Configurare VPN e Accesso
remoto con Small Business
Server 2003
5 maggio 2005 - 10:30
Agenda

VPN Basics



VPN a confronto



Client-to-LAN
LAN-to-LAN
VPN in dettaglio




La protezione delle comunicazioni di rete
Encryption overview
tunneling protocol
authentication
encryption
Le tecnologie di Windows Small Business
Server 2003 per VPN Client-to-LAN
Live Demo...
Che cosa è una VPN ?

Dal sito di Windows Server 2003
“Microsoft defines a virtual private
network as the extension of a
private network that encompasses
links across shared or public
networks like the Internet.”

http://www.microsoft.com/windowsserver2003/t
echinfo/overview/vpnfaq.mspx
Quali problemi abbiamo con una
comunicazione di rete che usa
connettività pubblica come Internet?
Identity
Spoofing
Data
Modification
Network
Monitoring
Man-inthe-Middle
Passwordbased
La soluzione: la cifratura dei dati
trasmessi
Encrypted IP Packet
 Encrypts


SSL
TLS
 Encrypts


Data at the Application Layer
Data at the Network Layer
Tunneling Protocol
IPSec
Virtual Private Networks
(VPN)
una applicazione delle
tecnologie di encryption
VPN Basics




Una tecnologia di encryption
Un metodo/protocollo di Tunneling
Una modalità di connessione e trasporto
(Client-to-LAN, LAN-to-LAN)
Un insieme di definizioni per




IP Addressing
Authentication
Authorization
Auditing
Crittografia

Encryption Keys & Algorithms
Encrypted IP Packet

Una tecnologia molto antica
Encryption Keys
Key type
Description
La stessa chiave è usata per cifrare e decifrare i
dati
Protegge i dati dall’intercettazione
Symmetric
Consiste in una chiave pubblica e una privata
La chiave privata è protetta e confidenziale, la
chiave pubblica è liberamente distribuibile
Asymmetric
Se viene usata la chiave privata per cifrare dei
dati, gli stessi possono essere decifrati
esclusivamente con la corrispondente chiave
pubblica, e vice versa
Utilizzi dell’encryption


implementa la riservatezza delle
comunicazioni
fornisce delle tecniche per realizzare
l’autenticazione dei soggetti della
comunicazione
Symmetric Encryption
Original Data
Cipher Text
Symmetric encryption:
Usa la stessa chiave per cifrare e decifrare
E’ spesso referenziata come bulk encryption
E’ intrinsicamente vulnerabile per il concetto di
“Shared secret”: la chiave è condivisa
Original Data
Utilizzi della symmetric encryption




Cifratura dei canali di trasmissione
Semplicità
Prestazioni
Gestione delle session-key dei protocolli
sicuri



SSL
Kerberos
...
Asymmetric (Public Key) Encryption
Requirement
Process
1. The recipient’s public key is retrieved
2. The data is encrypted with a symmetric
key
3. The symmetric key is encrypted with the
recipient’s public key
4. The encrypted symmetric key and
encrypted data are sent to the recipient
5. The recipient decrypts the symmetric
key with her private key
6. The data is decrypted with the
symmetric key
Utilizzi della Asymmetric encryption

Riservatezza delle comunicazioni (PK
Encryption)





spesso in congiunzione con session key
simmetriche
Identificazione degli estremi (soggetti)
della comunicazione (PK Authentication)
Algoritmi più complessi
Meno efficente della symmetric
Per un uso libero richiede la
distribuzione/pubblicazione delle chiavi
pubbliche
Public Key Encryption
2
Data
1 Alice Encrypts
Message with Bob’s
Public Key.
Encrypted Message is
Sent Over Network
3A78
Data
3A78
3 Bob Decrypts Message
with Bob’s Private Key.
Public Key Authentication
2
~*~*~*~
1 Alice Signs Message
with Her Private Key.
Message is Sent Over
Network
~*~*~*~
~*~*~*~
3 Bob Validates Message is From
Alice with Alice’s Public Key.
Dalla teoria alla pratica...
VPN Client-to-LAN:
Connecting Remote Users to a Corporate
Network
Corporate Network
VPN Server
Computer
Internet
VPN Tunnel
Remote User
VPN LAN-to-LAN:
Connecting Remote Networks to a Local
Network
Local Network
VPN Server
Computer
Internet
VPN Tunnel
VPN Server
Computer
Remote Network
VPN a confronto: LAN-to-LAN




prevede l’utilizzo di apparati/server che
gestiscono la comunicazione vpn e fanno
da gateway tra le due reti
encryption applicata solo nelle
comunicazioni tra i gateway (tunnelendpoint)
encryption simmetrica di tipo “Shared-Key”
IP Addressing  progettare
VPN a confronto: Client-to-LAN






è una tipica connessione uno (gateway/Access
Point) a molti (Client)
encryption applicata nelle comunicazioni tra il
gateway ed N client
encryption di tipo “Shared-Key” non adeguata
(distribuzione della chiave in N posti!)
può usare protocolli PPP-based (PPTP, L2TP)
per usare IPsec richiede tecniche di Asymmetric
encryption (PKI, certificati, ...)
IP Addressing  semplice ed integrato
Virtual Private Network
Protocols
PPTP*
L2TP**
Internetwork Must Be IP Based
Internetwork Can Be IP, Frame
Relay, X.25, or ATM Based
No Header Compression
Header Compression
No Tunnel Authentication
Tunnel Authentication
Built-in PPP Encryption
Uses IPSec Encryption
Internet
Client
PPTP or L2TP
Server
*PPTP: rfc 2637 - **L2TP: rfc 2661
Selecting a Tunneling Protocol
Features
Tunneling Protocol
PPTP
Support for NAT
User Authentication
X
X
Machine Authentication
Multi-Protocol Support
X
Stronger Security
Support for Non–Windows
2000–based Clients
X
L2TP/
IPSec
IPSec
Tunnel Mode
X
X
X
X
X
X
X
Authentication Protocols
Standard
Authentication Protocols
Extensible Authentication Protocols
Standard Authentication
Protocols
Protocol
Security
PAP
Low
The client and server cannot negotiate using
more secure validation
SPAP
Medium
Connecting a Shiva LANRover and Windows
2000–based client or a Shiva client and a
Windows 2000–based remote access server
CHAP
High
You have clients that are not running
Microsoft operating systems
High
You have clients running Windows NT version
4.0 and later or, Microsoft Windows 95 and
later
High
You have dial-up clients running Windows
2000, or VPN clients running Windows NT 4.0
or Windows 98
MS-CHAP
MS-CHAP
v2
Use when
Authentication
Extensible Authentication Protocols
 Allows
the Client and Server to Negotiate the
Authentication Method That They Will Use
 Supports Authentication by Using



MD5-CHAP
Transport Layer Security (TLS)
PEAP, Smartcard, ...
 Ensures
Support of Future Authentication Methods
Through an API
Encryption Protocols
Members of this group dial-in
profile can use IPSec 56-bit
Data Encryption Standard
(DES) or MPPE 40-bit data
encryption
Members of this group dial-in
profile can use IPSec 56-bit
DES or MPPE 56-bit data
encryption
Members of this group dial-in
profile can use IPSec Triple
DES (3DES) or MPPE 128-bit
data encryption
Windows Small Business
Server 2003
VPN setup & configuration
To Do List
VPN Client-to-LAN
A VPN extends the capabilities of a private network to
encompass links across shared or public networks, such as the
Internet, in a manner that emulates a point-to-point link
Windows Small
Business Server
VPN Client
VPN Server
1
VPN client calls the
VPN server
3
VPN server checks the
directory to authenticate
and authorize the caller
2
VPN server
answers the call
4
VPN server transfers
data
Architettura di deployment consigliata
SBS è (anche) un F i r e w a l l ! ! !
Posizioniamolo come tale nella rete
Interne
t
xDSL
Fibra ottica
ISDN
...
rete pubblica
(es: 193.205.245.24/29)
.2
Internet
Router
(ISP)
azienda.local
rete pubblica (con NAT)
(es: 192.168.0.0/24)
SBS
rete privata
192.168.16.0/24
Windows Small Business Server
Remote Access Wizard
This wizard provides on-screen instructions for configuring
your server for:
VPN connections
Dial-up connections
Both VPN and dial-up connections
After clicking Finish, the wizard:
Configures the server according to your selected settings
Creates the Client Connection Manager configuration file
Configures the remote access policy to allow members of the
Mobile Users group to use remote access



RASW
Client config (RWW)
RRAS configuration overview
Sicurezza e controllo




Remote Access Account Lockout
(KB816118)
Authorizing VPN Connections (Dial-in)
Remote Access Policy Profile Packet
Filtering
Accounting, Auditing, and Monitoring
Riferimenti e risorse

Risorse tecniche per Windows Small Business
Server 2003
http://www.microsoft.com/italy/windowsserver2003/sbs/techi
nfo/default.mspx

MOC Course 2395: Design, Deploy, and Manage a
Network Solution for a Small and Medium Business
http://www.microsoft.com/traincert/syllabi/2395AFinal.asp

Exam 70-282: Design, Deploy, and Manage a
Network Solution for a Small- and Medium-Sized
Business
http://www.microsoft.com/learning/exams/70-282.asp
Riferimenti e risorse

Virtual Private Networks for Windows Server 2003
http://www.microsoft.com/windowsserver2003/technologies/n
etworking/vpn/default.mspx

Virtual Private Networking with Windows Server
2003: Deploying Remote Access VPNs
http://www.microsoft.com/technet/prodtechnol/windowsserver
2003/technologies/networking/vpndeplr.mspx

Virtual Private Networking with Windows Server
2003: Deploying Site-to-Site VPNs
http://www.microsoft.com/technet/prodtechnol/windowsserver
2003/technologies/networking/vpndpls2.mspx
https://mseventseu.microsoft.com/cui/WelcomeP
age.aspx?Event...
© 2004 Microsoft Corporation. All rights reserved.
This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.
Scarica

bYTEBoss ConfigurareVPN_SBS03