unit objective Explain the methods of ensuring network access security Explain methods of user authentication.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network, Enhanced Chapter 11: Internet Authentication Service.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
Authentication Protocols Natalie DeKoker, Lindsay Haley, Jordan Lunda, Matty Ott.
Configure and Security Remote Acess. Chapter 8 Advance Computer Network Lecture Sorn Pisey
Windows Vista Configuration MCTS : Advanced Networking.
Virtual Private Networks
Module 9: Configuring Network Access
Virtual Private Network (VPN)
Virtual Private Network
Microsoft Windows NT 4.0 Authentication Protocols
Configuring and Troubleshooting Routing and Remote Access
Virtual Private Network (VPN)
Goals Introduce the Windows Server 2003 family of operating systems
Chapter 12: Remote Access and Virtual Private Networks
Presentation transcript:

1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft Challenge Handshake Authentication Protocol (MS-CHAP) Shiva Password Authentication Protocol (SPAP) Point-to-Point Tunneling Protocol (PPTP)

2 Microsoft Windows 2000 Authentication Protocols Support the Windows NT 4.0 authentication protocols Extensible Authentication Protocol (EAP) Remote Authentication Dial-In User Service (RADIUS) Internet Protocol Security (IPSec) Layer Two Tunneling Protocol (L2TP) Bandwidth Allocation Protocol (BAP)

3 Extensible Authentication Protocol (EAP) Is an extension to the Point-to-Point protocol (PPP) Works with dial-up, PPTP, and L2TP clients Allows arbitrary authentication mechanisms to validate a dial-in connection Supports authentication by using generic token cards, MD5-CHAP, and TLS Allows vendors to supply new client and server authentication modules

4 Remote Authentication Dial- In User Service (RADIUS) RADIUS provides Remote user authentication that is vendor- independent. Scaleable authentication designs for performance. Fault-tolerant designs for reliability. Windows 2000 can act as a RADIUS client or server.

5 Windows 2000 Can Act as a RADIUS Client A RADIUS client Is typically an ISP dial-up server Receives authentication requests Forwards the requests to a RADIUS server A Windows 2000 RADIUS client Can also forward accounting information Is configured on the remote access server’s Securities tab

6 Windows 2000 Can Act as a RADIUS Server A RADIUS server validates the RADIUS client request. Windows 2000 uses Internet Authentication Services (IAS) to perform authentication. IAS stores accounting information from RADIUS clients in log files. IAS is one of the optional components you can add.

7 Internet Protocol Security (IPSec) Consists of a set of security protocols and cryptographic protection services Ensures secure private communications over IP networks Provides aggressive protection against private network and Internet attacks Negotiates a security association (SA) with clients that acts as a private key to encrypt the data flow

8 Layer Two Tunneling Protocol Similar to PPTP Creates an encrypted tunnel Does not provide encryption Works with encryption technologies such as IPSec

9 Differences Between L2TP and PPTP L2TP does not require an IP-based transit network. L2TP supports header compression. L2TP supports tunnel authentication. L2TP uses IPSec for encryption and PPTP uses PPP encryption.

Bandwidth Allocation Protocol (BAP) and Bandwidth Allocation Control Protocol (BACP) Dynamically add or drop links on demand Are PPP control protocols Provide bandwidth on demand 10

11 Allowing Inbound Dial-Up Connections

12 Configuring Devices for Incoming Connections

13 Allowing Virtual Private Connections Click Next on the Devices For Incoming Connections page. Select either to allow or not allow virtual private connections on the Incoming Virtual Private Connection page.

14 Specifying Users and Callback Options

15 Selecting Networking Components Choose the networking components to enable for incoming calls. Install additional networking components.

16 Dial-Up Connections

17 Connections to a Virtual Private Network (VPN) Create a VPN by using tunneling protocols such as PPTP or L2TP. Create secure connections across an untrusted network. Select Connect To A Private Network Through The Internet. Decide if you want to select Automatically Dial This Initial Connection. Enter the host name or IP address to which you are connecting. Specify who can use the connection.

18 Direct Connection to Another Computer Through a Cable Select Connect Directly To Another Computer. Select whether your computer will be the host or the guest for the connection. Select the port that is connected to the other computer. Specify the users who can use this connection. Decide if you want a shortcut icon on your desktop.