Gavin Carius Architect Microsoft Services SVR311.

Slides:



Advertisements
Similar presentations
The System Center Family Microsoft. Mobile Device Manager 2008.
Advertisements

WMS02: Direct Access Always Connected: Death of the VPN
Scott Roberts Lead Program Manager Microsoft Session Code: WSV320.
Faith Allington Program Manager Microsoft Corporation Session Code: WSV304.
Microsoft Windows 7 Security Ronen Gottlib, CISSP Information Security Lead Microsoft.
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
Unleashing the Power of Ubiquitous Connectivity with IPv6 Sandeep K. Singhal, Ph.D Director of Program Management Windows Networking.
Dan Stolts IT Pro Evangelist US DPE - North East Microsoft Corporation
At their deskAt their desk In a branchIn a branch On the roadOn the road Protect data & PCsProtect data & PCs Built on Windows Vista foundation Easy.
Security and Policy Enforcement Mark Gibson Dave Northey
Threat Management Gateway 2010 Questo sconosciuto? …ancora per poco! Manuela Polcaro Security Advisor.
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
Windows 7 Training Microsoft Confidential. Windows ® 7 Compatibility Version Checking.
Understanding Active Directory
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
Enabling Secure Always-On Connectivity [Name] Microsoft Corporation.
WSV404 DirectAccess Server (Server 2008 R2) DirectAccess Client (Windows 7) Internet Native IPv6 6to4 Teredo IP-HTTPS Tunnel over IPv4 UDP, HTTPS,
Khaja Ahmed Architect Windows Networking Microsoft Corporation.
Windows Azure Networking & Active Directory Nasir (Muhammad Nasiruddin) Developer Evangelist - Azure Microsoft Corporation
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Windows ® Powered NAS. Agenda Windows Powered NAS Windows Powered NAS Key Technologies in Windows Powered NAS Key Technologies in Windows Powered NAS.
Identity and Access Management Business Ready Security Solutions.
Purpose Intended Audience and Presenter Contents Proposed Presentation Length Intended audience is all distributor partners and VARs Content may be customized.
Clinic Security and Policy Enforcement in Windows Server 2008.
Session 1.
Built by Developers for Developers…. © 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names.
Damian Leibaschoff Support Escalation Engineer Microsoft Becky Ochs Program Manager Microsoft.
Using the WDK for Windows Logo and Signature Testing Craig Rowland Program Manager Windows Driver Kits Microsoft Corporation.
Threat Management Gateway 2010 Questo sconosciuto? …ancora per poco! Manuela Polcaro Security Advisor.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
Module 9: Configuring IPsec. Module Overview Overview of IPsec Configuring Connection Security Rules Configuring IPsec NAP Enforcement.
Module 11: Remote Access Fundamentals
Future of the Server Room Tour. Ottawa Montreal Calgary Vancouver Toronto Future of Your Server Room Three Pillars of Windows Server 2008 Virtualization.
Identity Solution in Baltic Theory and Practice Viktors Kozlovs Infrastructure Consultant Microsoft Latvia.
Sudarshan Yadav Sr. Program Manager, Microsoft
Shai Tirosh Windows Server Regional Director artNET Experts.
Enabling Secure Always-On Connectivity [Name] Microsoft Corporation.
Adam Hall Technology Strategist Gavin Bennett Systems Engineer – Citrix NZ Session Code: SVR309.
Next Generation Remote Access Always On Seamless and Transparent Bi-Directional Connectivity NOT a VPN!
Providing seamless, secure access to enterprise resources from anywhere.
1 Week #5 Routing and NAT Network Overview Configuring Routing Configuring Network Address Translation Troubleshooting Routing and Remote Access.
Paul Cooke - CISSP Director Microsoft Session Code: CLI322.
Uri Lichtenfeld Security Specialist Certified Security Solutions – Microsoft Partner SESSION CODE: SIA312.
Dawie Human Infrastructure Architect Inobits Consulting Session Code: WSV320.
Connect with life Ravi Sankar Technology Evangelist | Microsoft Corporation Ravisankar.spaces.live.com/blog.
Patrick Ortiz Global SQL Solution Architect Dell Inc. BIN209.
Asif Jinnah Field Desktop Services Enabling a Flexible Workforce, an insider’s view.
Mark Michaelis Chief Computer Nerd IDesign/Itron/IntelliTechture DTL313.
Enabling Secure Always-On Connectivity Gustav Kaleta Partner Technology Advisor Microsoft Corporation.
Provided Under NDA - Secure Access to Corporate Resources.
David B. Cross Product Unit Manager Microsoft Corporation Session Code: SIA303 Donny Rose Senior Program Manager.
Enterprise Security in Practice
Modernizing your Remote Access
Microsoft Ignite /31/ :08 AM
Forefront Security ISA
Threat Management Gateway
DirectAccess Configuration, Tips, Tricks, and Best Practices
11/11/2018 Desktop Virtualization Corey Hynes Kyle Rosenthal President Technical Lead HynesITe Inc Spider Consulting @windowspcguy.
Windows PowerShell Remoting: Definitely NOT Just for Servers
Server-to-Client Remote Access and DirectAccess
Обзор Windows Azure Connect
Microsoft Virtual Academy
Enabling the hybrid cloud with remote access appliances
TechEd /28/2019 3:22 PM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks.
System Center Marketing
Microsoft Virtual Academy
DirectAccess with Unified Access Gateway (UAG)
VNet and Cross-Premises Connectivity
Presentation transcript:

Gavin Carius Architect Microsoft Services SVR311

Session Objectives And Takeaways Session Objective(s) Present DirectAccess Explain core DirectAccess technologies Review connectivity options Key Takeaways VPNs connect the user to the network, DirectAccess extends the network to the user Three core technologies: IPv6, IPsec, and NRPT Smartcards are supported but not required

Cost Center More Efficient Cost Center Business Enabler Strategic Asset Network Access Infrastructure Optimization Model Is IT a Cost Center or a Strategic Asset? No password policies Perimeter Firewalls only Antivirus not required or installed by default No Remote Access policies IPv4-only network Strong password policy Host-based firewalls Security suite installed on clients Remote Access available IPv6 planning and testing in progress Strong password policy Basic IPsec policies Health policies enforced Remote user experience is similar to local IPv6 blockers removed, addressing plan complete Strong Authentication Network transactions are authenticated; may be encrypted Policy-based network access with auto- remediation Remote users are an extension of the network IPv6 is fully deployed

Datacenter Servers Internet Enterprise Network Identity : Strong authentication required for all users Authorization : Machine health is validated or remediated before allowing network access Trustworthy Networking Vision Protection: All network transactions are authenticated and encrypted Remote Client Local Client Policies are based on identity, not on location

Evolving IT Needs

Securely extending network services and resources to remote users

Always On Improved productivity Not user initiated Simplified connectivity Manage Out "Light up" remote clients Decreases patch miss rates Applies GPOs to remote machines Access Policies Pre-logon health checks and remediation Replaces modal "connect-time" health checks Full NAP integration DirectAccess is more than Remote Access VPNs connect the user to the network DirectAccess extends the network to the user Protected Transactions Supports authenticated transactions Supports encrypted transactions Authentication and encryption mitigate many attacks

Connectivity: IPv6 Data Protection: IPsec Name Resolution: DNS and NRPT DirectAccess: Technical Foundations

Connectivity: IPv6 DirectAccess requires IPv6 If native IPv6 isn't available, remote clients use IPv6 Transition Technologies The corporate network can deploy native IPv6, transition technologies, or NAT-PT IPv6 Options DirectAccess works best if the Corporate Network has native IPv6 deployed IntranetInternet NAT-PT Native IPv6 IPv6 Translation Technologies IPv4

Data Protection: IPsec IPsec tightly integrates with IPv6, allowing rules engine to determine when and how traffic should be protected  End to edge  End to end  End to edge  End to end

Name Resolution: DNS and the NRPT Remote DirectAccess clients utilise smart routing by default The Name Resolution Policy Table allows this to happen efficiently and securely Sends name queries to internal DNS servers based on pre-configured DNS namespace DirectAccess Connection Internet Connection

Technical Detail

External Connectivity Native IPv6 support Public IPv4 addresses will use 6to4 to tunnel IPv6 inside IP Protocol 41 Private IPv4 addresses will use Teredo to tunnel IPv6 inside IPv4 UDP (UDP 3544) If client cannot connect to DirectAccess Server, IP-HTTPS will connect over port 443 IP Address Assigned by ISP: Public IPv4 DirectAccess Client IPv6 Address Used to connect: 6to4 Private IPv4 Native IPv6 Teredo 6to4 Teredo IP-HTTPS

Internal IPv6 Native - Servers can run any OS that fully supports IPv6 - Requires IPv6 infrastructure - Best choice over time ISATAP - IPv6 inside IPv4 - Servers must be Windows Server 2008 or R2 - No router upgrades NAT-PT - Translates IPv6 to IPv4 - Works with any OS - UAG has this built in IPv6 Options DirectAccess works best if the Corporate Network has native IPv6 deployed IntranetInternet NAT-PT Native IPv6 IPv6 Translation Technologies IPv4

IP-HTTPSIP-HTTPS Encrypted IPsec+ESP External IPsec IPsec Hardware Offload Supported

No IPsec IPsec Integrity Only (Auth) IPsec Integrity + Encryption Internal IPsec

Tunnel 1: Infrastructure Tunnel Auth: Machine Certificate End: AD/DNS/Management Tunnel 1: Infrastructure Tunnel Auth: Machine Certificate End: AD/DNS/Management Tunnel 2: Application Tunnel Auth: Machine Certificate + (User Kerb or Cert) End: Any Tunnel 2: Application Tunnel Auth: Machine Certificate + (User Kerb or Cert) End: Any IPsec Tunnel Detail

NRPT Client side only Requires a leading dot Static table that defines which DNS servers the client will use for the listed names Configurable via GPO at Computer Configuration |Policies|Windows Settings|Name Resolution Policy Can be viewed with NETSH name show policy NRPT.ad.contoso.com2001:db8:b90a:c7d8:: :db8:b90a:c7d8::183.lab.contoso.com2001:db8:b90a:c7a8::202 sql01.acme.com.au2001:db8:b90a:c7e4::801

Two Factor Authentication (TFA) Not required; fully supported Edge based enforcement: a smarter way to enforce TFA User is assigned a well- known SID when they log on with a smartcard S User may logon to laptop without TFA When user accesses corporate resources, IPsec authorization policy checks for this SID If SID is not present…

Requirements for DirectAccess Knowledge Should have a basic working knowledge or IPsec and TCP/IP Should be interested in learning about and deploying new technologies, such as IPv6 DirectAccess Clients Windows 7 Enterprise or Ultimate SKU Domain-joined machines DirectAccess Server Windows Server 2008 R2, domain-joined machines Located at edge

Requirements for DirectAccess DNS Servers supporting DirectAccess clients must be Windows Server 2008 SP2 or later Application Server End to end IPv6 or Ipsec requires Windows Server 2008 or later Earlier server versions require NAT-PT PKI for certificates No dependency on Active Directory version/mode

Extend Windows DirectAccess to legacy applications and resources running on existing infrastructure. Support down-level and non Windows clients through integrated SSL VPN capabilities and other connectivity options. Anywhere Access Protect the DirectAccess gateway with a hardened edge solution. Limit exposure associated with connecting unmanaged, down-level and non- Windows clients through granular application access controls and policies. Integrated Security Minimize configuration errors and simplify deployment using built-in wizards and tools. Enhance scale and ongoing administration through built-in array management and integrated load balancing Consolidate access gateways for centralized control and auditing. Simplified Management Forefront Unified Access Gateway (UAG) extends the benefits of Windows DirectAccess across your infrastructure, enhancing scalability and simplifying deployments and ongoing management. UAG and DirectAccess – Better Together

SSL-VPN + Always On IPv6 UAG and DirectAccess better together: Access for down level and non Windows clients Enhances scalability and management Simplifies deployment and administration Hardened Edge Solution UAG and DirectAccess – Better Together Extends access to line of business servers with IPv4 support Access for down level and non Windows clients Enhances scalability and management Simplifies deployment and administration Hardened Edge Solution IPv6 or IPv4 IPv6 or IPv4

Building “End to End Trust” (Optional) Two factor Authentication Domain Controller authenticated logon Cached credentials are only used if machine is offline Identity-aware firewall (Auth-firewall) IPsec (At the network layer) File Share permissions NTFS Permissions End-to-end authentication allows remote client connections to be logged by each server Define access, encryption, or authentication policies on a per server or application basis These rich policy constructs are far beyond traditional VPN

Sessions On-Demand & Community Resources for IT Professionals Resources for Developers Microsoft Certification & Training Resources Resources

COMPLETE YOUR EVALUATION FORMS IN COMMNET AND BE IN TO WIN ONE OF THE 150 DAILY PRIZES* GIVE US YOUR FEEDBACK & WIN INSTANTLY! *For full terms & conditions and more information, please visit the CommNet Portal.

© 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.