MCSA/MCSE Self-Paced Training Kit (Exam 70-214): Implementing and Administering Security in a Microsoft Windows 2000 Network (Pro-Certification)

Lesson 1: Configuring IPSec Within a Domain

IPSec provides the ability to encrypt TCP/IP communications between computers. While it was originally developed to provide encryption between public Internet hosts, there are many private environments in which encrypted communications between servers and clients would improve security, including loosely controlled environments such as universities, high-security environments such as military operations, and industries such as finance that have a need to protect sensitive information or trade secrets.

Within a domain, enabling IPSec between servers and clients is easy, and IPSec can be deployed throughout a domain of any size with minimal administrative effort.

To complete this lesson, you will need


After this lesson, you will be able to

Estimated lesson time: 30 minutes


Understanding the IPSec Basics

IPSec is the standard method of authenticating and encrypting traffic between IP hosts. IPSec provides the IP packet structure and protocols necessary to automatically exchange keys between hosts and negotiate encryption and authentication protocols. IPSec performs these two primary functions using two complementary features:

These two methods can be used together to provide both authenticated headers and encrypted data payload.

Windows 2000 and Windows NT 4 both contain support for SMB message signing, which provides the ability to authenticate each SMB (Windows file and print sharing) packet between a server and its clients. This functionality has been superceded by IPSec AH, which works for SMB as well as all other protocols. Configure SMB message signing only when you can't use IPSec, such as when you must support backward compatibility with Windows NT 4 machines.

ESP Modes

ESP functions in two modes, as determined by the functionality that is required and the capability of the IPSec aware hosts or routers:

IPSec Applications

IPSec is employed in three widely used scenarios:

Establishing IP Security Using Internet Key Exchange

IPSec itself does not provide encryption or authentication algorithms. Instead, it provides a framework for existing algorithms to work within. Determining which encryption and authentication algorithms to use for an IPSec session is performed by a protocol within IPSec, the Internet Key Exchange (IKE) protocol. IKE establishes secure communications by proving trust between hosts, negotiating a compatible set of encryption and authentication algorithms, and performing other minor functions so that IPSec security associations (SAs) do not have to be manually specified and keyed. To prove trust between hosts, IKE requires that both hosts have knowledge of the same shared secret key. Once trust has been established between the hosts, bulk encryption keys are exchanged using public key cryptography and are automatically refreshed according to intervals defined in the IPSec policy. A reasonably short key refresh time reduces the lifetime of a key, and therefore the length of time that attackers have to use brute-force methods to crack it.

IPSec in Windows 2000

Windows 2000 makes the security of IPSec easily accessible by integrating it with the standard Windows 2000 configuration management system, Active Directory. By defining IPSec configuration using Group Policy and distributing secret keys using standard Windows mechanisms, administrators can completely automate the deployment of IPSec within an Active Directory forest.

Manual methods of keying, distributing secret keys, and configuring IPSec are also provided for situations in which centralized configuration management is not possible or is not a concern, such as when creating a security association between untrusted hosts or when establishing a single security association for a specific one-time purpose.

Distributing IKE Secret Keys

In Windows 2000, you can use three methods to distribute the shared secret key required by IKE to automatically negotiate security associations:

IPSec Within a Private Network

IPSec is most commonly used to secure traffic between hosts on the Internet, but it is designed to operate in any context where network layer security is important. Many modern private networks are very large IP networks, spanning vast distances. IPSec can be used within a private network in the following scenarios:

Determining IP Security Method by Server Role

Windows 2000 makes it easy to enable security within a domain, but you cannot simply require IPSec on all computers within a domain and consider the problem solved. Here are two potential issues:

Rather than applying blanket IPSec policy within your domain, consider moving sensitive applications and data to a few servers (as few as possible, considering the amount of data and the various security compartmentalization issues you have) and then requiring IPSec security on those servers only.

Certain services within your domain should be available whether or not clients can negotiate IP security with them. These services include domain log on and authentication, DNS services, DHCP, and other infrastructure services. If these services are not available to all clients, you might wind up with mutually exclusive requirements that cannot be resolved, such as computers that cannot receive an IP address from a DHCP server without already having an IPSec connection (which requires a valid IP address).

You can apply IPSec to computers in Windows 2000 by choosing one of three different policy modes:

Clients within a domain should be configured to accept IP security if a server requests it, except for any clients that you explicitly want to prevent from accessing secure servers. For example, you might want to prevent access for computers used as guest kiosks, Internet browsing stations, or for untrusted users, such as students in a university environment.

Practice: Enabling IPSec Between Domain Members

Trade secrets at Fabrikam, Inc. have to be transmitted using authentication and encryption even within the enterprise. To facilitate this requirement, all trade secret information is stored on member server ms01.domain.Fabrikam.com, which you will configure to require IPSec security. To allow access to the information, you will configure clients to respond to IP Security requests.

In this practice, you create a set of GPOs to require security for member servers and enable IPSec on clients if the servers request IPSec. This configuration will prevent servers within the Secure Servers OU from communicating with any client that is not specifically configured as an IPSec client, which by extension eliminates any computers that are not within the same or a trusted domain.

Exercise 1: Configuring IPSec Logging and Monitoring

The first step in any IPSec configuration session is to allow troubleshooting by enabling IPSec logging. Follow the procedures in this exercise to enable IPSec logging.

Perform this exercise while logged on to the domain controller as the Administrator.

To enable IPSec security logging

  1. Click Start, point to Programs, point to Administrative Tools, and click Active Directory Users And Computers. The Active Directory Users And Computers management console appears.

  2. Right-click domain.fabrikam.com, and click Properties.

  3. In the domain.fabrikam.com Properties dialog box, click the Group Policy tab.

  4. Double-click the Domain Security Policy GPO. The Group Policy management console appears.

  5. Expand Computer Configuration, Windows Settings, Security Settings, and Local Policies.

  6. Click Audit Policy. Your screen should now appear similar to Figure 8.1.

    Figure 8-1. Audit Policy in the Group Policy management console

  7. Double-click Audit Logon Events. The Security Policy Setting dialog box, shown in Figure 8.2, appears.

    Figure 8-2. Enabling IPSec auditing

  8. Select Define These Policy Settings, select Success, select Failure, and click OK.

  9. Double-click Audit Object Access. The Security Policy Setting dialog box appears.

  10. Select Define These Policy Settings, select Success, select Failure, and then click OK.

  11. Close the Group Policy management console.

  12. Click OK to close the domain.fabrikam.com Properties dialog box.

  13. Leave the Active Directory Users And Computers management console open for the next procedure.

Exercise 2: Enabling IPSec on Servers

In this exercise, you create an OU for secure servers and apply an IPSec policy that forces them to require security to communicate.

Perform this exercise while logged on to the domain controller as the Administrator with the Active Directory Users And Computers management console open.

To create organizational units for secure servers

  1. Right-click the domain.fabrikam.com domain, point to New, and then click Organizational Unit. The New Object Organizational Unit dialog box appears.

  2. Type Secure Servers in the Name box, and click OK.

  3. Click the Computers container, as shown in Figure 8.3, in the domain.fabrikam.com domain.

    Figure 8-3. Member servers and computers are located in the Computers folder by default

  4. Right-click MS01, and click Move to open the Move dialog box.

  5. Click Secure Servers, and then click OK.

MS01 is removed from the list in the Computers container and appears in the list of Secure Servers.

To create a GPO for Secure Servers

  1. Right-click the Secure Servers OU, and click Properties.

  2. In the Secure Servers Properties dialog box, click the Group Policy tab.

  3. Click the New button. A new GPO appears in the Group Policy Object Links list.

  4. Type Secure Servers IPSec Policy as the name of the GPO and press Enter.

  5. Double-click Secure Servers IPSec Policy. The Group Policy management console appears.

  6. Expand Computer Configuration, Windows Settings, and Security Settings.

  7. Click IP Security Policies On Active Directory. A list of available IPSec policies appears in the right panel.

  8. Right-click the Secure Server policy, and click Assign.

  9. Close the Group Policy management console.

  10. Close the Secure Servers Properties dialog box.

  11. Leave the Active Directory Users And Computers management console open for the next exercise.

Exercise 3: Enabling IPSec on Clients

In this exercise, you create an OU for clients that will be able to establish IPSec communications.

To create an OU for secure clients

Perform this procedure while logged on to the domain controller as the Administrator, with the Active Directory Users and Computers management console open.

  1. Right-click the domain.fabrikam.com domain, point to New, and then click Organizational Unit. The New Object Organizational Unit dialog box appears.

  2. Type Secure Clients in the Name box, and click OK.

  3. Click the Computers container.

  4. Right-click CLIENT01, and click Move to open the Move dialog box.

  5. Click Secure Clients, and click OK.

    CLIENT01 is removed from the list in the Computers container and appears in the list of Secure Clients.

To create a GPO for secure clients

Perform this procedure while logged on to the domain controller as Administrator with the Active Directory Users And Computers management console open.

  1. Right-click the Secure Clients OU, and click Properties.

  2. In the Secure Clients Properties dialog box, click the Group Policy tab.

  3. Click the New button. A new GPO appears in the Group Policy Object Links list.

  4. Type Secure Clients IPSec Policy as the name of the GPO and press Enter.

  5. Double-click the Secure Clients IPSec Policy. The Group Policy management console appears.

  6. Expand Computer Configuration, Windows Settings, and Security Settings.

  7. Click IP Security Policies On Active Directory. A list of available IPSec policies appears in the right panel.

  8. Right-click the Client policy, and click Assign.

  9. Close the Group Policy management console.

  10. Close the Secure Clients Properties dialog box.

To test IPSec connectivity between computers

Perform this exercise on the workstation CLIENT01.

  1. Click Start, and click Run. The Run dialog box appears.

  2. Type ipsecmon and click OK. The IP Security Monitor appears as shown in Figure 8.4.

    Figure 8-4. The IP Security Monitor

  3. Click Start, point to Programs, Accessories, and then click Command Prompt. The command prompt appears.

  4. Type net view \\ms01 and press Enter.

    The command prompt displays a list of shares on the server. The list might be empty.

  5. Type exit and press Enter.

    The IP Security Monitor now shows a security association existing between the client and the server, as shown in Figure 8.5.

    Figure 8-5. The list of active security associations in the IP Security Monitor

  6. Close the IP Security Monitor.

Exercise 4: Enabling IPSec on Domain Controllers

In this exercise, you configure domain controllers to respond to secure requests if an IPSec security association can be converged. IPSec is said to have converged if IKE can successfully negotiate a compatible set of encryption and authentication protocols at both ends and successfully transmit data between hosts. By allowing domain controllers to accept secure communications, you enable secure servers that require security to communicate with them.

In this scenario, because you're using default IPSec templates, Internet Control Message Protocol (ICMP) communications will pass even when an IPSec has not been negotiated, but higher-level communications will fail.

To test connectivity to the domain controller

Perform this exercise on the member server ms01.

  1. Click Start, and click Run. The Run dialog box appears.

  2. Type cmd and click OK. The command prompt appears.

  3. Type ping dc01.

    Notice that dc01 can be pinged.

  4. Type net view \\dc01.

    Notice that the operation fails, as shown in Figure 8.6.

    Figure 8-6. Testing high-level network connectivity without an IPSec security association

  5. Close the command prompt window.

To enable discretionary IPSec on domain controllers

Perform this procedure while logged on to the domain controller as the Administrator.

  1. Click Start, point to Programs, point to Administrative Tools, and click Active Directory Users And Computers. The Active Directory Users And Computers management console appears.

  2. Expand domain.fabrikam.com.

  3. Right-click Domain Controllers, and click Properties.

  4. In the Domain Controllers Properties dialog box, click the Group Policy tab.

  5. Click New. A new GPO appears in the Group Policy list.

  6. Type IPSec Policy for Domain Controllers and click Edit.

  7. Expand Computer Configuration, Windows Settings, and Security Settings and click IP Security Policies.

  8. Right-click the Server policy, and click Assign.

  9. Close the Group Policy management console.

  10. Click OK to close the Domain Controllers Properties dialog box.

  11. Close the Active Directory Uses And Computers management console.

To test connectivity to the domain controller

Perform this exercise on the member server.

  1. Click Start, and click Run to open the Run dialog box.

  2. Type cmd and click OK. The command prompt appears.

  3. Type ping dc01.

    Notice that dc01 can be pinged.

  4. Type net view \\dc01. The operation succeeds, as shown in Figure 8.7.

    Figure 8-7. Testing high-level connectivity with an IPSec security association in place

  5. Close the command prompt window.

Lesson Review

The following questions are intended to reinforce key information in this lesson. If you are unable to answer a question, review the lesson and try the question again. Answers to the questions can be found in the appendix.

  1. What are the two primary methods IPSec uses to authenticate and encrypt IP packets?

  2. What are the two encrypted payload modes that IPSec supports?

  3. Explain the difference between transport mode and tunnel mode.

  4. How does IKE determine whether to trust the participants when it establishes a security association?

  5. How is IPSec managed in Windows 2000?

  6. What mechanism would you use to distribute secret keys automatically in a domain?

Lesson Summary

Категории