Logo
programming4us
programming4us
programming4us
programming4us
Home
programming4us
XP
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server
programming4us
Windows Phone
 
Windows Server

Windows Server 2008 R2 : Monitoring DMZ Servers with Certificates

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
3/19/2011 3:52:40 PM
Servers in an organization’s demilitarized zone (DMZ) are usually not domain members and, thus, cannot do automatic mutual authentication with the OpsMgr server. However, these servers are the most exposed in the organization and, thus, critical to be monitored. Thankfully, there is a well-defined process for using certificates to handle the mutual authentication.

Note

This topic also applies to machines that are workgroup servers or servers that are members of domains where there is no trust to the OpsMgr domain.


Monitoring servers in the DMZ requires an install of certificate-based mutual authentication. This process has a lot of steps, but is straightforward. To install and configure certificates to allow the DMZ servers to use mutual authentication, the following five major tasks need to be completed:

1.
Create a certificate template to issue the correct format of X.509 certificates for Operations Manager to use for mutual authentication.

2.
Request the root CA certificate to trust the CA and the certificates it issues. This is done for each DMZ server and possibly for the management servers if not using an enterprise CA.

3.
Request a certificate from the root CA to use for mutual authentication. This is done for each DMZ server and for each management server.

4.
Install the Operations Manager agent manually. This is done for each DMZ server.

5.
Configure the agent to use the certificate. This is done for each DMZ server and for each management server.

These various X.509 certificates are issued from a certificate authority, which could be a Windows Server 2008 R2 CA.

Creating a Certificate Template

This step creates a certificate template named Operations Manager that can be issued from the Windows Server 2008 R2 certification authority web enrollment page. The certificate template will support Server Authentication (OID 1.3.6.1.5.5.7.3.1) and Client Authentication (OID 1.3.6.1.5.5.7.3.2) as well as allow the name to be manually entered rather than autogenerated from Active Directory because the DMZ server will not be an Active Directory domain member.

The steps to create the security template are as follows:

1.
Log on to the CA, which is DC1.companyabc.com in this example.

2.
Launch Server Manager.

3.
Expand Roles, Active Directory Certificate Services, and select Certificate Templates (fqdn).

4.
Right-click the Computer template and select Duplicate Template.

5.
Leave the version at Windows 2003 Server, Enterprise Edition and click OK.

6.
On the General tab in the Template Display Name field, enter Operation Manager.

7.
Select the Request Handling tab and mark the Allow Private Key to Be Exported option.

8.
Select the Subject Name tab and select Supply in the Request option. Click OK at the warning.

9.
Select the Security tab, select Authenticated Users, and check the Enroll right.

10.
Click OK to save the template.

11.
Select the Enterprise PKI to expose the CA.

12.
Right-click the CA and select Manage CA.

13.
In the certsrv console, expand the CA, right-click Certificates Templates, then select New, Certificate Template to Issue.

14.
Select the Operations Manager certificate template and click OK.

The new Operations Manager template will now be available in the Windows Server 2008 R2 web enrollment page.

Requesting the Root CA Server Certificate

This allows the DMZ server to trust the Windows Server 2008 R2 CA. This does not need to be done on the OpsMgr management servers, as the Windows Server 2008 R2 CA is an enterprise CA and all domain members automatically trust it. If the CA is not an enterprise CA, the steps need to be completed for the management servers as well.

To request and install the root CA certificate on the DMZ server, execute the following steps:

1.
Log on to a DMZ server with local administrator rights.

2.
Open a web browser and point it to the certificate server, in this case https://dc1.companyabc.com/certsrv. Enter credentials if prompted.

3.
Click the Download a CA Certificate, Certificate Chain, or CRL link (shown in Figure 1).

Figure 1. Downloading a root CA certificate.

4.
Click the Download CA Certificate link. Note: If the certificate does not download, add the site to the Local Intranet list of sites in Internet Explorer.

5.
Click Open to open the CA certificate.

6.
Click Install Certificate to install the CA certificate.

7.
At the Certificate Import Wizard screen, click Next.

8.
Select Place All Certificates in the Following Store option button.

9.
Click Browse.

10.
Click the Show Physical Stores check box.

11.
Expand the Trusted Root Certification Authorities folder and select the local computer store.

12.
Click OK.

13.
Click Next, Finish, and OK to install the CA certificate.

14.
Close any open windows.

Repeat for all DMZ servers. Now the DMZ servers will trust certificates issued by the certification authority. The next step is to request the certificates to use for the mutual authentication for all servers.

Requesting a Certificate from the Root CA Server

Each of the management servers and the servers in the DMZ will need to be issued certificates to use for communication.

The steps to request a certificate are as follows:

1.
Log on as an administrator, then open a web browser and point it to the certificate server (in this case, https://dc1.companyabc.com/certsrv).

2.
Click the Request a Certificate link.

3.
Click the Advanced Certificate Request link.

4.
Click the Create and Submit a Request to This CA link.

5.
In the Type of Certificate Template field, select Operations Manager.

6.
In the Name field, enter the FQDN (fully qualified domain name) of the target server.

Note

Go to the actual server to get the name! On the server, go to Computer Properties, Computer Name. Copy the full computer name and paste it into the Name field of the form.

7.
Click Submit.

8.
Click Yes when you get the warning pop-up.

9.
Click Install This Certificate.

10.
Click Yes when you see the warning pop-up. The certificate is now installed in the user certificate store.

Note

The certificate was installed in the user certificate store, but needs to be in the local computer store for Operations Manager. The ability to use web enrollment to directly place the certificate into the local computer store was removed from the Windows Server 2008 web enrollment, so the certificate needs to be moved manually.

11.
Select Start, Run and then enter mmc to launch an MMC console.

12.
Select File and Add/Remove Snap-In.

13.
Select Certificates and click the Add button.

14.
Select My User Account and click Finish.

15.
Select Certificates again and click the Add button.

16.
Select Computer Account and click Next.

17.
Select the local computer, click Finish, and then click OK.

18.
Expand the Certificates – Current User, Personal, and select the Certificates folder.

19.
In the right pane, right-click the certificate issued earlier and select All Tasks, Export. The certificate can be recognized by the certificate template name Operations Manager.

20.
At the Certificate Export Wizard, click Next.

21.
Select Yes, Export the Private Key. Click Next.

22.
Click Next.

23.
Enter in a password and click Next.

24.
Enter in a directory and filename and click Next.

25.
Click Finish to export the certificate. Click OK at the pop-up.

26.
Expand the Certificates (Local Computer), Personal, and select the Certificates folder.

Note

If this is the first certificate in the local computer store, the Certificates folder will not exist. Simply select the Personal folder instead and the Certificates folder will be created automatically.

27.
Right-click in the right pane and select All Tasks, Import.

28.
At the Certificate Import Wizard, select Next.

29.
Click Browse to locate the certificate file saved earlier. Change the file type to Personal Information Exchange (.pfx) to see the file. Click Next.

30.
Enter in the password used earlier, select the Mark This Key as Exportable, and click Next.

31.
Click Next.

32.
Click Finish and then click OK at the pop-up to complete the import.

The preceding steps need to be completed for each DMZ server and for each management server.

Installing the Agent on the DMZ Server

The agent needs to be installed manually on each DMZ server. Normally, agents would be pushed by the Operations Manager console, but DMZ servers typically reside in the DMZ and are not members of the domain.

The steps to manually install the agent are as follows:

1.
Log on as an administrator and insert the OpsMgr 2007 R2 installation media.

2.
At the AutoPlay menu, select Run SetupOM.exe.

3.
Select Install Operations Manager 2007 R2 Agent from the menu.

4.
Click Next.

5.
Click Next to accept the default directory.

6.
Click Next to specify management group information.

7.
Type in the management group name and FQDN of the management server. Keep the default management server port as 5723. The example shown in Figure 2 has COMPANYABC as the management group name and omr2.companyabc.com as the management server.

Figure 2. Manually entered management group information.

8.
Click Next.

9.
Click Next at the Agent Action Account page to leave the local system as the action account.

10.
Click Install to complete the installation.

11.
When the installer is finished, click Finish.

The preceding steps need to be completed for each DMZ server.

The agent is installed, but will not communicate correctly with the management server. This is because the agent has not been configured to use the certificate for mutual authentication. This will be done in the next section.

Configuring the Agent to Use the Certificate

After the agent is installed, the agent still needs to be configured to use the correct certificate. The OpsMgr installation includes a utility called MOMCertImport.exe that configures the agent to use certificates for authentication and specifies which certificate in the local computer store to use. The tool does not do any validation checking of the certificate itself, so care needs to be taken that the correct certificate is selected.

The steps to configure the agent to use a certificate are as follows:

1.
Log on as an administrator on the DMZ server and insert the OpsMgr 2007 R2 installation media.

2.
At the AutoPlay menu, select Run SetupOM.exe.

3.
Select Browse This CD from the menu.

4.
Select the SupportTools directory and then the AMD64 directory.

Note

Windows Server 2008 R2 is a 64-bit operating system, so the AMD64 is the correct folder for the 64-bit binaries. If the procedure is being run for 32-bit servers, select the appropriate directory for the binaries such as i386.

5.
In the directory, double-click MOMCertImport.exe.

6.
In the pop-up window, select the certificate issued previously and click OK. The View Certificate button can be used to view the certificate details if the correct certificate is not obvious.

The Operation Manager service will restart automatically to have the certificate selection take effect. The preceding steps need to be repeated for each DMZ server and for each management server.

The Operations Manager event log can be viewed with the Windows Event Viewer. It is named Operations Manager and is located in the Applications and Services Logs folder in the tool. Any problems with the certificate will be shown in the log immediately following the start of the System Center Management service.

Other -----------------
- Integrating Client Access into Exchange Server 2010 Design
- Designing Exchange Server Infrastructure
- Designing Exchange Server Roles in an Exchange Server Environment
- Architecting an Enterprise-Level Exchange Server Environment : Determining Hardware and Software Components
- Designing Active Directory for Exchange Server 2010
- Active Directory Domain Services 2008 : View Cached Credentials on a Read-Only Domain Controller
- Active Directory Domain Services 2008 : Remove a User, Group, or Computer from the Password Replication Policy
- Active Directory Domain Services 2008 : Add a User, Group, or Computer to the Password Replication Policy
- Building BizTalk Server 2009 Applications : What are BizTalk schemas?
- Building BizTalk Server 2009 Applications : Setting up new BizTalk projects
 
 
Top 10
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
 
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server