Logo
programming4us
programming4us
programming4us
programming4us
Home
programming4us
XP
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server
programming4us
Windows Phone
 
Windows Server

Windows Server 2003 : Monitoring Network Protocol Security (part 1) - Understanding IPSec & Negotiation Configuration

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
3/24/2011 6:16:04 PM
When the network appears to be running smoothly, you might be tempted to kick off your shoes, put your feet on the desk, lace your hands behind your neck, and breathe a deep sigh of relief. However, now is the time to monitor network security protocol activity—if you don’t know what normal traffic looks like, how will you recognize the abnormal? How will you know when there are problems you must resolve and whether attacks are underway? How will you be able to use your diagnostic tools to find out why something is not happening correctly and what you must do to fix it? If some problems are masked by the resiliency of your network, it is far better to find them now, before they become downtime or disaster.

This is the perfect time to learn to use those utilities and tools that might help when your network goes down; when the VP of Marketing cannot log on to the domain; when no connection can be made to the Accounting database; when the boss is on line 2 and everyone else is standing around looking expectantly at you.

This lesson provides information on the tools available to monitor network security protocols. It tells you how to use them, and in doing so provides insight into the protocols themselves.

Understanding IPSec

IPSec is a complex protocol that you can use for the following tasks:

  • Authenticate and encrypt traffic between two computers

  • Block specific traffic from entering or leaving a computer

  • Allow specific traffic to enter or leave a computer

The specifics of the protocol and how it works are defined in a large number of Internet Engineering Task Force (IETF) Requests for Comments (RFC). These RFCs detail the standards by which the protocol should be implemented, and, if published in book form, would fill hundreds of pages.

See Also

To make an exhaustive study of IPSec, you can read these RFCs: 3457, 3456, 3281, 3193, 2857, 2709, 2451, and approximately 22 more; you can obtain copies at http://www.ietf.org.


However, you do not need to know the intimate details to understand the basics of how IPSec works, to implement an IPSec policy in Windows Server 2003, and to monitor its activity to ensure that it is protecting traffic. Several tools are available to help you do so, including these:

  • The IP Security Monitor snap-in

  • The graphical user interface (GUI)-based IP Security Policy Management tool available as a snap-in or in a GPO

  • Netsh

  • Netdiag

  • Event logs

A brief overview of IPSec will assist your work.

Understanding How IPSec Works

You can think of IPSec policies as a collection of packet filters that enforce security policy on IP traffic. Each filter describes some network protocol action. If traffic leaving or arriving at the device (a computer or other IP network device) on which the policy is active matches one of the filters, the traffic is either blocked, allowed, or, before it can proceed, an IPSec connection is negotiated between the sending and receiving devices.

Filters can be the receipt or initialization of a specific protocol, a connection request from or to a specific device, or another action that can be determined by protocol, port, IP address, or range. These filters are defined in the IPSec policy in a rule. Example filters might include the following:

  • All traffic from IP address 192.168.5.77

  • All traffic to IP address 192.168.5.101

  • All traffic on port 23, telnet’s default port

  • Traffic from 192.168.6.99 on port 23

Filters are combined into filter lists, which are, in turn, part of rules. Each rule also defines a filter action and potentially extensive configuration information that defines the specifics to be used for negotiating an IPSec connection. Filter actions are Block, Allow, or Negotiate Security. Each rule can have only one filter action, but a policy can be made up of many rules.

For example, if the result required is that only telnet sessions that originate from a specific computer will be accepted and must be encrypted, two rules should be written: one to block all telnet traffic and the other to negotiate telnet traffic from that specific computer. When an IPSec policy is evaluated, the more specific rule will take precedence. If the telnet traffic originates with the specified computer, the communication is negotiated, and, assuming the policy configuration matches where necessary, allowed to proceed. If the traffic originates from any other IP address, because no specific rule exists for the address, the more general rule is triggered and the communication will be blocked.

New IPSec Features for 2003

IPSec is natively available and can be used to protect network communications for Microsoft Windows 2000, Microsoft Windows XP Professional, and Windows Server 2003. A legacy client is available for Microsoft Windows NT 4, Microsoft Windows 98, and Microsoft Windows Millennium Edition (Me). You can download the legacy client from http://www.microsoft.com/windows2000/server/evaluation/news/bulletins/l2tpclient.asp. New features for IPSec include the following:

  • The IP Security Monitor snap-in improves on the Ipsecmon.exe tool in Windows 2000. (New in Windows XP Professional and Windows Server 2003.)

  • A stronger cryptographic master key is introduced, Diffie-Hellman 2048-bit.

  • The Netsh command-line management tool provides convenience, plus many configuration possibilities that are not available from the IP Security Policy Management snap-in.

  • Computer startup security (or stateful filter), if configured, is activated at startup and manages network traffic during startup. It allows only the outbound traffic that the computer initiates during startup, inbound traffic sent in response to the outbound traffic, and DHCP traffic.

  • The persistent policy is applied if the local policy or the Active Directory directory service IPSec policy cannot be applied.

  • Only Internet Key Exchange (IKE) traffic is exempt from traffic filters. This restriction is required in order to establish secured communication.

  • Certain restrictions determine which computers are allowed to connect by domain, by certificate origin, or by computer group.

  • The name of the certificate authority (CA) can be excluded from certificate requests to prevent exposure of information on computer trust relationships such as domain, CA, and company.

  • Logical addressing is applied for local IP configuration—such as DHCP server, DNS, and WINS—to accommodate dynamic addressing.

  • IPSec functionality over NAT lets Encapsulation Security Payload (ESP) packets pass through Network Address Translations (NATs) that allow User Datagram Protocol (UDP) traffic.

  • Integration with Network Load Balancing has improved, which is good for load balancing IPSec-based virtual private network (VPN) services.

  • Support is provided for the Resultant Set Of Policy (RSoP) snap-in to view existing IPSec policy assignments.


Negotiation Configuration

Negotiation is the process that determines which IPSec subprotocol will be used, and what specifics, such as key strength and cryptographic algorithms, will be used. Next is a list of the basic choices available to you when you configure an IPSec policy. You can make these choices by using the IPSec wizards, by editing a policy in the IP Security Policies snap-in or in Group Policy, or by using the Netsh command-line tool. Additional options are available when you configure policy using the Netsh command. The exercises at the end of this lesson show you how to use the provided wizards to write a policy, and you also learn how to find these elements in the GUI. In the exercises using Netsh, simply set them in the commands.

  • Authentication How the computers involved prove their identity.

  • Connection type Where the policy is active.

  • Diffie-Hellman group The size of the prime numbers used in the Diffie-Hellman master key calculation.

  • Filters Each filter list can contain many filters. Filters include Protocol, Source Port, Source IP Address, Source Mask, Source DNS Name, Destination Port, Destination DNS, Destination IP Address, and Destination Mask.

  • Filter Actions What happens when the filter is triggered.

  • IKE encryption protocol How IKE packets are encrypted.

  • IKE integrity protocols How IKE packets are protected to ensure data has not been changed during transport.

  • IKE security method How IKE is negotiated.

  • IP Security Rules Many rules can be defined.

  • IP Filter Lists Many filter lists can be defined.

  • Master Key Perfect Forward Security If selected, the master key will be recalculated for every sessions.

  • Tunnel Setting Whether the traffic uses a tunnel.

Note

Many people have trouble understanding filter actions. They especially have trouble distinguishing between Request Security and Require Security. Require Security, if chosen, accepts unsecured communication but always responds using IPSec. If the client cannot speak IPSec, then the conversation ends there. It is as if you speak only English and another person speaks only Spanish. You ask a question and the other person responds, but you cannot understand. Request Security is different. Although the computer responds to a non-IPSec request by using IPSec, if the other computer does not answer using IPSec, the first one drops back and does not use IPSec. The communication can continue.

Other -----------------
- SharePoint 2010 : Getting to Know the Excel Services Service Application
- Using Windows PowerShell in an Exchange Server 2010 Environment : Managing Cmdlets
- Using Windows PowerShell in an Exchange Server 2010 Environment : Creating Your Own Scripts
- Windows Server 2008 R2 : Installing Windows Deployment Services (part 3)
- Windows Server 2008 R2 : Installing Windows Deployment Services (part 2)
- Windows Server 2008 R2 : Installing Windows Deployment Services (part 1) - Configuring the WDS Server
- Windows Server 2008 R2 Windows Deployment Services
- Windows Server 2008 R2 Administration Tools for Desktops : Operating System Deployment Options
- Windows Server 2008 R2 Administration Tools for Desktops : Managing Desktops and Servers
- Backing Up Windows Server 2008 (part 2) - Individual Component Backup
 
 
Top 10
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
 
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server