WS-011T00A__M10
WS-011T00A__M10
Server 2019
Administration
Lessons:
o Lesson 1: Overview of RAS in Windows Server
o Lesson 2: Implementing VPNs
o Lesson 3: Implementing NPS
o Lesson 4: Implementing Always on VPN
o Lesson 5: Implementing Web Server in Windows Server
Lesson 1: Overview of RAS
in Windows Server
Lesson 1 overview
Topics:
o Remote access features in Windows Server
o Overview of remote application access
o Manage remote access in Windows Server
o When to deploy a public key infrastructure for remote access
o What is Web Application Proxy?
o Authentication options for Web Application Proxy
o Publish applications with Web Application Proxy
o Discussion: Remote access options usage scenarios
Remote Access features in Windows Server
DirectAccess:
Provides always on connectivity to office resources over public networks
Requires Windows 10 Enterprise or Education editions
VPN:
Provides connection-based connectivity to office resources over public networks
Routing:
Routes IP packets between two networks
Can perform network address translation (NAT) and DHCP Relay
Web Application Proxy:
Secures access to web-based applications
Works as a reverse proxy with multiple preauthentication options
Overview of remote application access
Remote access to data files works well when using DirectAccess and VPN
Remote access to desktop apps:
Performance suffers with high latency
Works best with Remote Desktop Services
Remote access to web-based apps:
Web-based apps work well over slow connections with higher latency
Web Application Proxy is a simple solution for users
DirectAccess and VPN also work well
Manage remote access in Windows Server
Remote access technologies provide various solutions that allow secure access to an organization’s
infrastructure from different locations. While organizations usually own and protect local area networks
(LANs) entirely by themselves, remote connections to servers, shares, and apps must often travel across
unprotected and unmanaged networking infrastructure, such as the Internet. Any method of using public
networks for the transit of organizational data must include a way to protect the integrity and confidentiality
of that data.
Do you allow users to connect to your network resources remotely? If so, how?
What are your business requirements for using remote access?
Lesson 2: Implementing VPNs
Lesson 2 overview
Topics:
o VPN scenarios
o Site-to-site VPN
o Options for VPN tunneling protocols
o VPN authentication options
o What is VPN Reconnect?
o Configure a VPN by using the Getting Started Wizard
o Demonstration: Configure VPN
VPN scenarios
A VPN provides a point-to-point connection between a private network’s components by using a public
network, such as the Internet.
Site-to site VPN
o IKEv2
L2TP/IPsec UDP port 500, UDP port Uses either certificates or preshared keys for
1701, UDP port 4500, and authentication; certificate authentication is recommended.
IP protocol ID 50
SSTP TCP port 443 Uses SSL to provide data confidentiality, data integrity,
and data authentication
IKEv2 UDP port 500 Supports the latest IPsec encryption algorithms to provide
data confidentiality, data integrity, and data
authentication
VPN authentication options
Protocol Description Security level
PAP Uses plaintext passwords. Typically used if the remote access The least secure authentication protocol. Does
client and remote access server cannot negotiate a more not protect against replay attacks, remote
secure form of validation. client impersonation, or remote server
impersonation.
CHAP A challenge-response authentication protocol that uses the An improvement over PAP in that the password
industry-standard MD5 hashing scheme. is not sent over the PPP link.
Requires a plaintext version of the password to
validate the challenge response. Does not
protect against remote server impersonation.
MS-CHAPv2 An upgrade of MS-CHAP. Provides two-way authentication, Provides stronger security than CHAP.
also known as mutual authentication. The remote access
client receives verification that the remote access server to
which it is dialing in to has access to the user’s password.
EAP Allows for arbitrary authentication of a remote access Offers the strongest security by providing the
connection through the use of authentication schemes, most flexibility in authentication variations.
known as EAP types.
What is VPN Reconnect?
VPN Reconnect:
Provides seamless and consistent VPN connectivity
Uses the IKEv2 technology
Automatically re-establishes VPN connections when connectivity is available
Maintains the connection if users move between different networks
Provides transparent connection status to users
Maintains connectivity across network outages
Configure a VPN by using the Getting Started Wizard (1 of 2)
Configure VPN by using the Getting Started Wizard in the Remote Access Management console
Requirements for VPN server configuration include:
o Two network interfaces (public and private)
• Using only one network interface is supported as well
o IP Address allocation (static pool or DHCP)
o Authentication provider (NPS/RADIUS or the
VPN server)
o DHCP relay agent considerations
o Membership in the local Administrators group
or equivalent
Configure a VPN by using the Getting Started Wizard (2 of 2)
Topics:
o Overview of NPS
o Plan NPS deployment
o Overview of connection request processing
o Configure policies on NPS
o Implement RADIUS with NPS
o Demonstration: Manage NPS
Overview of NPS
Once NPS is installed, you will have support for central authentication and authorization for RADIUS
clients. You must decide which polices to create and if you want to use RADIUS accounting.
The following tools can be used to manage NPS:
o NPS management console
Authentication methods for an NPS server identified here from most to least secure:
o EAP
• Most secure and recommended
• Requires certificates for users, clients’ computers, and NPS server
o MS-CHAP v2
o MS-CHAP
o Challenge Handshake Authentication Protocol (CHAP)
o Shiva Password Authentication Protocol (SPAP)
PAP, SPAP, CHAP or MS-CHAP should not be used in a production environment as they are considered
highly insecure
Overview of connection request processing
Configuration Description
Default ports for accounting and The ports required for accounting and authentication requests being
authentication by using RADIUS forwarded to a RADIUS server are
UDP 1812/1645 and UDP 1813/1646, respectively.
Configure policies on NPS (1 of 2)
Network Policies:
o Allow you to designate which users are authorized to connect to your network and the
circumstances under which they can or cannot connect.
o A Network Policy contains a set of conditions, constraints, and settings.
Configure policies on NPS (2 of 2)
Implement RADIUS with NPS (1 of 2)
Client computers that use VPN servers are not RADIUS clients. Only devices that support the RADIUS
protocol are RADIUS clients.
Implement RADIUS with NPS (2 of 2)
A RADIUS proxy receives connection attempts from RADIUS clients, and then forwards them to the
appropriate RADIUS server or another RADIUS proxy for further routing
Topics:
o What is Always On VPN?
o Prerequisites for Always On VPN deployment
o Always On VPN features and functionalities
o Why choose Always On VPN over Windows VPN?
o Deploy Always On VPN
What is Always On VPN?
Always On VPN:
Enables remote users running Windows 10 to securely access corporate resources
Was designed to be the successor of DirectAccess
Connects securely to the VPN server without any user intervention
o Client detects whether it needs to trigger the VPN connection or not
Prerequisites for Always On VPN deployment
To deploy and configure Always On VPN, your organization must support the following infrastructure
components:
o Always On VPN Gateway (VPN Server)
o Group Policy
o Firewall configuration
Always On VPN offers many features and enhancements when compared to traditional VPN solutions such
as:
o Automatic triggering
In order to properly implement and support Always On VPN in your environment, it is best to understand
how to plan, configure, and scope your Always On VPN implementation.
Follow these steps:
1. Always On VPN deployment planning
2. Always On VPN server infrastructure configuration
3. Remote Access Server configuration for Always On VPN
4. NPS Server installation and Configuration
5. Firewall and DNS configuration
6. Windows 10 Client configuration for Always On VPN
Lesson 5: Implementing Web
Server in Windows Server
Lesson 5 overview
Topics:
o IIS in Windows Server
o What´s new in IIS 10.0?
o Overview of IIS architecture
o Overview of the Web Server server role
o Install and configure Web Server
o Demonstration: Create and configure a new site in IIS
IIS in Windows Server
IIS 10.0 is the version of the Web Server included in the Windows Server 2016 and later.
In IIS 10.0, the following new functionality were introduced:
o IIS on Nano Server
o IIS in Containers
o Managing IIS
o HTTP/2
o IIS Thread Pool Ideal CPU Optimization for NUMA hardware
o Bullet point
Overview of IIS architecture (1 of 2)
IIS consists of various components that each perform functions for the web server and application such as
reading configuration files and listening for requests made by IIS
These components are either services or protocol listeners and include the following:
o Protocol listeners
• HTTP.sys
o Services
• World Wide Web Publishing Service (WWW service)
• Windows Process Activation Service (WAS)
Overview of IIS architecture (2 of 2)
Worker processes:
An application pool can be configured to use multiple worker processes
Additional overhead is required for each worker process
Worker process recycling terminates the process and returns all memory to the operating system
Overview of the Web Server server role
IIS is installed as an optional server role named Web Server (IIS) on Windows Server
Numerous optional role services provide additional functionality
o Static content
o Dynamic content
o Logging
Web Platform Installer (Web PI) can download and install additional free components
Many of the IIS components installed by Server Manager or by Windows PowerShell are called modules
o A module is a binary component that is installed on the server
o It can provide functionality to all websites on the server
o A module can consist of native dynamic link library (DLL) files, or .NET assemblies
o A module must be enabled to access its functionality
Install and configure Web Server (1 of 2)
o 2 GB minimum RAM
o Windows PowerShell
o Using the Microsoft IIS Web Manager extension for Windows Admin Center (currently in preview)
Thank you.