1. Trang chủ
  2. » Công Nghệ Thông Tin

Microsoft Windows Server 2003

110 352 0
Tài liệu đã được kiểm tra trùng lặp

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 110
Dung lượng 370,33 KB

Nội dung

Virtual Private Networking with Windows Server 2003: Deploying Remote Access VPNs Microsoft Corporation Published: April 1, 2003; Updated: October 7, 2005 Abstract Describes deployment of PPTP-based and L2TP/IPSec-based remote access VPNs. Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the example companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted herein are fictitious, and no association with any real company, organization, product, domain name, e-mail address, logo, person, place, or event is intended or should be inferred. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property. © 2005 Microsoft Corporation. All rights reserved. Microsoft, Active Directory, Windows, Windows NT, and Windows Server are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. All other trademarks are property of their respective owners. Contents Virtual Private Networking with Windows Server 2003: Deploying Remote Access VPNs 1 Abstract 1 Contents 3 Introduction to Virtual Private Networking with Windows Server 2003: Deploying Remote Access VPNs .9 Components of Windows Remote Access VPNs .11 VPN Clients .12 Connection Manager 13 Connection Manager Administration Kit .14 Connection Point Services .14 Single Sign-on .15 Installing a Certificate on a Client Computer 15 Design Points: Configuring the VPN client .16 Internet Network Infrastructure 16 VPN Server Name Resolvability 16 VPN Server Reachability 17 VPN Servers and Firewall Configuration 17 Design Points: VPN Server Accessibility from the Internet 18 Authentication Protocols .18 Design Point: Which Authentication Protocol to Use? 19 VPN Protocols 19 Point-to-Point Tunneling Protocol .20 Layer Two Tunneling Protocol with IPSec 20 Design Point: PPTP or L2TP/IPSec? 20 VPN Server 22 Design Points: Configuring the VPN Server .24 Intranet Network Infrastructure 26 Name Resolution 26 Design Points: Name Resolution by VPN Clients for Intranet Resources 27 Routing .28 VPN Client Routing and Simultaneous Intranet and Internet Access .30 Design Points: Routing Infrastructure .32 Quarantine Resources 32 AAA Infrastructure .33 Remote Access Policies .34 Conditions .35 Permission 35 Profile Settings 35 Preventing Traffic Routed from VPN Clients 36 Windows Domain User Accounts and Groups 38 Design Points: AAA Infrastructure 39 Certificate Infrastructure 40 Computer Certificates for L2TP/IPSec .40 Certificate Infrastructure for Smart Cards 41 Certificate Infrastructure for User Certificates 42 Design Points: Certificate Infrastructure .43 Deploying PPTP-based Remote Access 45 Deploying Certificate Infrastructure .45 Installing Computer Certificates .45 Deploying Smart Cards 46 Installing User Certificates 46 Deploying Internet Infrastructure .47 Placing VPN Servers in Perimeter Network or on the Internet 48 Installing Windows Server 2003 on VPN Servers and Configuring Internet Interfaces 48 Adding Address Records to Internet DNS 48 Deploying AAA Infrastructure 49 Configuring Active Directory for User Accounts and Groups .49 Configuring the Primary IAS Server on a Domain Controller .49 Configuring the Secondary IAS server on a Different Domain Controller 51 Deploying VPN Servers .52 Configuring the VPN Server's Connection to the intranet 52 Running the Routing and Remote Access Server Setup Wizard .52 Intranet Network Infrastructure 54 Configuring Routing on the VPN Server 54 Verifying Name Resolution and Reachability from the VPN Server 54 Configuring Routing for Off-subnet Address Pools 54 Quarantine Resources .55 Deploying VPN Clients 55 Manually Configuring VPN clients 55 Configuring CM Packages with CMAK .55 Deploying L2TP/IPSec-based Remote Access 56 Deploying Certificate Infrastructure .57 Deploying Computer Certificates .57 Deploying Smart Cards 58 Deploying User Certificates 58 Deploying Internet Infrastructure .59 Placing VPN Servers in Perimeter Network or on the Internet 60 Installing Windows Server 2003 on VPN Servers and Configuring Internet Interfaces 60 Adding Address Records to Internet DNS 60 Deploying AAA Infrastructure 61 Configuring Active Directory for User Accounts and Groups .61 Configuring the Primary IAS Server on a Domain Controller .61 Configuring the Secondary IAS Server on a Different Domain Controller .63 Deploying VPN Servers .64 Configuring the VPN Server's Connection to the Intranet 64 Running the Routing and Remote Access Server Setup Wizard .64 Intranet Network Infrastructure 66 Configuring Routing on the VPN Server 66 Verifying Name Resolution and Reachability from the VPN Server 66 Configuring Routing for Off-subnet Address Pools 66 Quarantine Resources .67 Deploying VPN Clients 67 Manually Configuring VPN clients 67 Configuring CM Packages with CMAK .67 Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003 .68 VPN Server in Front of the Firewall .69 Packet Filters for PPTP 70 Packet Filters for L2TP/IPSec 71 VPN Server Behind the Firewall 71 Packet Filters for PPTP 72 Filters on the Internet Interface .73 Filters on the Perimeter Network Interface .74 Packet Filters for L2TP/IPSec 75 Filters on the Internet Interface .75 Filters on the Perimeter Network Interface .76 VPN Server Between Two Firewalls 76 Appendix B: Alternate Configurations .77 Multiple Internet Function VPN Server 78 Single-Adapter VPN Server .79 Appendix C: Setting up a VPN Test Lab .80 Setting up the Infrastructure 80 DC1 82 IAS1 82 IIS1 .82 VPN1 83 CLIENT1 .84 VPN Test Lab Tasks 84 PPTP-based Remote Access .84 Create a User Account 85 Create the PPTP Connection .85 Make the PPTP Connection .85 Access Web server and File Share on the Intranet 85 Disconnect the PPTP Connection 85 L2TP-based Remote Access .86 Create a User Account 86 Create the L2TP Connection 86 Make the L2TP Connection 86 Access Web Server and File Share on the Intranet .86 Disconnect the L2TP Connection .87 RADIUS Authentication and Accounting 87 Configure IAS1 for VPN1 as a RADIUS Client .87 Configure IAS1 to Log Authentication Events .87 Configure VPN1 for IAS1 as a RADIUS Server 87 Make PPTP and L2TP Connections .87 Check the System Event Log for RADIUS Events .88 Check RADIUS Authentication and Accounting Logs 88 Remote Access Policies for Different Types of VPN Connections 88 Create Separate Remote Access Policies for PPTP and L2TP Connections 88 Make a PPTP Connection and Test Connectivity .89 Make an L2TP Connection and Test Connectivity .90 Check the System Event Log for IAS Events .90 Appendix D: Troubleshooting 90 TCP/IP Troubleshooting Tools 90 Authentication and Accounting Logging 91 Event Logging 91 IAS Event Logging .92 PPP logging .92 Tracing .92 Enabling Tracing with Netsh 92 Enabling Tracing Through the Registry 93 Oakley Logging 94 Network Monitor .95 Troubleshooting Remote Access VPNs 95 Connection Attempt is Rejected When it Should be Accepted 95 L2TP/IPSec Authentication Issues .99 EAP-TLS Authentication Issues .100 Connection Attempt is Accepted When it Should be Rejected 103 Unable to Reach Locations Beyond the VPN Server .104 Unable to Establish Tunnel 104 Appendix E: Deploying a Certificate Infrastructure .105 Certificate Revocation and EAP-TLS Authentication 107 Using Third-party CAs for EAP-TLS Authentication .109 Summary and Related Links .110 Related Links .110 9 Introduction to Virtual Private Networking with Windows Server 2003: Deploying Remote Access VPNs A virtual private network (VPN) is the extension of a private network that encompasses links across shared or public networks like the Internet. With a VPN, you can send data between two computers across a shared or public network in a manner that emulates a point-to-point private link (such as a long haul T-Carrier-based wide area network [WAN] link). Virtual private networking is the act of creating and configuring a virtual private network. To emulate a point-to-point link, data is encapsulated, or wrapped, with a header that provides routing information, which allows the data to traverse the shared or public network to reach its endpoint. To emulate a private link, the data is encrypted for confidentiality. Packets that are intercepted on the shared or public network are indecipherable without the encryption keys. The link in which the private data is encapsulated and encrypted is a VPN connection. Figure 1 shows the logical equivalent of a VPN connection. Figure 1: The logical equivalent of VPN connections 10 Users working at home or on the road can use VPN connections to establish a remote access connection to an organization server by using the infrastructure provided by a public network such as the Internet. From the user's perspective, the VPN connection is a point-to-point connection between the computer (the VPN client) and an organization server (the VPN server). The exact infrastructure of the shared or public network is irrelevant because it appears logically as if the data is sent over a dedicated private link. Organizations can also use VPN connections to establish routed connections with geographically separate offices or with other organizations over a public network such as the Internet while maintaining secure communications. A routed VPN connection across the Internet logically operates as a dedicated WAN link. With both remote access and routed connections, an organization can use VPN connections to trade long-distance dial-up or leased lines for local dial-up or leased lines to an Internet service provider (ISP). There are two types of remote access VPN technology in the Windows Server 2003 operating system: 1. Point-to-Point Tunneling Protocol (PPTP) PPTP uses user-level Point-to-Point Protocol (PPP) authentication methods and Microsoft Point-to-Point Encryption (MPPE) for data encryption. 2. Layer Two Tunneling Protocol with Internet Protocol security (L2TP/IPSec) L2TP uses user-level PPP authentication methods and IPSec for computer-level authentication using certificates and data authentication, integrity, and encryption. A remote access client (a single user computer) makes a remote access VPN connection that connects to a private network. The VPN server provides access to the entire network to which the VPN server is attached. The packets sent from the remote client across the VPN connection originate at the remote access client computer. The remote access client (the VPN client) authenticates itself to the remote access server (the VPN server) and, for mutual authentication, the server authenticates itself to the client. Computers running Windows Server 2003, Windows XP, Windows 2000, Windows NT version 4.0, Windows Millennium Edition, and Windows 98 operating systems can create remote access VPN connections to a VPN server running Windows Server 2003. VPN clients may also be any non-Microsoft PPTP client or L2TP client using IPSec. Note Using IPSec tunnel mode is not a remote access VPN technology supported by Microsoft VPN clients or servers due to the lack of an industry standard method [...]... VPN-capable Microsoft operating systems Table 1 VPN-Capable Microsoft Operating Systems VPN Tunneling Protocol Microsoft Operating System PPTP Windows Server 2003, Windows XP, Windows 2000, Windows NT version 4.0, Windows Millennium Edition, or Windows 98 L2TP/IPSec Windows Server 2003, Windows XP, Windows 2000, and Windows NT 4.0 Workstation, Windows Millennium Edition, and Windows 98 with Microsoft. .. by Windows Server 2003, Windows XP, Windows 2000, and Microsoft L2TP/IPSec VPN Client L2TP clients Design Point: PPTP or L2TP/IPSec? Consider the following when deciding between PPTP and L2TP/IPSec for remote access VPN connections: • PPTP can be used with a variety of Microsoft clients including Windows Server 2003, Windows XP, Windows 2000, Windows NT version 4.0, Windows Millennium Edition, and Windows. .. NAT-T Update for Windows XP and Windows 2000, and for previous versions of Windows with Microsoft L2TP/IPSec VPN Client Microsoft recommends that servers, such as VPN servers running Windows Server 2003, not be placed behind NATs For more information, see IPSec NAT-T is not recommended for Windows Server 2003 computers that are behind network address translators Computers running Windows XP SP2 by... clients running Windows XP and Windows 2000 support EAP-TLS • If you must use a password-based authentication protocol, use MS-CHAP v2 and enforce strong passwords using Group Policy MS-CHAP v2 is supported by computers running Windows Server 2003, Windows XP, Windows 2000, Windows NT 4.0 with Service Pack 4 and later, Windows Millennium Edition, and Windows 98 VPN Protocols Windows Server 2003 includes... NAT-T to connect to servers that are located behind a NAT This includes VPN server computers running Windows Server 2003 This default behavior can be modified with a registry setting For more information, see The default behavior of IPSec NAT traversal (NAT-T) is changed in Windows XP Service Pack 2 • L2TP/IPSec can be used with Windows Server 2003, Windows XP, Windows 2000, and Microsoft L2TP/IPSec... Therefore, a VPN server cannot be located behind a computer using ICS or the NAT routing protocol component when using a single IP address • L2TP/IPSec-based VPN clients or servers cannot be behind a NAT unless both the client and server support IPSec NAT Traversal (NAT-T) IPSec NAT-T is supported by Windows Server 2003, Windows XP Service Pack 2 (SP2), Windows XP Service Pack 1 (SP1) and Windows 2000... WINS server addresses configured on the VPN server 27 After the PPP connection negotiation is complete, Windows XP and Windows 2000 VPN clients send a DHCPInform message to the VPN server The response is relayed back to the VPN client and contains a DNS domain name, additional DNS server addresses for DNS servers that are checked before the DNS server configured through the PPP negotiation, and WINS server. .. connection from the VPN client The VPN server typically has two or more installed network adapters: one or more network adapters connected to the Internet and one or more network adapters connected to the intranet The configuration of a VPN server with a single network adapter is discussed in Appendix B With Windows Server 2003, Web Edition, and Windows Server 2003, Standard Edition, you can create... Routing and Remote Access Server Setup Wizard adds the DHCP Relay Agent routing protocol component and configures it with the IP address of the VPN server' s DHCP server so that DHCPInform messages sent by VPN clients running Windows XP and Windows 2000 and its response are properly relayed between the VPN client and the DHCP server of the VPN server However, configuring the VPN server as a DHCP client... by Windows XP clients includes the requesting of the DHCP Classless Static Routes DHCP option If configured on a Windows Server 2003 DHCP server, the Classless Static Routes DHCP option contains a set of routes representing the address space of your intranet that are automatically added to the routing table of the requesting client • The Connection Manager Administration Kit for Windows Server 2003 . Server 2003, Windows XP, Windows 2000, Windows NT version 4.0, Windows Millennium Edition, or Windows 98 L2TP/IPSec Windows Server 2003, Windows XP, Windows. variety of Microsoft clients including Windows Server 2003, Windows XP, Windows 2000, Windows NT version 4.0, Windows Millennium Edition, and Windows 98.

Ngày đăng: 28/10/2013, 01:15

TỪ KHÓA LIÊN QUAN

w