SlideShare une entreprise Scribd logo
1  sur  36
DirectAccess Technical Drilldown Part 2Putting it all together John Craddock Infrastructure & Security Architect XTSeminars Ltd Session Code: SVR402
Part1: Internet to Intranet  6to4Host/Router 6to4Relay NAT Device Teredoserver & relay TeredoHost Internet Corporateintranet IPHTTPSserver IPHTTPSHost NAT Device
Part1: IPv6/IPv4 Intranet IPv6 ISATAP Router Native IPv6 IPv6 NAT-PTor NAT64 IPv4 IPv6Pv4 IPv4 IPv6Pv4
What’s Left? Internet Corporate  Intranet  Tunnelling technologies for the Internet and Intranet to support IPv6 over IPv4  Internet tunnelling selection based on client location – Internet, NAT, firewall Encryption/authentication of Internet traffic (end-to-edge/end-to-end) PKI required  Client location detection: Internet or corporate intranet
Don’t Give Up Now Part 1 IPv6 Intro Transition Technologies End-to-end connectivity Part 2 IPsec Configuring Direct Access Network location and name resolution policies It all works – just like that!
Demo Environment EX1 DC1 DNS DC, DNS,CA NAT1 DA1 Home Corporate intranet Internet IIS for CRLdistribution APP1 WIN7 WIN7 WIN7 All servers Windows 2008 R2
Securing the Tunnel Internet Corporate  Intranet DirectAccess uses IPsec to secure network traffic Traffic over the Internet is encrypted and authenticated Access via IPHTTPs is double encrypted Encrypted IPv6 within HTTPS
IPsec to the Rescue IPsec is managed through Windows Firewall with Advanced Security Best deployed through group policy Connection rules create: IPsec tunnels (authenticated and encrypted) Authenticated connects (computer and user authentication Inbound / outbound rules set requirements for encryption
Traffic Profile Traffic profile:  <Protocol><source IP> <destination IP><source port> <destination port> Rules are based on a traffic profile Connection Security Rule Authenticate all TCP traffic between A & B on ports W & X Inbound/Outbound Rule Encrypt authenticated TCP traffic  between A & B on ports W & X
IPsec Primer Main modesecurity association Key life configurable Default: 8 hours Create shared secret between hosts AuthIP AuthIP Uses Diffie-Hellman Authenticate over secure channel AuthIP AuthIP Kerberos / certificatesComputer and/or user authentication AuthIP Establish IPSec session Keys Quick mode: IPsec SAKey life configurable Default 1 hour/100 MB Drops after 3 Mins of inactivity AuthIP AuthIP Create Security Association for session IPsec SA IPsec SA Integrity or Integrity + encryption Exchange data
Main Mode Association
Quick Mode Association
Data Exchange Protocol ID 51 Authentication Header (AH) contains: Protocol ID of payload (TCP/UDP/ICMP…) Sequence number – prevents replay Security Parameters Index – Identifies IPsec SA Integrity Check value (ICV) calculated with SHA1 or MD5 Signed - ignoring ICV field andfields that change in transport Protocol ID 50 Encrypted signed IP Header IP payload AH Encrypted Security Protocol ESP headers contain: Protocol ID of payload (TCP/UDP/ICMP…) Sequence number – prevents replay Security Parameters Index – Identifies IPsec SA Integrity Check value (ICV) IP Header ESP IP payload ESP ICV When you just want integrity through NAT use ESP-Null
Negotiated Security Options Do not authenticate Request inbound and outbound A host responds to both IPsec and unauthenticated (non-IPsec) requests It initiates communications with IPsec, and if that fails, falls back to unauthenticated communications Require inbound and request outbound A host responds to inbound traffic secured by IPsec, and ignores unauthenticated requests It initiates communications with IPsec, and if that fails, falls back to unauthenticated communications Require inbound and require outbound A host requires IPsec-secured communications for both inbound and outgoing requests Require inbound and clear outbound
Intranet Integrity  / encryption / authentication  IPsec Tunnel End points can be single host or act as a gateway The gateway acts as the end-point for integrity encryption and authentication Traffic on the Intranet is not protected by IPsec  IPsec Gateway includes IPsec DoS Prevention Reduces DoS attacks from key management protocols IKE & AuthIP
IPsec Access Options Intranet Integrity  / encryption / authentication  Tunnel 1: Machine Auth Tunnel 2: Machine & User Auth ESP NULL (transport mode) machine and user auth to intranet server Selective authentication onto endpoint servers ESP (transport mode) encryption and authentication to intranet server
Client Location corp.example.com zone DNS 2 DNS 1 IP configuredDNS address Corporate  Intranet Internet To resolve names on the Internet DirectAccess host queries DNS 1 To resolve names on the Intranet DirectAccess host queries DNS 2
How Does It Do that? Name Resolution Policy Table (NRPT) to the rescue NRPT allows the definitions of which DNS servers to query based on the namespace to be resolved The NRPT can point DNS queries for corp.example.com to the intranet DNS server All other DNS queries are sent to the DNS server address configured in the client IP settings
NRPT corp.example.com zone DNS 2 nls.corp.example.com DNS 1 IP configuredDNS address Internet Corporate  Intranet No NRPT NRPT: corp.example.com: query DNS 2 All other name spaces query DNS server configured in client IP settings   	There is a special entry in the table to direct DNS queries for an internal 	HTTPS website to the DNS servers configured in the client IP settings 	For example: queries for nls.corp.example.com always go to IP configured DNS address and this is not resolvable on the internet
Viewing the NRPT
NRPT Inside/Outside NRPT enabled by default If the client can access an internal HTTPS website (https://nls.corp.example.com) Considered to be on the intranet  NRPT disabled No access to secure website  Considered to be on the Internet  NRPT remains enabled
Putting it All Together 6to4Host/Router 6to4Relay ISATAP Router NAT Device Teredoserver & relay TeredoHost Corporateintranet Internet HTTPSserver IPHTTPSHost NAT Device DirectAccess Server
DirectAccess Management Console
Before Running Setup DNS server requires isatap block to be removed Computer certificates must be issued to computers Server certificates must be issued to  DA server with external DNS name in certificate NLS web server with nlsurl address in certificate CRL distribution should be configured in certificate CRL distribution location must be available on both the Internet and intranet
Authentication to Servers  IPsec ESP NULL can be used for authentication to end-point servers  Provides another layer of protection Can control which servers are available from DA host Requires 2008 end-point servers IPSEC does not work over IPv6 for Windows 2003 Two factor authentication can be enabled for end-to-end authentication Requires 2008 domain functional level
DirectAccess Setup Configures on DA server 6to4 relay Teredo server and relay IPHTTPS server ISATAP Creates group policy for IPSec rules for DA server IPsec Tunnel DA client IPsec Tunnel DA clients and servers requiring end point authentication
DirectAccess Setup (continued)  Creates group policy for client configuration Enable and supply addresses for 6to4 relay Teredo server and relay  IPHTTPS server Enable and configure NRPT Enable inside/outside probe DA server and DA clients must be members of the domain
Windows DirectAccess The DA server represents a single point of failure Functionality can be split across multiple servers for performance For HA, run DA server as VM in a Hyper-v cluster Does not guarantee DA service availability Live Migration available in Windows 2008 R2 Load balancing option available with UAG
All Done Internet Corporate  Intranet  Tunnelling technologies for the Internet and Intranet to support IPv6 over IPv4  Internet tunnelling selection based on client location – Internet, NAT, firewall  Encryption/authentication of Internet traffic (end-to-edge/end-to-end) PKI required   Client location detection: Internet or corporate intranet
Required Slide Speakers,  TechEd 2009 is not producing  a DVD. Please announce that  attendees can access session  recordings at TechEd Online.  www.microsoft.com/teched Sessions On-Demand & Community www.microsoft.com/learning Microsoft Certification & Training Resources http://microsoft.com/technet Resources for IT Professionals http://microsoft.com/msdn Resources for Developers Resources
Related Content Required Slide Speakers,  please list the Breakout Sessions, TLC Interactive Theaters and Labs that are related to your session. Breakout Sessions: SVR401 DirectAccess Technical Drilldown, Part 1 of 2: IPv6 and Transition Technologies SIA306 Microsoft Forefront Unified Access Gateway: DirectAccess and Beyond SVR315 IPv6 for the Reluctant: What to Know Before You Turn It Off Interactive Theater Sessions: SVR08-IS End-to-End Remote Connectivity with DirectAccess
My Sessions at TechEd Required Slide Speakers,  please list the Breakout Sessions, TLC Interactive Theaters and Labs that are related to your session. Breakout Sessions: SIA319 What's Windows Server 2008 R2 Going to Do for Your Active Directory? SIA402 Recovery of Active Directory Deleted Objects and the Windows Server 2008 R2 Recycle Bin SVR401 DirectAccess Technical Drilldown, Part 1 of 2: IPv6 and Transition Technologies SVR402 DirectAccess Technical Drilldown, Part 2 of 2: Putting It All Together Interactive Theater Sessions: SVR08-IS End-to-End Remote Connectivity with DirectAccess
Required Slide Complete an evaluation on CommNet and enter to win an Xbox 360 Elite!
Required Slide © 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation.  Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation.  MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Contenu connexe

Tendances

Ccna interview questions
Ccna interview questionsCcna interview questions
Ccna interview questions
Sanjay Thakare
 
Cisco Router As A Vpn Server
Cisco Router As A Vpn ServerCisco Router As A Vpn Server
Cisco Router As A Vpn Server
mmoizuddin
 
Mcse notes
Mcse notesMcse notes
Mcse notes
vrammn
 

Tendances (20)

Dhcp with cisco
Dhcp with ciscoDhcp with cisco
Dhcp with cisco
 
(NET404) Making Every Packet Count
(NET404) Making Every Packet Count(NET404) Making Every Packet Count
(NET404) Making Every Packet Count
 
unit 2
unit 2unit 2
unit 2
 
Ipo spaces calling document-v1
Ipo spaces calling document-v1Ipo spaces calling document-v1
Ipo spaces calling document-v1
 
Fedv6tf-fhs
Fedv6tf-fhsFedv6tf-fhs
Fedv6tf-fhs
 
Windows Server 2012 Seminar 4 - De mogelijkheden van Direct Access
Windows Server 2012 Seminar 4 - De mogelijkheden van Direct AccessWindows Server 2012 Seminar 4 - De mogelijkheden van Direct Access
Windows Server 2012 Seminar 4 - De mogelijkheden van Direct Access
 
Vpn(4)
Vpn(4)Vpn(4)
Vpn(4)
 
NAT_Final
NAT_FinalNAT_Final
NAT_Final
 
DHCP Server Guaidlines using CISCO PACKET TRACER
DHCP Server Guaidlines using CISCO PACKET TRACERDHCP Server Guaidlines using CISCO PACKET TRACER
DHCP Server Guaidlines using CISCO PACKET TRACER
 
Fedv6tf-IPv6-new-friends
Fedv6tf-IPv6-new-friendsFedv6tf-IPv6-new-friends
Fedv6tf-IPv6-new-friends
 
Ccna interview questions
Ccna interview questionsCcna interview questions
Ccna interview questions
 
[Advantech] ADAM-3600 open vpn setting Tutorial step by step
[Advantech] ADAM-3600 open vpn setting Tutorial step by step [Advantech] ADAM-3600 open vpn setting Tutorial step by step
[Advantech] ADAM-3600 open vpn setting Tutorial step by step
 
Cisco Router As A Vpn Server
Cisco Router As A Vpn ServerCisco Router As A Vpn Server
Cisco Router As A Vpn Server
 
Introduction to nfv movilforum
Introduction to nfv   movilforumIntroduction to nfv   movilforum
Introduction to nfv movilforum
 
Nat pat
Nat patNat pat
Nat pat
 
DPDK Summit 2015 - Intro - Tim O'Driscoll
DPDK Summit 2015 - Intro - Tim O'DriscollDPDK Summit 2015 - Intro - Tim O'Driscoll
DPDK Summit 2015 - Intro - Tim O'Driscoll
 
IPv6 address-planning
IPv6 address-planningIPv6 address-planning
IPv6 address-planning
 
NAT (network address translation) & PAT (port address translation)
NAT (network address translation) & PAT (port address translation)NAT (network address translation) & PAT (port address translation)
NAT (network address translation) & PAT (port address translation)
 
Mcse notes
Mcse notesMcse notes
Mcse notes
 
NAT Traversal
NAT TraversalNAT Traversal
NAT Traversal
 

Similaire à SVR402: DirectAccess Technical Drilldown, Part 2 of 2: Putting it all together.

2.5.1.2 packet tracer configure cisco routers for syslog, ntp, and ssh oper...
2.5.1.2 packet tracer   configure cisco routers for syslog, ntp, and ssh oper...2.5.1.2 packet tracer   configure cisco routers for syslog, ntp, and ssh oper...
2.5.1.2 packet tracer configure cisco routers for syslog, ntp, and ssh oper...
Salem Trabelsi
 
CCNA Connecting NetworksSA ExamLab 13 CCNA Connecting Netwo.docx
CCNA Connecting NetworksSA ExamLab 13 CCNA Connecting Netwo.docxCCNA Connecting NetworksSA ExamLab 13 CCNA Connecting Netwo.docx
CCNA Connecting NetworksSA ExamLab 13 CCNA Connecting Netwo.docx
keturahhazelhurst
 
Installation Of An Iso Image Dvd
Installation Of An Iso Image DvdInstallation Of An Iso Image Dvd
Installation Of An Iso Image Dvd
Susan Cox
 
05 module managing your network enviornment
05  module managing your network enviornment05  module managing your network enviornment
05 module managing your network enviornment
Asif
 

Similaire à SVR402: DirectAccess Technical Drilldown, Part 2 of 2: Putting it all together. (20)

Networking 101
Networking 101Networking 101
Networking 101
 
Networking 101
Networking 101Networking 101
Networking 101
 
Networking 101
Networking 101Networking 101
Networking 101
 
Networking 101
Networking 101Networking 101
Networking 101
 
TCP/IP Basics
TCP/IP BasicsTCP/IP Basics
TCP/IP Basics
 
Student packet tracer manual v1.1
Student packet tracer manual v1.1Student packet tracer manual v1.1
Student packet tracer manual v1.1
 
Networking For Application Developers by Roy Kim
Networking For Application Developers by Roy KimNetworking For Application Developers by Roy Kim
Networking For Application Developers by Roy Kim
 
IP and VoIP Fundamentals
IP and VoIP FundamentalsIP and VoIP Fundamentals
IP and VoIP Fundamentals
 
Solarwinds port requirement
Solarwinds port requirementSolarwinds port requirement
Solarwinds port requirement
 
IoT Secure Bootsrapping : ideas
IoT Secure Bootsrapping : ideasIoT Secure Bootsrapping : ideas
IoT Secure Bootsrapping : ideas
 
2.5.1.2 packet tracer configure cisco routers for syslog, ntp, and ssh oper...
2.5.1.2 packet tracer   configure cisco routers for syslog, ntp, and ssh oper...2.5.1.2 packet tracer   configure cisco routers for syslog, ntp, and ssh oper...
2.5.1.2 packet tracer configure cisco routers for syslog, ntp, and ssh oper...
 
siemens-tcp-ip-ethernet-manual.pdf
siemens-tcp-ip-ethernet-manual.pdfsiemens-tcp-ip-ethernet-manual.pdf
siemens-tcp-ip-ethernet-manual.pdf
 
CCNA Connecting NetworksSA ExamLab 13 CCNA Connecting Netwo.docx
CCNA Connecting NetworksSA ExamLab 13 CCNA Connecting Netwo.docxCCNA Connecting NetworksSA ExamLab 13 CCNA Connecting Netwo.docx
CCNA Connecting NetworksSA ExamLab 13 CCNA Connecting Netwo.docx
 
Konsep pembangunan tapak web & laman web
Konsep pembangunan tapak web & laman webKonsep pembangunan tapak web & laman web
Konsep pembangunan tapak web & laman web
 
Lync 2010 deep dive edge
Lync 2010 deep dive edgeLync 2010 deep dive edge
Lync 2010 deep dive edge
 
Installation Of An Iso Image Dvd
Installation Of An Iso Image DvdInstallation Of An Iso Image Dvd
Installation Of An Iso Image Dvd
 
05 module managing your network enviornment
05  module managing your network enviornment05  module managing your network enviornment
05 module managing your network enviornment
 
Configure Cisco Routers for Syslog, NTP, and SSH Operations
Configure Cisco Routers for Syslog, NTP, and SSH Operations Configure Cisco Routers for Syslog, NTP, and SSH Operations
Configure Cisco Routers for Syslog, NTP, and SSH Operations
 
Building and Managing your Virtual Datacenter using PowerShell DSC - Florin L...
Building and Managing your Virtual Datacenter using PowerShell DSC - Florin L...Building and Managing your Virtual Datacenter using PowerShell DSC - Florin L...
Building and Managing your Virtual Datacenter using PowerShell DSC - Florin L...
 
Design of a campus network
Design of a campus networkDesign of a campus network
Design of a campus network
 

Plus de Louis Göhl

Storage and hyper v - the choices you can make and the things you need to kno...
Storage and hyper v - the choices you can make and the things you need to kno...Storage and hyper v - the choices you can make and the things you need to kno...
Storage and hyper v - the choices you can make and the things you need to kno...
Louis Göhl
 
Security best practices for hyper v and server virtualisation [svr307]
Security best practices for hyper v and server virtualisation [svr307]Security best practices for hyper v and server virtualisation [svr307]
Security best practices for hyper v and server virtualisation [svr307]
Louis Göhl
 
HP Bladesystem Overview September 2009
HP Bladesystem Overview September 2009HP Bladesystem Overview September 2009
HP Bladesystem Overview September 2009
Louis Göhl
 

Plus de Louis Göhl (19)

Citrix vision and product highlights november 2011
Citrix vision and product highlights november 2011Citrix vision and product highlights november 2011
Citrix vision and product highlights november 2011
 
Citrix vision & strategy overview november 2011
Citrix vision & strategy overview november 2011Citrix vision & strategy overview november 2011
Citrix vision & strategy overview november 2011
 
VMware vSphere 4.1 deep dive - part 2
VMware vSphere 4.1 deep dive - part 2VMware vSphere 4.1 deep dive - part 2
VMware vSphere 4.1 deep dive - part 2
 
VMware vSphere 4.1 deep dive - part 1
VMware vSphere 4.1 deep dive - part 1VMware vSphere 4.1 deep dive - part 1
VMware vSphere 4.1 deep dive - part 1
 
Storage and hyper v - the choices you can make and the things you need to kno...
Storage and hyper v - the choices you can make and the things you need to kno...Storage and hyper v - the choices you can make and the things you need to kno...
Storage and hyper v - the choices you can make and the things you need to kno...
 
Security best practices for hyper v and server virtualisation [svr307]
Security best practices for hyper v and server virtualisation [svr307]Security best practices for hyper v and server virtualisation [svr307]
Security best practices for hyper v and server virtualisation [svr307]
 
Hyper v and live migration on cisco unified computing system - virtualized on...
Hyper v and live migration on cisco unified computing system - virtualized on...Hyper v and live migration on cisco unified computing system - virtualized on...
Hyper v and live migration on cisco unified computing system - virtualized on...
 
HP Bladesystem Overview September 2009
HP Bladesystem Overview September 2009HP Bladesystem Overview September 2009
HP Bladesystem Overview September 2009
 
UNC309 - Getting the Most out of Microsoft Exchange Server 2010: Performance ...
UNC309 - Getting the Most out of Microsoft Exchange Server 2010: Performance ...UNC309 - Getting the Most out of Microsoft Exchange Server 2010: Performance ...
UNC309 - Getting the Most out of Microsoft Exchange Server 2010: Performance ...
 
SVR208 Gaining Higher Availability with Windows Server 2008 R2 Failover Clust...
SVR208 Gaining Higher Availability with Windows Server 2008 R2 Failover Clust...SVR208 Gaining Higher Availability with Windows Server 2008 R2 Failover Clust...
SVR208 Gaining Higher Availability with Windows Server 2008 R2 Failover Clust...
 
SVR205 Introduction to Hyper-V and Windows Server 2008 R2 with Microsoft Syst...
SVR205 Introduction to Hyper-V and Windows Server 2008 R2 with Microsoft Syst...SVR205 Introduction to Hyper-V and Windows Server 2008 R2 with Microsoft Syst...
SVR205 Introduction to Hyper-V and Windows Server 2008 R2 with Microsoft Syst...
 
SIA319 What's Windows Server 2008 R2 Going to Do for Your Active Directory?
SIA319 What's Windows Server 2008 R2 Going to Do for Your Active Directory?SIA319 What's Windows Server 2008 R2 Going to Do for Your Active Directory?
SIA319 What's Windows Server 2008 R2 Going to Do for Your Active Directory?
 
SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...
SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...
SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...
 
MGT310 Reduce Support Costs and Improve Business Alignment with Microsoft Sys...
MGT310 Reduce Support Costs and Improve Business Alignment with Microsoft Sys...MGT310 Reduce Support Costs and Improve Business Alignment with Microsoft Sys...
MGT310 Reduce Support Costs and Improve Business Alignment with Microsoft Sys...
 
MGT300 Using Microsoft System Center to Manage beyond the Trusted Domain
MGT300 Using Microsoft System Center to Manage beyond the Trusted DomainMGT300 Using Microsoft System Center to Manage beyond the Trusted Domain
MGT300 Using Microsoft System Center to Manage beyond the Trusted Domain
 
MGT220 - Virtualisation 360: Microsoft Virtualisation Strategy, Products, and...
MGT220 - Virtualisation 360: Microsoft Virtualisation Strategy, Products, and...MGT220 - Virtualisation 360: Microsoft Virtualisation Strategy, Products, and...
MGT220 - Virtualisation 360: Microsoft Virtualisation Strategy, Products, and...
 
CLI319 Microsoft Desktop Optimization Pack: Planning the Deployment of Micros...
CLI319 Microsoft Desktop Optimization Pack: Planning the Deployment of Micros...CLI319 Microsoft Desktop Optimization Pack: Planning the Deployment of Micros...
CLI319 Microsoft Desktop Optimization Pack: Planning the Deployment of Micros...
 
Windows Virtual Enterprise Centralized Desktop
Windows Virtual Enterprise Centralized DesktopWindows Virtual Enterprise Centralized Desktop
Windows Virtual Enterprise Centralized Desktop
 
Optimized Desktop, Mdop And Windows 7
Optimized Desktop, Mdop And Windows 7Optimized Desktop, Mdop And Windows 7
Optimized Desktop, Mdop And Windows 7
 

Dernier

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Dernier (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 

SVR402: DirectAccess Technical Drilldown, Part 2 of 2: Putting it all together.

  • 1.
  • 2. DirectAccess Technical Drilldown Part 2Putting it all together John Craddock Infrastructure & Security Architect XTSeminars Ltd Session Code: SVR402
  • 3. Part1: Internet to Intranet 6to4Host/Router 6to4Relay NAT Device Teredoserver & relay TeredoHost Internet Corporateintranet IPHTTPSserver IPHTTPSHost NAT Device
  • 4. Part1: IPv6/IPv4 Intranet IPv6 ISATAP Router Native IPv6 IPv6 NAT-PTor NAT64 IPv4 IPv6Pv4 IPv4 IPv6Pv4
  • 5. What’s Left? Internet Corporate Intranet  Tunnelling technologies for the Internet and Intranet to support IPv6 over IPv4  Internet tunnelling selection based on client location – Internet, NAT, firewall Encryption/authentication of Internet traffic (end-to-edge/end-to-end) PKI required Client location detection: Internet or corporate intranet
  • 6. Don’t Give Up Now Part 1 IPv6 Intro Transition Technologies End-to-end connectivity Part 2 IPsec Configuring Direct Access Network location and name resolution policies It all works – just like that!
  • 7. Demo Environment EX1 DC1 DNS DC, DNS,CA NAT1 DA1 Home Corporate intranet Internet IIS for CRLdistribution APP1 WIN7 WIN7 WIN7 All servers Windows 2008 R2
  • 8. Securing the Tunnel Internet Corporate Intranet DirectAccess uses IPsec to secure network traffic Traffic over the Internet is encrypted and authenticated Access via IPHTTPs is double encrypted Encrypted IPv6 within HTTPS
  • 9. IPsec to the Rescue IPsec is managed through Windows Firewall with Advanced Security Best deployed through group policy Connection rules create: IPsec tunnels (authenticated and encrypted) Authenticated connects (computer and user authentication Inbound / outbound rules set requirements for encryption
  • 10. Traffic Profile Traffic profile: <Protocol><source IP> <destination IP><source port> <destination port> Rules are based on a traffic profile Connection Security Rule Authenticate all TCP traffic between A & B on ports W & X Inbound/Outbound Rule Encrypt authenticated TCP traffic between A & B on ports W & X
  • 11. IPsec Primer Main modesecurity association Key life configurable Default: 8 hours Create shared secret between hosts AuthIP AuthIP Uses Diffie-Hellman Authenticate over secure channel AuthIP AuthIP Kerberos / certificatesComputer and/or user authentication AuthIP Establish IPSec session Keys Quick mode: IPsec SAKey life configurable Default 1 hour/100 MB Drops after 3 Mins of inactivity AuthIP AuthIP Create Security Association for session IPsec SA IPsec SA Integrity or Integrity + encryption Exchange data
  • 14. Data Exchange Protocol ID 51 Authentication Header (AH) contains: Protocol ID of payload (TCP/UDP/ICMP…) Sequence number – prevents replay Security Parameters Index – Identifies IPsec SA Integrity Check value (ICV) calculated with SHA1 or MD5 Signed - ignoring ICV field andfields that change in transport Protocol ID 50 Encrypted signed IP Header IP payload AH Encrypted Security Protocol ESP headers contain: Protocol ID of payload (TCP/UDP/ICMP…) Sequence number – prevents replay Security Parameters Index – Identifies IPsec SA Integrity Check value (ICV) IP Header ESP IP payload ESP ICV When you just want integrity through NAT use ESP-Null
  • 15. Negotiated Security Options Do not authenticate Request inbound and outbound A host responds to both IPsec and unauthenticated (non-IPsec) requests It initiates communications with IPsec, and if that fails, falls back to unauthenticated communications Require inbound and request outbound A host responds to inbound traffic secured by IPsec, and ignores unauthenticated requests It initiates communications with IPsec, and if that fails, falls back to unauthenticated communications Require inbound and require outbound A host requires IPsec-secured communications for both inbound and outgoing requests Require inbound and clear outbound
  • 16. Intranet Integrity / encryption / authentication IPsec Tunnel End points can be single host or act as a gateway The gateway acts as the end-point for integrity encryption and authentication Traffic on the Intranet is not protected by IPsec IPsec Gateway includes IPsec DoS Prevention Reduces DoS attacks from key management protocols IKE & AuthIP
  • 17. IPsec Access Options Intranet Integrity / encryption / authentication Tunnel 1: Machine Auth Tunnel 2: Machine & User Auth ESP NULL (transport mode) machine and user auth to intranet server Selective authentication onto endpoint servers ESP (transport mode) encryption and authentication to intranet server
  • 18. Client Location corp.example.com zone DNS 2 DNS 1 IP configuredDNS address Corporate Intranet Internet To resolve names on the Internet DirectAccess host queries DNS 1 To resolve names on the Intranet DirectAccess host queries DNS 2
  • 19. How Does It Do that? Name Resolution Policy Table (NRPT) to the rescue NRPT allows the definitions of which DNS servers to query based on the namespace to be resolved The NRPT can point DNS queries for corp.example.com to the intranet DNS server All other DNS queries are sent to the DNS server address configured in the client IP settings
  • 20. NRPT corp.example.com zone DNS 2 nls.corp.example.com DNS 1 IP configuredDNS address Internet Corporate Intranet No NRPT NRPT: corp.example.com: query DNS 2 All other name spaces query DNS server configured in client IP settings There is a special entry in the table to direct DNS queries for an internal HTTPS website to the DNS servers configured in the client IP settings For example: queries for nls.corp.example.com always go to IP configured DNS address and this is not resolvable on the internet
  • 22. NRPT Inside/Outside NRPT enabled by default If the client can access an internal HTTPS website (https://nls.corp.example.com) Considered to be on the intranet NRPT disabled No access to secure website Considered to be on the Internet NRPT remains enabled
  • 23. Putting it All Together 6to4Host/Router 6to4Relay ISATAP Router NAT Device Teredoserver & relay TeredoHost Corporateintranet Internet HTTPSserver IPHTTPSHost NAT Device DirectAccess Server
  • 25. Before Running Setup DNS server requires isatap block to be removed Computer certificates must be issued to computers Server certificates must be issued to DA server with external DNS name in certificate NLS web server with nlsurl address in certificate CRL distribution should be configured in certificate CRL distribution location must be available on both the Internet and intranet
  • 26. Authentication to Servers IPsec ESP NULL can be used for authentication to end-point servers Provides another layer of protection Can control which servers are available from DA host Requires 2008 end-point servers IPSEC does not work over IPv6 for Windows 2003 Two factor authentication can be enabled for end-to-end authentication Requires 2008 domain functional level
  • 27. DirectAccess Setup Configures on DA server 6to4 relay Teredo server and relay IPHTTPS server ISATAP Creates group policy for IPSec rules for DA server IPsec Tunnel DA client IPsec Tunnel DA clients and servers requiring end point authentication
  • 28. DirectAccess Setup (continued) Creates group policy for client configuration Enable and supply addresses for 6to4 relay Teredo server and relay IPHTTPS server Enable and configure NRPT Enable inside/outside probe DA server and DA clients must be members of the domain
  • 29. Windows DirectAccess The DA server represents a single point of failure Functionality can be split across multiple servers for performance For HA, run DA server as VM in a Hyper-v cluster Does not guarantee DA service availability Live Migration available in Windows 2008 R2 Load balancing option available with UAG
  • 30. All Done Internet Corporate Intranet  Tunnelling technologies for the Internet and Intranet to support IPv6 over IPv4  Internet tunnelling selection based on client location – Internet, NAT, firewall  Encryption/authentication of Internet traffic (end-to-edge/end-to-end) PKI required  Client location detection: Internet or corporate intranet
  • 31. Required Slide Speakers, TechEd 2009 is not producing a DVD. Please announce that attendees can access session recordings at TechEd Online. www.microsoft.com/teched Sessions On-Demand & Community www.microsoft.com/learning Microsoft Certification & Training Resources http://microsoft.com/technet Resources for IT Professionals http://microsoft.com/msdn Resources for Developers Resources
  • 32. Related Content Required Slide Speakers, please list the Breakout Sessions, TLC Interactive Theaters and Labs that are related to your session. Breakout Sessions: SVR401 DirectAccess Technical Drilldown, Part 1 of 2: IPv6 and Transition Technologies SIA306 Microsoft Forefront Unified Access Gateway: DirectAccess and Beyond SVR315 IPv6 for the Reluctant: What to Know Before You Turn It Off Interactive Theater Sessions: SVR08-IS End-to-End Remote Connectivity with DirectAccess
  • 33. My Sessions at TechEd Required Slide Speakers, please list the Breakout Sessions, TLC Interactive Theaters and Labs that are related to your session. Breakout Sessions: SIA319 What's Windows Server 2008 R2 Going to Do for Your Active Directory? SIA402 Recovery of Active Directory Deleted Objects and the Windows Server 2008 R2 Recycle Bin SVR401 DirectAccess Technical Drilldown, Part 1 of 2: IPv6 and Transition Technologies SVR402 DirectAccess Technical Drilldown, Part 2 of 2: Putting It All Together Interactive Theater Sessions: SVR08-IS End-to-End Remote Connectivity with DirectAccess
  • 34. Required Slide Complete an evaluation on CommNet and enter to win an Xbox 360 Elite!
  • 35.
  • 36. Required Slide © 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.