Chapter 8 - IPsec

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 29

Advanced Server Management

Chapter 8

Internet Protocol Security (IPsec)

1
Chapter Overview

Configuring IPsec Enforcement for NAP


Overview of IPsec
• IPsec VPN Components and Operations
• IPsec Authentication and Encryption Options
• Authentication Methods
• IPsec Modes
• IPsec Scenarios
• Configuring Connection Security Rules
• Monitor IPsec Activity
• IPsec troubleshooting process

2
What is Internet Protocol Security (IPsec)?

 IPsec is a set of protocols that helps protect data over a

network.
 It is an open-standards framework for securing network

communications.
 IPsec is built in to most operating systems.
 IPsec helps provide much better security than previous

protection methods.
 Network administrators who use it do not have to

configure security for individual programs.

3
What is Internet Protocol Security (IPsec)?
What Is IPSec?

Can use security


protocols to encrypt or
digitally sign traffic

Tunnel Mode
Can use tunnel mode to
secure traffic between
two networks
Router Router

Transport Mode
Can use transport mode
to secure traffic between
any two hosts
Router
4
IPsec VPNs

VPN Benefits:
• Remote Access

• Cost Savings

• Enhanced Security

• Monitor all activity

• Scalability

5
IPsec VPNs

6
IPsec Technologies

IPsec Implementation
IPsec Framework Examples

7
Confidentiality
Confidentiality with Encryption:

8
Confidentiality (Cont.)
Encryption Algorithms:

9
Integrity
Hash Algorithms

Security of Hash
Algorithms

10
Authentication

Peer Authentication
Methods

PSK

11
Authentication (Cont.)
RSA

12
Secure Key Exchange
Diffie-Hellman Key Exchange

13
IPsec Protocol Overview

14
Authentication Header
AH Protocols

15
Authentication Header (Cont.)

Router Creates Hash and


Transmits to Peer

Peer Router Compares


Recomputed Hash to Received
Hash
16
ESP

17
ESP Encrypts and Authenticates

18
Transport and Tunnel Modes

Apply ESP and AH in Two


Modes

19
Transport and Tunnel Modes (Cont.)

ESP Tunnel Mode

20
NAP with IPsec Enforcement Components

You can implement NAP with IPsec enforcement by


configuring the following components:
• Certification authority
• HRA server
• Computer running NPS role
• IPsec enforcement client

21
How IPsec Enforcement Works

IPsec NAP enforcement includes:


• Policy validation

• NAP enforcement

• Network restriction

• Remediation

• Ongoing monitoring of compliance

22
IPsec Enforcement for Logical Networks

 IPsec enforcement divides a physical network into three


logical networks.
 A computer is a member of only one logical network at
any time.
 The logical networks are defined in terms of which
computers have health certificates and which computers
require IPsec authentication with health certificates for
incoming communication attempts.
 The logical networks allow for limited network access and
remediation and provide compliant computers with a
level of protection from noncompliant computers.

23
IPsec Enforcement for Logical Networks

 Secure network. The set of computers that have health certificates


and require that incoming communication attempts use health
certificates for IPsec authentication.
 Boundary network. The set of computers that have health
certificates but do not require incoming communication attempts to
use health certificates for IPsec authentication. Computers in the
boundary network must be accessible to computers on the entire
network.
 Restricted network. The set of computers that do not have health
certificates, such as noncompliant NAP client computers, guests on
the network, or computers that are not NAP-capable, such as
computers running Windows versions that do not support NAP, or
computers running the Mac operating system, or UNIX-based
computers.
24
IPsec Enforcement for Logical Networks

25
Recommended Uses of IPsec

• Authenticating and encrypting host-to-host traffic


• Authenticating and encrypting traffic to servers
• L2TP/IPsec for VPN connections
• Site-to-site tunneling
• Enforcing logical networks

26
Tools You Can Use to Monitor IPsec

• IP Security Monitor
• IPsecmon
• Windows Firewall with Advanced Security MMC
• Detailed IKE tracing using Netsh

27
IPsec Troubleshooting Process

• Stop the IPscc Policy Agent and use the ping command to verify
communications
• Verify firewall settings.
• Start the IPsec Policy Agent and use IP Security Monitor to determine
if a security association exists.
• Verify that the policies are assigned.
• Review the policies and ensure they are compatible.
• Use IP Security Monitor to ensure that any changes are applied.

28
Thanks!

29

You might also like