IT tutorials
 
Windows
 

Windows Server 2008 : Perimeter Networks and Remote Access Strategies (part 3) - Designing a RADIUS Solution for Remote Access

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
1/8/2013 11:17:42 AM

4. Designing a RADIUS Solution for Remote Access

In designing a VPN solution, authentication of VPN clients becomes a paramount concern. In deciding which protocols to use for the tunnel and which authentication protocols are configured for access, the next step is how to manage the authentication of those users.

Managing authentication services for multiple services and for multiple points of access for each of these services rapidly becomes a drain on an administrator’s time. As the enterprise administrator, you can see the wisdom in centrally managing authentication and authorization of access to resources.

Microsoft has had an evolving RADIUS strategy ever since the introduction of Routing and Remote Access in Windows 2000 Server. Internet Authentication Service (IAS) was the next iteration and brought along huge improvements. One of the advances was support for a RADIUS proxy. With Windows Server 2008, the VPN and RADIUS solutions are now part of its newly renamed NPS.

NPS encompasses many facets of remote access services. It provides the following services:

  • RADIUS client

  • RADIUS proxy

  • RADIUS server

  • RADIUS accounting

  • VPN administration for access and polices

  • Primary console for administering NAP services

Therefore, when designing your RADIUS solution for VPNs and remote access policies, think about eventually using NAP because NPS plays a central role in this feature.

Designing a RADIUS Solution for the Main Office

In designing a RADIUS solution, consider all the components of a RADIUS infrastructure that provide authentication, authorization, and accounting. Starting with the access clients and all the way through the RADIUS infrastructure to the back-end user database, an enterprise administrator must carefully plot the location of each of these services. Figure 5 displays a real RADIUS design from a high-level overview.

Figure 5. RADIUS infrastructure, support elements, and example application support

From this overall design, you can see that RADIUS can support authentication for a variety of services and a variety of access client and access servers. Users of Web-based applications from either extranets with partners or publicly accessible application servers can be authenticated using the RADIUS client support built into ISA Server. VPN and dial-up clients can be authenticated through an NPS server configured as a RADIUS client. Finally, wireless clients, either guests or WLAN for the corporate environment, can also use the built-in RADIUS client support in wireless access points to relay RADIUS requests.

Deployment Location for RADIUS Services

Securing your RADIUS solution involves deploying only the essential services in the perimeter network and placing the rest of the services in the secured, internal network. Using Figure 5-5 as a basis for this discussion, you would want to place only the following services in the perimeter network while deploying the rest of the services behind the internal firewall:

  • ISA Server

  • Application servers (probably in a screened subnet connected to ISA Server, leaving any

    SQL servers containing the data inside the trusted environment)

  • VPN server

  • Wireless access point

  • RADIUS proxies

Planning RADIUS Communication

ISA Server has built-in capabilities to forward authentication requests to a RADIUS server to centralize authentication for users of published Web servers, Web application servers, and Windows SharePoint Services Web sites. The application servers can exist in a screened subnet or in the perimeter network but have access only through an authenticated request from ISA Server. The data that the application servers draw upon can be secured in SQL servers behind the internal firewall.

VPN servers with the NPS role installed can be set up as RADIUS clients and forward all requests to back-end RADIUS proxies. The VPN servers can use a RADIUS server group configuration to ensure high availability and load balancing of requests.

The wireless access points using 802.1x, WPA Enterprise, or WPA2 Enterprise authentication services act as RADIUS clients to forward all RADIUS requests through the RADIUS proxies. The RADIUS proxies then forward those requests to an internal RADIUS server.

Load Balancing and High Availability of a RADIUS Infrastructure

Using RADIUS proxies in your RADIUS design is a strong asset in a RADIUS solution for several reasons. There is a fine line between a RADIUS client and a RADIUS proxy. To the RADIUS client, the RADIUS proxy appears to be the RADIUS server where authentication would normally occur. Thus, the communication between the RADIUS clients and the RADIUS proxies is through the RADIUS protocol.

Typically, RADIUS clients do not have a reliable mechanism built into their client architecture for load balancing their requests across multiple RADIUS servers. Load balancing the RADIUS client requests is achieved by configuring some of the RADIUS clients to use specific RADIUS proxy servers as their primary RADIUS servers and configuring other RADIUS clients to use the remaining RADIUS proxy servers as their primary servers. Each of these two RADIUS client groups can then use the other’s primary RADIUS server as its secondary RADIUS server. This type of load balancing is sufficient for the front end of your RADIUS infrastructure. To load balance the back end, the RADIUS proxy servers load balance their requests by round robin with servers of a RADIUS server group.

NPS role service also provides the VPN server role. You can load balance the VPN service, if necessary, by creating an NLB cluster and ensuring that you set the port rule to single or network affinity. The port range for the port rule should encompass the proper TCP port (1723) for PPTP, the UDP ports (500/4500) for L2TP, and TCP port (443) for SSTP.


Designing a RADIUS Solution for Branch Office Remote Access

If your deployment design calls for distributed VPN remote access, the VPN servers can route their RADIUS requests to the central office’s RADIUS server. You can use RADIUS proxies if necessary. To secure the RADIUS communication from the VPN servers through a public network such as the Internet, you can use VPNs linking the branch offices to the main office to carry the RADIUS communication. Because the RADIUS protocol encrypts only select portions of the RADIUS protocol communication, be sure to encrypt the entire RADIUS communication pathway whenever you need RADIUS communication over great distances. This is another advantage that ISA Server delivers when you use it to secure access to the branch offices. ISA Server can also establish the secure VPN that can carry the RADIUS communication between the branch office VPN servers and the main office RADIUS servers.

Scaling RADIUS Authentication for Multiple Domains and Forests

If your enterprise requires you to authenticate VPN clients from different forests, you have another issue. RADIUS by default provides authentication for users from the same realm of which the RADIUS server is a member. To provide RADIUS authentication for multiple realms, trust relationships must be constructed, or a RADIUS proxy can enable authentication.

For multiple domains of the same forest, no extra trusts are required. For multiple domains with no trusts or one-way trusts, either create the needed trusts or employ a RADIUS proxy.

A RADIUS proxy can resolve the issue if trust relationships are not possible. A RADIUS server in a domain foreign to that of the user receives a RADIUS request for authentication. The RADIUS server without trusts in place with the foreign domain cannot forward the request to an appropriate realm to authenticate the user. By implementing a RADIUS proxy in the communication pathway, the RADIUS requests from the RADIUS clients in specific realms can be proxied to the correct RADIUS servers to provide a successful authentication for the user. Figure 6 displays the design details.

Figure 6. RADIUS proxies implemented to provide a successful multi-forest solution


5. Practice: Designing a RADIUS Solution for a Mid-Size Enterprise

You are the enterprise administrator at Contoso, Ltd. Contoso is a mid-size corporation with offices located in the southeastern United States and the Caribbean. As an enterprise administrator, you are charged with the task of constructing a VPN solution for all branch offices and the main office in Ft. Lauderdale, Florida, for Contoso.

With branch offices in Atlanta, Georgia; New Orleans, Louisiana; Orlando, Florida; St. Thomas in the Virgin Islands; and Grand Cayman in the Cayman Islands, Contoso employs over 2,000 employees. Offices in the United States are connected by the corporate wide area network (WAN). Offices in the Caribbean are connected by a site-to-site VPN connection to the Ft. Lauderdale office.

A single Active Directory Domain Services (AD DS) forest with two domains currently exists for Contoso. The two domains are contoso.com and caribbean.contoso.com. The Grand Cayman branch office is a recent acquisition from a competing firm, Fabrikam, Inc. Fabrikam has one Active Directory forest with one domain, fabrikam.com. You have already moved all Fabrikam domain controllers to the Ft. Lauderdale office in anticipation of centralized management. The branch office at Grand Cayman is being sent a read-only domain controller (RODC) for secure local authentication.

An overall goal is to provide a secure and efficient remote access solution for users in all offices. Certificate authentication of both users and computers is required for the remote access solution instead of the current user password–only authentication provided by MS-CHAP. No dialup services are offered because all users should connect to their offices through the Internet. Remote access is administered by each office. Administration of remote access policies must be simplified and duplicated on every VPN server. The remote access setup must allow users to authenticate to VPN servers at any of the branch offices or the main office.

Contoso wishes to enforce a level of health for all computers connecting through the VPN. Initially, only a monitored solution is needed to determine the extent of the security problems with VPN clients.

All domains are run internally by a mixture of Windows Server 2003 and Windows Server 2008 domain controllers. All VPN servers are running on Windows Server 2003.

▸ Exercise 1 Design the VPN Solution

In this exercise, you will review the current enterprise and, based upon the requirements for the new remote access solution, you will plan a new solution.

1.What are important factors to consider in the current environment when forming a remote access solution?
  • Multiple forests with no established trusts between them

  • Management’s desire to simplify the distributed management of the current authentication scheme used for remote access

  • Use of the Internet for all remote access connections

  • Employment of the highest security by all connections, implying a VPN connection

  • Security requirements to use a certificate-based authentication service

2.Which authentication protocols can you choose? Why?
  • EAP-TLS and PEAP-TLS are the only authentication protocols that provide certificate-based solutions.

3.Which VPN protocol should you use?
  • L2TP because it will provide the security required for both the computer and the user. SSTP provides a secure and encrypted tunnel using only a server certificate.

▸ Exercise 2 Design the RADIUS Solution

1.What are the primary considerations in moving the VPN connection toward a RADIUS solution in line with Contoso’s overall goals?
  • Windows Server 2003 VPN servers need to be upgraded to Windows Server 2008.

  • In the RADIUS solution, you must consider that a NAP solution will ultimately be deployed.

  • Remote access is currently administered in a distributed fashion. Central administration of remote access policies is a primary goal.

2.Which components are required of a RADIUS solution for each branch office and the main office?
  • For all U.S.-based branch offices, only a VPN server is necessary because it will act as the RADIUS client, forwarding the authentication requests to the Ft. Lauderdale–based RADIUS proxy servers.

  • For all Caribbean branch offices, only a VPN server is necessary because it, too, will act as a RADIUS client by forwarding the authentication requests to the Ft. Lauderdale–based RADIUS proxy servers.

  • At the Ft. Lauderdale main office, you need a hierarchy of VPN servers acting as RADIUS clients forwarding requests to RADIUS servers, along with RADIUS proxy servers receiving requests from the Cayman Islands, to forward those requests to the appropriate RADIUS servers in the appropriate domain.

 
Others
 
- Windows Server 2008 : Perimeter Networks and Remote Access Strategies (part 2) - Designing a Remote Access Strategy
- Windows Server 2008 : Perimeter Networks and Remote Access Strategies (part 1) - Designing the Perimeter Network
- Windows Server 2008 : Planning Application Deployment
- Windows 8 : The Start Screen - Sign In
- Windows 8 : The Start Screen - The Lock Screen
- Windows 7 : Using Gadgets (part 2) - Adding a Gadget More Than Once, Changing Opacity of Gadgets, Removing Gadgets
- Windows 7 : Using Gadgets (part 1) - Adding New Gadgets, Downloading New Gadgets
- Windows 8 : Customizing the Desktop and the User Interface - Working with Desktops and Startup Applications
- Windows 8 : Customizing the Desktop and the User Interface - Optimizing PC Settings
- Accessing the Windows Home Server 2011 Shared Folders (part 2) : Creating a Network Location in Windows 7 and Windows Vista, Accessing Shared Folders on Your Mac
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
Technology FAQ
- Is possible to just to use a wireless router to extend wireless access to wireless access points?
- Ruby - Insert Struct to MySql
- how to find my Symantec pcAnywhere serial number
- About direct X / Open GL issue
- How to determine eclipse version?
- What SAN cert Exchange 2010 for UM, OA?
- How do I populate a SQL Express table from Excel file?
- code for express check out with Paypal.
- Problem with Templated User Control
- ShellExecute SW_HIDE
programming4us programming4us