Windows Server 2008 R2 Unleashed (167 page)

Windows Server 2008 R2 RRAS Features and Services

Windows Server 2008 R2 builds on the Routing and Remote Access features that were

provided by Windows NT 4.0, Windows 2000 Server, Windows Server 2003, and Windows

Server 2008. Routing and Remote Access in Windows Server 2008 R2 includes all of the

VPN features and services from previous versions of the Windows Server product and adds

several key features.

The following VPN features were provided by Windows NT 4.0:

. IP packet filtering

. Point-to-Point Tunneling Protocol (PPTP) support for router-to-router VPN connections

. Routing and Remote Access administrative tool and the Routemon command-line

utility

852

CHAPTER 24

Server-to-Client Remote Access and DirectAccess

The following additional VPN features were provided by Windows 2000 Server:

. Layer 2 Tunneling Protocol (L2TP) over Internet Protocol Security (IPSec) support for

router-to-router VPN connections and remote access.

. Demand-dial routing that can route IP and Internetwork Packet Exchange (IPX) over

on-demand or persistent wide area network (WAN) links, such as analog phone lines,

Integrated Services Digital Network (ISDN), or over VPN connections that use either

PPTP or L2TP over IPSec.

. RRAS integration that provides the capability to integrate a firewall with RRAS and

Network Address Translation (NAT) functions.

Windows Server 2003 continued the evolution of RRAS by adding some new features.

Some of the Routing and Remote Access Service for Windows Server 2003 features

included the following:

. Quarantine Policy Check.

. Improved administration and management tools that use a Microsoft Management

Console (MMC) snap-in or the Netsh command-line tool.

Windows Server 2008 added new VPN functionality and improved on some of the existing

ptg

functionality. The features new in Windows Server 2008 included the following:

. Network Policy Server (NPS) to provide access control and to assess, validate, and

remediate the health of clients; this replaces the Windows Server 2003 Quarantine

Policy Check.

. Secure Socket Tunneling Protocol (SSTP) to provide for HTTPS VPN tunnels over port

443 to seamlessly provide connectivity over firewalls, NAT, and web proxies.

. Point-to-Point Protocol (PPP), which now supports the use of Protected EAP (PEAP)

with PEAP-MS-CHAP v2 and PEAP-TLS for better security.

. Full IPv6 support in addition to IPv4 support, both of which coexist completely.

. New Connection Manager Administration Kit (CMAK) features, such as multiple

language support.

. Connection Manager, which now supports Dynamic DNS client registration.

. Network Diagnostics Framework Client-based connections to support basic diagnos-

tics capabilities with the Network Diagnostics Framework.

. New cryptographic L2TP/IPSec-based VPN connections, which now support the

Advanced Encryption Standard (AES) with 128- and 256-bit keys.

. Windows Server 2008 R2 shows evolutionary progress in the area of remote access.

. VPN Reconnect enables users to transparently reconnect to traditional VPN connec-

tions even when roaming or changing networks, which is made possible through the

implementation the IKEv2 mobility function, MOBIKE.

VPN in Windows Server 2008 R2

853

Components Needed to Create a Traditional VPN Connection

A point-to-point link, or tunnel, is created by encapsulating or wrapping the data with a

header that provides routing information that allows the data to travel through the

Internet. A virtual private network connection requires a VPN client and a VPN server or

infrastructure. A secured connection is created between the client and server through

24

encryption that establishes the tunnel, as shown in Figure 24.3.

Internet

VPN Client

unnel

VPN T

RRAS

Server

Internal Network

ptg

NPS

Certificate

Active

Server

Server

Directory

Server

FIGURE 24.3

Establishing a VPN tunnel between a client and server.

The tunnel is the portion of the connection in which data is encapsulated. The VPN

connection is the portion of the connection where the data is encrypted. The data encap-

sulation, along with the encryption, provides a secure VPN connection.

NOTE

A tunnel that is created without the encryption is not a VPN connection because the

private data is sent across the Internet unencrypted and can be easily read. This vio-

lates the “P” for Private in a Virtual Private Network (VPN).

The figure also depicts the roles in a typical Windows 2008 VPN infrastructure. The roles

in Windows Server 2008 R2 consist of the following:

. VPN client

. RRAS server

854

CHAPTER 24

Server-to-Client Remote Access and DirectAccess

. NPS server

. Certificate server

. Active Directory server

These roles work together to provide the VPN functionality.

A shared or public internetwork is required to establish a VPN connection. For Windows

Server 2008 R2, the transit internetwork is always an IP-based network that includes the

Internet as well as a corporation’s private IP-based intranet.

The topics and examples in this chapter utilize Certificate Services, Network Policy Server,

and Network Access Protection to secure VPN access. The details of the Certificate

Authority, the Network Policy Server, and Network Access Protection in Windows Server

2008 R2 are covered in Chapter 15, “Security Policies, Network Policy Server, and Network

Access Protection.” Please refer to that chapter for in-depth coverage of these topics.

The VPN Client

A VPN client is a computer that initiates a VPN connection to a VPN server. Microsoft

clients, including Windows NT 4.0, Windows 9x, Windows 2000, Windows XP, Windows

Vista, and Windows 7, can create a remote access VPN connection to a Windows Server

ptg

2008 R2 system.

VPN clients can also be any non-Microsoft PPTP client or L2TP client using IPSec.

The RRAS Server

An RRAS server is a Windows Server 2008 R2 server with the Network Policy and Access

Services role installed and the Routing and Remote Access Service role services installed.

This is the server that accepts VPN connections from VPN clients. The RRAS server name

or IP address must be resolvable as well as accessible through corporate firewalls, which

could be by either having a network interface connected to the demilitarized zone (DMZ)

or by providing the appropriate access rule on the firewall.

The NPS System

The Network Policy Server (NPS) provides the authentication, authorization, auditing, and

accounting for the VPN clients. The NPS system has the Network Policy and Access

Services role installed with the Network Policy Server role service installed. In Windows

Server 2008, NPS was an English-only solution. In Windows Server 2008 R2, support is

added for non-English character sets.

The Network Policy Server (NPS) is used to enforce network access policies for client

health, client authentication, and client authorization. NPS works with Network Access

Protection (NAP), which is a technology to manage, enforce, and remediate client health.

The NPS service provides the policies for NAP to validate against. NPS also has multiple

templates for larger-scale deployments or configuring multiple NPS servers identically.

VPN in Windows Server 2008 R2

855

In NAP, System Health Agents (SHAs) are used to inspect and assess the health of clients

according to policies. System Health Validators (SHVs) are the policies that the agents vali-

date against.

The Windows Security Health Agent is the SHA in Windows 7 and the Windows Security

Health Validator is the SHA in Windows Server 2008 R2. These provide the following

24

features in their SHVs:

. Firewall software installed and enabled

. Antivirus software installed and running

. Current antivirus updates installed

. Antispyware installed and running

. Current antispyware updates installed

. Microsoft Update Service enabled

These are configured in the client health policies or SHVs on the NPS. When a client

attempts a connection, the client SHA will send a Statement of Health (SoH) to the NPS

system. The SoH is compared with the health policy, resulting in a pass or a fail. Based on

that result, the NPS does one of four actions. In the case of a pass (that is, the client is

ptg

healthy), it just allows the client to connect. In the case where the SoH fails the policy

comparison (that is, the client is unhealthy), the NPS can prevent the client from connect-

ing, connect the client to a restricted network, or even allow the client to connect even

though it is unhealthy, as shown in Table 24.1.

TABLE 24.1

NPS Actions

SoH Versus

NPS Action

Policy

Passes

Client is allowed to connect.

Fails

Client is not allowed to connect; client is connected to a restricted network; or

client is allowed to connect even if it is deemed unhealthy.

When a client fails and is not allowed to connect, that is straightforward. When the client

fails and is connected to a restricted network, this allows the client to connect to secured

remediation servers to download software, patches, and/or updates to be remediated. The

SHA can even conduct remediation automatically and then allow the client to connect.

Interestingly, in some cases, the client might fail and yet the policy still allows it to

connect. This might be for reporting purposes.

Additionally, third-party SHVs and SHAs can be written that access the NAP application

programming interface (API).

Remediation server groups can be configured to restrict noncompliant VPN clients to just

those servers where software and updates are stored. After the appropriate software and

856

CHAPTER 24

Server-to-Client Remote Access and DirectAccess

updates are applied that bring the client into compliance, the NPS will allow the clients

full access to the network.

This server handles VPN client authentication requests for the RRAS server and validates

those requests against its policies. This allows for a centralized policy and access control,

while allowing the RRAS server role to be scaled out as needed.

See Chapter 15 for more details on the NPS system and NAP technologies.

Certificate Server

The certificate server is a Certificate Authority (CA) that issues certificates for the servers

and clients to use in the authentication and encryption of tunnels. In Windows Server

2008 R2, this is a Windows Server 2008 R2 server with the Active Directory Certificate

Services role installed with the Certification Authority and the Certification Authority

Web Enrollment role services installed. These roles also require some other supporting

roles to be installed, such as the Web Server (IIS) role and the File Services role.

Using Windows Server 2008 R2 allows the administrator to issue and control certificates

for the VPN infrastructure. This could also be handled by a third-party CA such as

VeriSign, thereby not requiring a server albeit at an annual cost.

ptg

Although not a requirement for all configurations of the VPN infrastructure, certificates

are considered a best practice to enhance the security of the VPN infrastructure. An AD

certificate server is always required for DirectAccess deployment. Later in the chapter, we

review the various VPN protocols and the role that certificates play in them.

Chapter 15 provides more details on the certificate server.

Active Directory Server

The Active Directory server provides the authentication database for the VPN client users.

In Windows Server 2008 R2, this is a server with the Active Directory Domain Services

role installed.

Authentication Options to an RRAS System

Authentication in any networking environment is critical for validating whether the indi-

vidual wanting access should be allowed access to network resources. Authentication is an

important component in the Windows Server 2008 R2 security initiative. Windows Server

2008 R2 can authenticate a remote access user connection through a variety of PPP

authentication protocols, including the following:

. Password Authentication Protocol (PAP)

. Challenge-Handshake Authentication Protocol (CHAP)

. Microsoft Challenge Handshake Authentication Protocol (MS-CHAP)

. MS-CHAP version 2 (MS-CHAP v2)

Authentication Options to an RRAS System

857

. Extensible Authentication Protocol (EAP)

. Protected Extensible Authentication Protocol (PEAP)

Authentication Protocols for PPTP Connections

For PPTP connections, only four authentication protocols (MS-CHAP, MS-CHAP v2, EAP,

24

and PEAP) provide a mechanism to generate the same encryption key on both the VPN

client and VPN server. Microsoft Point-to-Point Encryption (MPPE) uses this encryption

key to encrypt all PPTP data sent on the VPN connection. MS-CHAP and MS-CHAP v2 are

password-based authentication protocols.

Other books

Babel-17 by Samuel R. Delany
Strike (Completion Series) by Roberts, Holly S.
The Warning by Davis Bunn
Deus Ex - Icarus Effect by James Swallow
Handcuffed by Her Hero by Angel Payne
Clay Pots and Bones by Lindsay Marshall