Guide to Operating System Security Chapter 9 Web, Remote Access, and VPN Security.

Slides:



Advertisements
Similar presentations
Enabling Secure Internet Access with ISA Server
Advertisements

1 Chapter 2: Networking Protocol Design Designs That Include TCP/IP Essential TCP/IP Design Concepts TCP/IP Data Protection TCP/IP Optimization.
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
1 Configuring Virtual Private Networks for Remote Clients and Networks.
A+ Guide to Software, 4e Chapter 9 Windows on the Internet.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 11: Planning Network Access.
Module 10: Configuring Virtual Private Network Access for Remote Clients and Networks.
Hands-On Microsoft Windows Server 2003 Administration Chapter 11 Administering Remote Access Services.
70-270, MCSE/MCSA Guide to Installing and Managing Microsoft Windows XP Professional and Windows Server 2003 Chapter Twelve Implementing Terminal.
Chapter 8: Configuring Network Connectivity. Installing Network Adapters Network adapter cards connect a computer to a network. Installation –Plug and.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
MCITP Guide to Microsoft Windows Server 2008 Server Administration (Exam #70-646) Chapter 10 Configuring Remote Access.
Windows 2000 Remote Access. Remote Access Overview With Windows 2000 remote access, remote access clients connect to remote access servers and are transparently.
Remote Networking Architectures
Network Address Translation, Remote Access and Virtual Private Networks BSAD 146 Dave Novak Sources: Network+ Guide to Networks, Dean 2013.
Virtual Private Network (VPN) © N. Ganesan, Ph.D..
Overview of Routing and Remote Access Service (RRAS) When RRAS was implemented in Microsoft Windows NT 4.0, it added support for a number of features.
Module 11: Supporting Remote Users. Overview Establishing Remote Access Connections Connecting to Virtual Private Networks Configuring Authentication.
Chapter 11: Dial-Up Connectivity in Remote Access Designs
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 14 Remote Access.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
Virtual Private Networks (Tunnels). When Are VPN Tunnels Used? VPN with PPTP tunnel Used if: All routers support VPN tunnels You are using MS-CHAP or.
Getting Connected to NGS while on the Road… Donna V. Shaw, NGS Convocation.
VPN Plus Samba Making My Home Computing Environment Identical to My Work Computing Environment.
Virtual Private Networks Alberto Pace. IT/IS Technical Meeting – January 2002 What is a VPN ? u A technology that allows to send confidential data securely.
Windows Server 2008 Chapter 9 Last Update
1 Linux Networking and Security Chapter 3. 2 Configuring Client Services Configure DNS name resolution Configure dial-up network access using PPP Understand.
Configuring Routing and Remote Access(RRAS) and Wireless Networking
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Chapter 7: Using Windows Servers to Share Information.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
Chapter 12 Chapter 12: Remote Access and Virtual Private Networks.
Module 8: Configuring Virtual Private Network Access for Remote Clients and Networks.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
A+ Guide to Software Managing, Maintaining and Troubleshooting THIRD EDITION Chapter 12 Windows on the Internet.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
11.59 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 19 PCs on the Internet.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
1 Chapter Overview Installing the TCP/IP Protocols Configuring TCP/IP.
Chapter 7 Low-Level Protocols
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
1 Week 6 – NPS and RADIUS Install and Configure a Network Policy Server Configure RADIUS Clients and Servers NPS Authentication Methods Monitor and Troubleshoot.
Module 8: Designing Network Access Solutions. Module Overview Securing and Controlling Network Access Designing Remote Access Services Designing RADIUS.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
11.59 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications ◦The client requested data.
Page 1 TCP/IP Networking and Remote Access Lecture 9 Hassan Shuja 11/23/2004.
Network access security methods Unit objective Explain the methods of ensuring network access security Explain methods of user authentication.
Accessing Evitech network via FTP by Susan Jansson.
Using Routing and Remote Access Chapter Five. Exam Objectives in this Chapter:  Plan a routing strategy Identify routing protocols to use in a specified.
17 Establishing Dial-up Connection to the Internet Using Windows 9x 1.Install and configure the modem 2.Configure Dial-Up Adapter 3.Configure Dial-Up Networking.
Remote Access and Long-Distance Communications. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Typical Telephone.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Wireless Security.
Getting Connected to NGS while on the Road…
Module 9: Configuring Network Access
Microsoft Windows NT 4.0 Authentication Protocols
Remote Access Lecture 2.
Getting Connected to NGS while on the Road…
Cengage Learning: Computer Networking from LANs to WANs
Chapter 12: Remote Access and Virtual Private Networks
Virtual Private Networks (VPN)
Presentation transcript:

Guide to Operating System Security Chapter 9 Web, Remote Access, and VPN Security

2 Guide to Operating System Security Objectives Understand Internet security using protocols and services Configure Web browsers for security Configure remote access services for security Configure virtual private network services for security

3 Guide to Operating System Security Internet Security Protocols and services must be kept secure  To ensure privacy of information  To discourage the spread of malicious software

4 Guide to Operating System Security Internet Protocols and Services Hypertext Transfer Protocol (HTTP) Secure HTTP (S-HTTP) and Hypertext Transfer Protocol Secure (HTTPS) File Transfer Protocol (FTP) Network File System (NFS) Samba and Server Message Block (SMB)

5 Guide to Operating System Security HTTP TCP/IP-compatible application protocol- transports information over the Web Most recent version: HTTP/1.1  Increases reliability of communications  Enables caching  Can send message responses before full control information from a request is received  Permits multiple communications over a single connection

6 Guide to Operating System Security S-HTTP and HTTPS Forms of HTTP used for more secure communications S-HTTP  Standards-based protocol that enables use of a variety of security measures (including CMS and MOSS) HTTPS  Essentially proprietary, but more compatible with encryption for IP-level communications  Uses SSL as a subprotocol

7 Guide to Operating System Security File Transfer Protocol (FTP) TCP/IP protocol that transfers files in bulk data streams Uses two TCP ports (20 and 21) Supports transmission of binary or ASCII formatted files Commonly used on the Internet Downloading files can be risky

8 Guide to Operating System Security File Transfer Protocol (FTP)

9 Guide to Operating System Security Network File System (NFS) Designed for UNIX/Linux systems for file sharing Connection-oriented protocol that runs within TCP Uses remote procedure calls via TCP port 111 Sends data in record streams For security, let only authorized computers use NFS on host computer

10 Guide to Operating System Security Samba and Server Message Block Samba  Available for UNIX and Linux computers  Enables exchange of files and printer sharing with Windows-based computers through SMB protocol Server Message Block  Used by Windows-based systems  Enables sharing files and printers  Employed by Samba

11 Guide to Operating System Security Using Samba

12 Guide to Operating System Security Configuring Web Browsers for Security Applying security measures to popular Web browsers  Internet Explorer  Mozilla  Netscape Navigator

13 Guide to Operating System Security Configuring Internet Explorer Security Used with Windows and Mac OS X Configure version of HTTP, use of HTTPS, FTP, and download access Configure security by zones  Internet  Local intranet  Trusted sites  Restricted sites

14 Guide to Operating System Security Internet Explorer Security Settings

15 Guide to Operating System Security Configuring Internet Explorer Security Internet Explorer Enhanced Security Configuration (Windows Server 2003)  Applies default security to protect server  Uses security zones and security parameters preconfigured for each zone

16 Guide to Operating System Security Installing IE Enhanced Security Configuration

17 Guide to Operating System Security Configuring Mozilla Security Open-source Web browser Can run on  Linux (by default with GNOME desktop)  UNIX  Mac OS X  OS/2  Windows-based systems Security configuration is combined with privacy configuration options

18 Guide to Operating System Security Mozilla Security Categories

19 Guide to Operating System Security Privacy & Security Option in Mozilla

20 Guide to Operating System Security Configuring Netscape Navigator Security Nearly identical to Mozilla; GUI offers:  A buddy list  Link to Netscape channels  Different sidebar presentation

21 Guide to Operating System Security Netscape Navigator in Windows 2000 Server

22 Guide to Operating System Security Privacy & Security Options in Netscape

23 Guide to Operating System Security Configuring Remote Access Services for Security Remote access  Ability to access a workstation or server through a remote connection (eg, dial-up telephone line and modem)  Commonly used by telecommuters

24 Guide to Operating System Security Microsoft Remote Access Services Enables off-site workstations to access a server through telecommunications lines, the Internet, or intranets

25 Guide to Operating System Security Microsoft RAS

26 Guide to Operating System Security Microsoft RAS - Supported Clients MS-DOS Windows 3.1 and 3.11 Windows NT/95/98 Windows Millennium Windows 2000 Windows Server 2003 and XP Professional

27 Guide to Operating System Security Microsoft RAS Supports different types of modems and communications equipment Compatible with many network transport and remote communications protocols

28 Guide to Operating System Security Microsoft RAS – Supported Connections (Continued) Asynchronous modems Synchronous modems Null modem communications Regular dial-up telephone lines Leased telecommunication lines (eg, T-carrier)

29 Guide to Operating System Security Microsoft RAS – Supported Connections (Continued) ISDN lines (and “digital modems”) X.25 lines DSL lines Cable modem lines Frame relay lines

30 Guide to Operating System Security Microsoft RAS – Supported Protocols NetBEUI TCP/IP NWLink PPP PPTP L2TP

31 Guide to Operating System Security Understanding Remote Access Protocols Transport protocols  TCP/IP  IPX  NetBEUI Remote access protocols  Serial Line Internet Protocol (SLIP) CSLIP  Point-to-Point Protocol (PPP) PPTP L2TP

32 Guide to Operating System Security Configuring a RAS Policy Employ callback security options (No Callback, Set by Caller, Always Callback to) Install Internet Authentication Service (IAS)  Can be employed with Remote Authentication Dial-In User Service (RADIUS) and RADIUS server Add participating RAS and VPN servers

33 Guide to Operating System Security Remote Access Policies Objects in the IAS Tree

34 Guide to Operating System Security Granting Remote Access Permission to RAS

35 Guide to Operating System Security Enabling Access for a User’s Account via Remote Access Policy

36 Guide to Operating System Security Configuring a RAS Policy Use Remote Access Policies to configure security types  Authentication  Encryption  Dial-in constraints

37 Guide to Operating System Security RAS Authentication Types (Continued) Challenge Handshake Authentication Protocol (CHAP) Extensible Authentication Protocol (EAP) MS-CHAP v1 (aka CHAP with Microsoft extensions) MS-CHAP v2 (aka CHAP with Microsoft extensions version 2)

38 Guide to Operating System Security RAS Authentication Types (Continued) Password Authentication Protocol (PAP) Shiva Password Authentication Protocol (SPAP) Unauthenticated

39 Guide to Operating System Security RAS Encryption Options

40 Guide to Operating System Security RAS Dial-in Constraints Options Idle and session timeouts Day and time restrictions Whether access is restricted to a single number Whether access is restricted based on media used

41 Guide to Operating System Security Security on a Virtual Private Network VPN  An intranet designed for restricted access by specific clients based on subnets, IP addresses, user accounts, or a combination Apply same remote access policies as to RAS servers

42 Guide to Operating System Security Summary Protocols and services that enable Internet security Configuring Web browsers for security  Internet Explorer  Mozilla  Netscape Navigator How to configure a server’s remote access services to enforce security Applying security options to a VPN