Deploying Virtual Private Networks with Microsoft Windows Server 2003 (Technical Reference)

The VPN client can be any computer or device that is capable of creating a Point- to-Point Tunneling Protocol (PPTP) connection using Microsoft Point-to-Point Encryption (MPPE) or creating a Layer Two Tunneling Protocol (L2TP) connection using Internet Protocol Security (IPSec) encryption, identified as L2TP/IPSec. A Microsoft mantra is to enable software communications “anywhere, anytime, on ANY device.” This means all clients, large and small, should have some remote access capabilities. The device list is immense, starting with support by the high- end client operating system Windows XP and going down to the smallest and most compact versions of the Windows family—versions such as Windows XP Embedded and Windows Mobile 2003, which is used on the Pocket PC class of computers. Table 5-1 lists the VPN-capable Microsoft operating systems.

Table 5-1: VPN-Capable Microsoft Operating Systems

VPN Tunneling Protocol

Microsoft Operating System

PPTP

Windows Server 2003, Windows XP, Windows 2000, Windows NT 4.0, Windows Millennium Edition (Me), Windows 98, Windows CE version 3.0, Pocket PC 2002 and Windows XP Embedded.

L2TP/IPSec

Windows Server 2003, Windows XP, Windows 2000, Pocket PC 2003, and Windows Mobile 2003. Microsoft L2TP/IPSec VPN Client, Windows NT 4.0 Workstation, Windows Me, and Windows 98 are also supported. Windows CE 2003 (soon to be released) will also be supported.

VPN clients come in all shapes, forms, and sizes. Some typical VPN clients widely used today are:

For the purposes of this book and to focus on the largest sector of VPN clients, we will discuss only Microsoft client operating systems of Windows XP (and the down- level members of the Windows family) that are commonly used for remote access to corporate data and resources. By focusing on this breed of VPN client, you can easily use the information in this book to enable all the types of clients in the preceding list. For specific information on enabling the various VPN clients Microsoft offers—such as Windows CE on Pocket PC or particular scenarios involving VPN for wireless access control—you should refer to the www.microsoft.com/vpn Web site, which has links and documentation for all kinds of VPN implementations.

For the remainder of the book, we’ll use “Microsoft VPN clients” to refer to Windows XP and Windows 2000 client operating systems.

Microsoft VPN clients can configure VPN connections manually by creating VPN connections on the operating system, or a system administrator can simplify a user’s VPN experience by using the Connection Manager components available in Windows Server 2003 to configure the connections automatically. Connections are the term used to describe logical network adapters that are created in the networking folder of a client or server. The process of manual configuration varies according to operating system as follows:

The Connection Manager System

The typical corporate laptop user is skilled at basic computer and application operations, but remote access, networking, and especially Internet connectivity operations are beyond this user’s level of expertise. When scaling the configuration of VPN connections for an enterprise, you must keep in mind the following issues:

The tool for resolving configuration issues when implementing VPN connections across an enterprise is Connection Manager. Connection Manager (CM) consists of the following:

Connection Manager

CM is a client dialer, included in Windows Server 2003 and designed to be deployed and run on remote access clients, whose advanced features make it a superset of basic dial-up networking. Windows Server 2003 includes a set of tools that enables a network administrator to deliver preconfigured connection profiles and scripts to network users in a user-friendly, easy-to-use, graphically driven interface. These administration tools are the Connection Manager Administration Kit (CMAK) and Connection Point Services (CPS).

CM provides phone-book support for local and remote connections to your remote access service using a network of dial-up remote access points, such as those available worldwide through Internet service providers (ISPs). If your service requires secure connections beyond basic dial-up over the Internet, you can also use CM to establish VPN connections to your service by having it launch an L2TP/IPSec or PPTP connection over the Internet connection. Other optional solutions that can be provided by CM are:

Quarantine and connection actions will be covered in the “Quarantine Resources” section later in this chapter and in more detail in Chapter 6, “Deploying Remote Access VPNs.”

Connection Manager Administration Kit

A network administrator can tailor the appearance and behavior of a connection made with CM by using the Connection Manager Administration Kit (CMAK). With CMAK, an administrator can develop client dialer and connection software that allows users to connect to the network by using only the connection features the administrator defines for them. CM supports a variety of features that both simplify and enhance implementation of connection support for administrators and users, most of which can be incorporated using the Connection Manager Administration Kit Wizard.

CMAK allows you to build profiles customizing the CM installation package you deliver to your customers so that CM reflects the identity of your organization. It allows you to determine which functions and features you want to include and how CM appears to your customers. You can do this by using the Connection Manager Administration Kit Wizard to build custom service profiles.

For more information about CMAK and the configuration of CM service profiles, see Chapter 7, “Using Connection Manager for Quarantine Control and Certificate Provisioning.”

Connection Point Services

Connection Point Services (CPS) enables you to automatically distribute and update custom phone books. These phone books contain one or more Point of Presence (POP) entries, with each POP supplying a telephone number that provides dial-up access to an Internet access point. The phone books give users complete POP information, so when they travel they can connect to different Internet access points rather than being restricted to a single POP.

Without the ability to update phone books (a task CPS handles automatically), users would have to contact their organization’s technical support staff to be informed of changes in POP information and to reconfigure their client dialer software. This is just one example of why CMAK can save on the support costs of a VPN solution.

CPS has two components:

  1. Phone Book Administrator (PBA)—A tool used to create and maintain the phone book database and to publish new phone-book information to the Phone Book Service.

  2. Phone Book Service (PBS)—A Microsoft Internet Information Services (IIS) extension that runs on Windows NT Server 4.0 or later (with IIS). Phone Book Service automatically checks subscribers’ or corporate employees’ current phone books and, if necessary, downloads a phone-book update.

For more information about CPS and the configuration of phone books, see Chapter 7.

Single Sign-On

Single sign-on is the capability that allows a remote access user to create a remote access connection to an organization and log on to the organization’s domain by using the same set of credentials. This is a critical function for security administrators of a large company. By providing single sign-on capabilities, the company keeps the remote access solution and user experience easy to control, and additionally, simplifies security operations for the company. By using single sign-on, security access logging and control is consolidated, security auditing is consolidated down to one central system, and users can use strong password methods more easily because they have to remember only one password to access all resources they might need. For a domain-based infrastructure, the user name and password or smart card is used for both authenticating and authorizing a remote access connection and for authenticating and logging on to a Windows domain.

In the case of remote access in particular, single sign-on can be used to simplify logging on and accessing corporate resources. Upon startup of the operating system, a user can choose to use the Dial-Up Networking option on the Windows XP and Windows 2000 logon dialog box and then select a dial-up or VPN connection to use to connect to the organization’s network.

For VPN connections, the user must first connect to the Internet before creating a VPN connection. After the Internet connection is made, the VPN connection and logon to the domain can be accomplished. The process for doing this is as follows:

  1. If the user has a broadband connection, then they will have an “always-on” scenario for Internet connectivity and will not need a second connection for connecting to the Internet.

  2. If the user uses a separate ISP account that requires sign-on credentials to connect to the Internet, you can create a dial-up connection with the ISP credentials already configured.

  3. Configure your VPN connection to use the dial-up connection to dial the ISP connection before attempting the VPN connection.

In this configuration, the user will never have to type the ISP credentials when logging on to the domain. This association between the VPN connection and the ISP connection can be configured manually by the user, a process which many users might find confusing if they are not computer savvy, or by using CM to do it all automatically for them.

Installing a Certificate on a Client Computer

If your Windows 2000 or Windows XP VPN clients are either making L2TP/IPSec connections or using certificates for user-level authentication to various corporate resources, you must install certificates on the VPN client computer. For L2TP/IPSec connections, you must install a computer certificate on the VPN client computer to provide authentication for establishing an IPSec security association (SA). For user- level authentication using the Extensible Authentication Protocol-Transport Layer

Security (EAP-TLS) authentication protocol, you can use either a user certificate or a smart card. You can use another method for L2TP/IPSec authentication known as a preshared key, which can be used in place of certificates if certificate services are not available, but this method is only minimally supported by Microsoft operating systems because of security issues inherent with preshared keys. Microsoft recommends the use of certificates for all IPSec-enabled communications including L2TP/IPSec.

For user certificate-based authentication, if a company has not deployed the Microsoft Active Directory directory service, the computer user must request a user certificate from a Windows Server 2003 certificate authority (CA) on the company intranet. If the company has a deployment of Active Directory on Windows Server 2003, users can be automatically configured with certificates upon logon to the system by using the new auto-enrollment CA features of Windows Server 2003. For smart card–based authentication, a network administrator must configure an enrollment station and issue smart cards with certificates that are mapped to individual user accounts. The use of smart cards is an excellent idea if you want to have two- factor authentication for all users. By using two-factor authentication, you can maintain security much more easily because a hacker cannot break in if he discovers one of the factors. The hacker would need to have the smart card and the personal identification number (PIN) to activate the smart card. Only the actual user in physical possession of the smart card can provide both of those items.

For more information about installing certificates on VPN client computers, see the “Certificate Infrastructure” section in this chapter.

Design Point: Configuring the VPN Client

If the following criteria match your situation, we can make certain recommendations for the deployment of your VPN clients. When configuring your VPN clients for remote access VPN connections, consider the following:

Категории