Remote Access Dial-InUser Services(RADIUS)
Centralizing Authentication Using IAS
RADIUS Authentication
RADIUS is a protocol that enables centralized authentication,authorization, and accounting for network access
RADIUS can be used to-Centrally manage network access for VPN, dial-up, and wireless networks-Process connection requests or accounting messages from RADIUS clients or proxies
Windows Implementation of RADIUS
Internet Authentication Service (IAS) is the Microsoftimplementation of a RADIUS server
Configure IAS to support-Dial-up corporate access-Extranet access for business partners-Internet access-Outsourced corporate access through service providers
Centralized Authentication & Policy Management
1.Dials in to a local RADIUS clientto gain network connectivity2.Forwards requests to a RADIUS server3.Authenticates requestsand stores accountinginformation4.Communicates to the RADIUSclient to grant or deny access
Network Access Quarantine
What is Network Access Quarantine
Network Access Quarantine can prevent remote accessclients from accessing resources until they conform to thecorporate IT policies
Some of the standards that NAQ can be used to safeguard-Appropriate virus definition-Latest service packs and hotfixes-Routing disabled-Firewall installed-Password-protected screensaver
Requirements for Network Access Quarantine
How Network Access Quarantine Works
NAQ process-Client connects using a CM profile-Routing and Remote Access validates the authentication request-MS-Quarantine-IPFilter and MS-Quarantine-Session-Timeoutsettings are applied to the connection-CM profile runs the post-connect script and executes Rqc.exe ifvalidation is successful-Rqs.exe on the server verifies the script version sent by Rqc.exe todetermine if it was valid-If Rqs.exe determines that the script version was valid, the remoteaccess client is removed from the quarantine
Checklist for Network Access Quarantine
To prepare for NAQ-Enable Routing and Remote Access-Install the Remote Access Quarantine service-Create a validation script-Create quarantine resources-Create a remote access policy-Install the Connection Manager Administration Kit-Create a CM profile-Start the Remote Access Quarantine service
Remote Access Policies
There are two important attributes used in NAQ policy profile-MS-Quarantine-Session-TimeoutThe amount of time a client can be connected to the remote access serverwhile quarantinedClient must validate its settings during this time-MS-Quarantine-IPFilterProvides access to quarantine resourcesConfigure input and output filters
Connection Manager Profiles
Connection Manager profiles-Pre-package remote access connections for dial-up or VPN-Administrator-defined connection features-Simple client-side installation by using an executable-Post-connect script can be included to run Rqc.exe
Connection Manager Administration Kit-Used to create Connection Manager profiles-Can be installed from Add or Remove programs
Managing & Logging Network Access Services
Routing & Remote Access Logging
There are three types of logging-Event loggingRecords remote access server errors, warnings, and other information in thesystem event log-Local authentication and accounting loggingTracks usage and authentication attempts on the local remote access server-RADIUS-based authentication and accounting loggingTracks usage and authentication attempts on the RADIUS server
Authentication & Accounting Logging
Track remote access usage and authentication attempts
Maintain records for billing purposes
Isolate remote access policy issues
Specific Connections Logging
Connection Type: PPP Logfile Name:PPP logDescription: Records the series ot programmingfunctions and PPP control messages
Connection Type: L2TP/IPSecLogfile Name: Audit logDescription: Records information about IPSecrelated events
Connection Type: L2TP/IPSecLogfileName: Oakley logDescription: Records information about all Internet Key Exchange main-modeor quick-mode negotiation