Logo
programming4us
programming4us
programming4us
programming4us
Home
programming4us
XP
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server
programming4us
Windows Phone
 
Windows Server

Windows Server 2003 : Authorizing Remote Access Connections (part 2) - Understanding Remote Access Policies

- How To Install Windows Server 2012 On VirtualBox
- How To Bypass Torrent Connection Blocking By Your ISP
- How To Install Actual Facebook App On Kindle Fire
3/21/2011 9:47:32 PM

Understanding Remote Access Policies

A remote access policy is a set of permissions or restrictions, read by a remote access authenticating server, that applies to remote access connections. Many remote access policies can be stored on an authenticating server at any given time, but only one policy can be applied to a connection. To determine which policy is applied, the conditions of each remote access policy are compared individually to the current remote access connection. Only the first matching policy is applied to the remote access connection; if no policy matches the connection, the connection is blocked.

You can view currently configured remote access policies in the Routing And Remote Access console by selecting the Remote Access Policies node in the console tree, as shown in Figure 2.

Figure 2. Viewing remote access policies

Remote access policies are unique to each local machine but not unique to Routing And Remote Access. Once created, they can be read either by Routing And Remote Access or by a RADIUS server configured on the local machine. Similarly, you cannot remove remote access policies simply by disabling Routing And Remote Access. They are written to the local hard disk and stored until they are specifically deleted either from the Routing And Remote Access console or from the Internet Authentication Service console (the administrative tool for RADIUS servers).

By default, two remote access policies are preconfigured in Windows Server 2003. The first default policy is Connections To Microsoft Routing And Remote Access Server. This policy is configured to match every remote access connection to the Routing And Remote Access service. When Routing And Remote Access is reading this policy, the policy naturally matches every incoming connection. However, when the policy is being read by a RADIUS server, network access might be provided by a non-Microsoft vendor; consequently, this policy will not match those connections.

The second default remote access policy is Connections To Other Access Servers. This policy is configured to match every incoming connection regardless of network access server type; however, because the first policy matches all connections to Routing And Remote Access, only connections to other remote access servers read and match the policy when the default policy order is not changed. Unless the first policy is deleted or the default policy order is rearranged, this second policy can be read only by RADIUS servers.

Policy Conditions

Each remote access policy is based on policy conditions that determine when the policy is applied. For example, a policy might include a condition that Windows-Groups matches DOMAIN1\Telecommuters; this policy would then match a connection whose user belongs to the Windows global security group Telecommuters. Figure 3 shows such a policy.

Figure 3. Conditions matching dial-up telecommuters


Clicking the Add button opens the Select Attribute dialog box, which allows you to add a new category for a remote access policy condition. For example, the NAS-IP-Address attribute allows a RADIUS server to distinguish remote access clients connecting through a particular remote access server (as distinguished by IP address). Figure 4 shows the Select Attribute dialog box and its associated set of configurable attributes.

Figure 4. Policy condition attributes


By clicking the Add button in the Select Attribute dialog box, you can open a dialog box that allows you to configure the condition for a specific attribute. For example, if you click the Add button when the Authentication-Type attribute is selected, the Authentication-Type dialog box opens, as shown in Figure 5. This dialog box allows you to choose which remote access connections, as specified by authentication protocol, will match the policy. In the example given, the policy is configured to match unauthenticated connections. Similarly, you can specify the particular elements for any attribute you choose to serve as the conditions for a policy.

Figure 5. Examples of policy condition elements


Note

Only membership of global security groups can serve as a remote policy condition. You cannot specify membership of universal or domain local security groups as the condition for a remote access policy.


Remote Access Permission

Every remote access policy specifies whether the connection matching the policy is allowed or denied. These permission settings correspond to the Grant Remote Access Permission option and the Deny Remote Access Permission option, respectively, which can be seen in Figure 3. Remember that this setting is normally overridden by the Allow Access option (outside of Windows 2000 mixed-mode domains) or the Deny Access option in the dial-in properties for an individual user account.

Policy Profile

A remote access policy profile consists of a set of dial-up constraints and properties that can be applied to a connection. You can configure a remote access policy profile by clicking the Edit Profile button in the policy properties dialog box, shown in Figure 3. Clicking this button opens the Edit Dial-In Profile dialog box, shown in Figure 6. By default, the policy profile is not configured; consequently, no additional restrictions or properties are applied to the connection.

Figure 6. A configured dial-up remote access policy profile


The following sections describe the six tabs found in the policy profile.

Dial-In Constraints Tab

This tab allows you to set the following dial-up constraints:

  • Minutes Server Can Remain Idle Before It Is Disconnected

  • Minutes Client Can Be Connected

  • Allow Access Only On These Days And At These Times

  • Allow Access Only To This Number

  • Allow Access Only Through These Media

IP Tab

You can set IP properties that specify IP address assignment behavior. You have the following options:

  • Server Must Supply An IP Address.

  • Client May Request An IP Address.

  • Server Settings Determine IP Address Assignment (the default setting).

  • Assign A Static IP Address. The IP address assigned is typically used to accommodate vendor-specific attributes for IP addresses.

You can also use the IP tab to define IP packet filters that apply to remote access connection traffic. 

Multilink Tab

You can set Multilink properties that both enable Multilink and determine the maximum number of ports (modems) that a Multilink connection can use. Additionally, you can set Bandwidth Allocation Protocol (BAP) policies that both determine BAP usage and specify when extra BAP lines are dropped. The Multilink and BAP properties are specific to the Routing And Remote Access service. By default, Multilink and BAP are disabled.

The Routing And Remote Access service must have Multilink and BAP enabled for the Multilink properties of the profile to be enforced.

Authentication Tab

You can set authentication properties to both enable the authentication types that are allowed for a connection and specify the EAP type that must be used. Additionally, you can configure the EAP type. By default, MS-CHAP and MS-CHAP v2 are enabled. In Windows Server 2003, you can specify whether users can change their expired passwords by using MS-CHAP and MS-CHAP v2 (enabled by default).

The Routing And Remote Access service must have the corresponding authentication types enabled for the authentication properties of the profile to be enforced.

Encryption Tab

Windows Server 2003 supports two general methods for the encryption of remote access connection data: Rivest-Shamir Adleman (RSA) RC4, and Data Encryption Standard (DES). RSA RC4 is the family of algorithms used in MPPE, the encryption type used with the MS-CHAP or EAP-TLS authentication protocols in both dial-up and Point-to-Point Tunneling Protocol (PPTP)–based VPN connections. DES, meanwhile, is the general encryption scheme most commonly used with Internet Protocol Security (IPSec), the security standard used with the Layer 2 Tunneling Protocol (L2TP) authentication protocol in VPNs.

Both MPPE and IPSec support multiple levels of encryption, as shown in Table 1.

Table 1. Encryption Types
Encryption TypeLevel of Encryption Supported
MPPE Standard40-bit, 56-bit
MPPE Strong128-bit
IPSec DES56-bit
IPSec Triple DES168-bit

The settings on the Encryption tab in a remote access policy profile, shown in Figure 7, enable you to specify allowable encryption levels in a manner independent of encryption type. However, the nature of each encryption level varies with the encryption scheme used, as explained after the figure.

Figure 7. Remote access policy profile Encryption tab


  • Basic Encryption (MPPE 40-Bit) For dial-up and PPTP-based VPN connections, MPPE is used with a 40-bit key. For L2TP/IPSec VPN connections, 56-bit DES encryption is used.

  • Strong Encryption (MPPE 56-Bit) For dial-up and PPTP VPN connections, MPPE is used with a 56-bit key. For L2TP/IPSec VPN connections, 56-bit DES encryption is used.

  • Strongest Encryption (MPPE 128-Bit) For dial-up and PPTP VPN connections, MPPE is used with a 128-bit key. For L2TP/IPSec VPN connections, 168-bit triple DES encryption is used.

  • No Encryption This option allows unencrypted connections matching the remote access policy conditions. To require encryption, clear this option.

Tip

You need to be familiar with all of the encryption settings for the exam. For example, you should know that the Basic Encryption setting refers to 40-bit MPPE encryption with PPTP/dial-up and 56-bit DES encryption with L2TP/IPSec.


Advanced Tab

You can set advanced properties to specify the series of RADIUS attributes that are sent back by the IAS server to be evaluated by the NAS server/ RADIUS client. These settings are used only by RADIUS servers and are not read by Routing And Remote Access.

Exploring Remote Access Authorization Scenarios

The following selection presents a summary of the remote access authorization process. In each scenario, authorization settings at the remote access server differ when User1, a member of the Telecommuters group, attempts to connect through a dial-up line. Figure 8 shows the order of remote access policies defined at the server.

Figure 8. List of defined remote access policies


Note

In each of the following scenarios, it is assumed that the domain functional level is not set to Windows 2000 mixed.


For each of User1’s connection attempts, up to three sets of permissions and settings are applied, in the following order:

  1. The dial-in properties of the user account provided with the connection

  2. The access permission defined in the first matching remote access policy

  3. The profile settings accompanying the first matching remote access policy

In scenario #1, shown in Figure 9, the remote access permission for User1’s account has been left at the default setting: Control Access Through Remote Access Policy. Consequently, the remote access permission specified in the first matching remote access policy is applied to the connection. The first matching remote access policy, named Telecommuters, is configured to allow remote access for the Telecommuters security group.

Figure 9. Remote access authorization scenario #1

Once the remote access permission of the Telecommuters policy is applied, the profile of the policy is verified. In this case, the Telecommuters policy profile permits access on all days except Sundays. The end result of these server settings is that User1 is permitted access unless the day is Sunday.

In scenario #2, shown in Figure 10, the remote access permission for User1’s account is again left at the default setting. As a result, the remote access policy again determines the remote access permission. In this case, however, the Telecommuters policy has been configured to deny access to the Telecommuters group. As a result, User1’s connection attempt is blocked, and the policy profile is not read.

Figure 10. Remote access authorization scenario #2


Scenario #3 is illustrated in Figure 11. In this scenario, the remote access permission for User1’s account has been modified from the default setting to Allow Access. In this case, the remote access permission setting is ignored in the Telecommuters remote access policy. However, the policy profile is still read and applied. As a result, User1 is permitted remote access unless the day is Sunday.

Figure 11. Remote access authorization scenario #3


In scenario #4, illustrated in Figure 12, the remote access permission for User1’s account has been modified from the default setting to Deny Access. As a result of this server setting, the remote access connection is blocked, and no remote access policy or accompanying profile is read.

Figure 12. Remote access authorization scenario #4


In the final remote access authorization scenario, the remote access policies are deleted at the server. As a result, no matching policy can be applied to the inbound remote access connection. The connection request is thus denied regardless of the remote access permission for User1’s account, which in this case is set to Allow Access. Scenario #5 is illustrated in Figure 13.

Figure 13. Remote access authorization scenario #5

Other -----------------
- Windows Server 2008 R2 : Understanding Remote Desktop Services (part 5) - Single Sign-On & Remote Desktop Connection Display
- Windows Server 2008 R2 : Understanding Remote Desktop Services (part 4)
- Windows Server 2008 R2 : Understanding Remote Desktop Services (part 3) - RD Connection Broker & RD Licensing
- Windows Server 2008 R2 : Understanding Remote Desktop Services (part 2) - RD Gateway & RD Web Access
- Windows Server 2008 R2 : Understanding Remote Desktop Services (part 1) - RD Session Host & RD Virtualization Host
- Windows Server 2008 R2 : How Remote Desktop Works
- Installing Microsoft SharePoint Server 2010 and Configuring PerformancePoint Services : Installing SharePoint (part 2) - Running the Server Farm Installation for SharePoint
- Installing Microsoft SharePoint Server 2010 and Configuring PerformancePoint Services : Installing SharePoint (part 1)
- Installing Microsoft SharePoint Server 2010 and Configuring PerformancePoint Services : Examining PPS Installation Prerequisites
- PerformancePoint Services 2010 Architecture
 
 
Top 10
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
- First look: Apple Watch

- 3 Tips for Maintaining Your Cell Phone Battery (part 1)

- 3 Tips for Maintaining Your Cell Phone Battery (part 2)
programming4us programming4us
Popular tags
Microsoft Access Microsoft Excel Microsoft OneNote Microsoft PowerPoint Microsoft Project Microsoft Visio Microsoft Word Active Directory Biztalk Exchange Server Microsoft LynC Server Microsoft Dynamic Sharepoint Sql Server Windows Server 2008 Windows Server 2012 Windows 7 Windows 8 windows Phone 7 windows Phone 8
programming4us programming4us
 
programming4us
Natural Miscarriage
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server
programming4us
Game Trailer