8.3. Planning, Implementing, and Maintaining Routing and Remote AccessIn Windows Server 2003, the Routing And Remote Access service (RRAS) allows a server to be configured as a multipurpose remote access server and as an IP router. As a remote access server, a Windows server can connect clients to the internal network whether they use broadband, dial-up, or VPN. As an IP router, use a Windows server to connect LANs, wide area networks (WANs), and VPNs. 8.3.1. Planning a Routing StrategyBoth hardware and software routers can be used to connect your organization's LANs and WANs. There are advantages and disadvantages to both hardware and software routers. Hardware routers tend to be more expensive than software routers and more complex to configure. Software routers typically are easier to configure and less expensive than hardware routers, but may not be as reliable as hardware routers. Beyond issues of cost, configurability, and reliability, the RRAS provides the same routing services as most hardware routers. 8.3.1.1.8.3.1.1.1. Connecting LANs and WANsWhen planning a routing strategy, the difference between a LAN connection and a WAN connection is important. Most local area networks have multiple subnets over which local hosts communicate. To allow hosts to communicate across network segments, you'll need some type of routing technology. RRAS includes:
RIP is a distance vector routing protocol and uses only the number of hops for its metrics. RIP can only use broadcast or multicast transmissions for communication with other routers, both of which generate more traffic than unicast transmissions. RIP requires little planning or configuration. OSPF is a link state routing protocol and computes its metrics based on many conditions, including network speed and congestion. OSPF can only use unicast transmissions to communicate with other routers. OSPF requires significant planning and configuration. Tip: Neither RIP nor OSPF facilitates multicasting. Internet Group Management Protocol (IGMP) is the routing protocol that makes multicasting possible. When these routing technologies are implemented on a LAN, you'll typically use a single LAN router to connect two subnets. This router connects the subnets by having a configured routing interface for each subnet being connected. In contrast to tightly connected local area networks, wide area networks typically are connected over long distances. WAN connections are used to connect multiple networks at separate physical locations into a single large internetwork. With WAN connections, install a WAN router at each site and connect the routers using a WAN link. You can build in redundancy and fault tolerance using additional, redundant WAN connections. The same routing technologies that are used on LANs can be used on WANs. It is important, however, to keep in mind the relay/routing limitations that are applicable. Common WAN configurations for multiple connections are:
When WAN connections are provided over leased lines, the connections are private and VPN technology is not need. On the other hand, if WANs are connected over the public Internet, VPN technology must be used to secure the connections. 8.3.1.2. Identifying routing protocols to use in a specified environmentTo route traffic between subnets or over WAN connections, routers must be configured with the appropriate routing entries. Routers can use static or dynamic routing. With static routing, administrators must manually create routing entries and maintain those entries if the network topology changes. With dynamic routing, the router itself creates entries automatically and updates the entries as appropriate. Whether you use static or dynamic routing will depend on your routing strategy. You must consider the number of networks, routers, and sites that are in the enterprise and determine how best to configure routing. Dynamic routing eliminates the need for administrators to create and maintain routing entries, providing an efficient and automated solution. Static routing requires administrators to create and maintain routing entries. Static routing entries can be created and managed using either the Routing And Remote Access console or the route commands. Before you work with static routes at a command prompt, you should print the currently configured static routes by entering route print. The output of route print shows current interfaces, static routes, and persistent routes. You can create static routes using the route add command. The syntax of the route add command follows: route add DestinationNetworkID mask NetworkMask Gateway metric MetricCost if Interface such as: route add 192.168.11.0 mask 255.255.255.0 192.168.10.1 metric 1 if 0x10003 The metric and interface are optional. If you do not specify them, they are selected automatically. To make a static route persistent, you can use route add -p. Persistent static routes are not deleted even if the router is stopped and restarted. To change a static route, you can use the route change command. The syntax of the route change command follows: route change DestinationNetworkID mask NetworkMask Gateway metric MetricCost if Interface such as: route change 192.16.15.0 mask 255.255.255.0 192.168.42.1 metric 1 if 0x10003 At a command prompt can delete a static route using route delete. The syntax is: route delete DestinationNetworkID For example: route delete 192.168.11.0 The RIP and OSPF routing protocols use dynamic routing. When an RIP router is initially configured, the only entries in its routing tables are for the networks to which it is physically connected. The router then starts sending announcements of its availability to other routers of the networks it services. Responses from announcements allow the router to update its routing tables. RIP announcements can be made depends using one of two operating modes:
When changes occur to the network topology, RIP version 2 uses triggered updates to communicate the changes to other routers. To configure the version of RIP to use, you can set the Outgoing Packet Protocol and Incoming Packet Protocol on the General tab of the RIP connection's properties dialog box (see Figure 8-13). Figure 8-13. Set the RIP version for outgoing and incoming packets.When using RIP version 2, you can improve security by enabling authentication for your routers. On the General tab, select the Activate Authentication checkbox and enter a password in the password field. Once you enable authentication, all routers using RIP version 2 must be configured in this same way with the same password so that the routers can update each other. Otherwise, route updates fail. On the Security tab of the RIP connection's properties dialog box (see Figure 8-14), you can configure filters to add additional security. You can set separate filter actions for incoming routes and outgoing routers. For incoming routes, you can configure filters to accept all routes, accept all routes in the ranges listed, or ignore all routes in the ranges listed. For outgoing routes, you can configure filters to announce all routes, announce all routes in the ranges listed, or not announce all routes in the ranges listed. Figure 8-14. Configure filters to improve RIP security.OSPF is a link-state protocol that uses the Shortest Path First (SPF) algorithm to calculate routes. The route with the lowest route cost is the shortest path, and the shortest path is always used first when routing. An OSPF router maintains a link-state database that it uses to track the network topology. The database is synchronized with adjacent routers or specifically defined nonbroadcast multiple access (NBMA) neighbors. When a change is made to the network topology, the first OSPF router to identify the change sends out a change notification. This change notification is used to update the link-state database so that the routing tables can be recalculated automatically. OSPF routers divide the network into areas of responsibility called transit areas , and maintain link-state information only for those transit areas for which they've been configured. Dynamic routers, such as RIP and OSPF routers, exchange information about their networks with other routers using the same dynamic routing protocols. Typically, you'll want to use RIP version 2 over RIP version 1. RIP version 1 uses broadcasts for announcements and doesn't allow for authentication. RIP version 2 uses multicast for its announcements and does allow authentication to be used. RIP version 2 is best used on medium-sized networks with 50 or less routers, and the maximum number of hops that any IP packet must be transferred over is less than 16. On larger networks or networks with redundant paths, OSPF is a better choice than RIP. OSPF is ideally suited to networks with 50 or more routers. Where RIP may generate significant amounts of announcement traffic on large networks, OSPF reduces traffic by synchronizing updates to its database and routing tables. 8.3.1.3. Planning routing for IP multicast trafficWith TCP/IP, host computers can be configured to use broadcast, unicast, and multicast message transmission. Broadcast messages are used by all computers configured to use TCP/IP. A broadcast message, as the name implies, is broadcast to every host on the network. Because broadcasts are indiscriminant and reach every system whether it is the intended recipient or not, broadcasts are limited by default to the local subnet on which the source computer is located. With TCP version 4, Class A, B, and C IP addresses use unicast transmissions in which each computer has a separate IP address. Unicast transmissions involve only two systems: a source and a destination. To use unicast to send the same message to multiple systems, the source computer must send the message multiple timesonce to each recipient. With TCP version 4, Class D IP addresses use multicast transmissions in which a group of computers known as the host group have a single destination IP address. Because multicast transmissions identify an entire group of systems, a single source computer can send a single message to multiple recipients. Members of the host group can be located on any LAN on the network. They can even be located in different remote locations connected via the organization's WAN. However, for the message to be transmitted across LAN and WAN connections, the routers on the network must know which hosts are members of the group. This allows the messages to be forwarded. Computers that are members of a multicast host group must register themselves with the network routers using the Internet Group Management Protocol (IGMP). All members of the group and all routers providing access to the members of the group must support IGMP. Tip: All Windows computers that use TCP/IP support IGMP. RRAS servers can be configured with the IGMP routing protocol. Routers support IGMP in several ways. First, you must be able to configure the router to use the IGMP routing protocol, and then specify the routing interfaces on which IGMP traffic can be received. The interface used must support a special mode called multicast promiscuous mode. While most network interface adapters support this mode, you should verify that a hardware router's network interface adapters do. Tip: To support large-scale multicasting, the router must also be able to share host group membership information with other routers. This means the router must implement a distributed multicast routing protocol, such as Distance Vector Multicast Routing Protocol (DVMRP). The RRAS does not support distributed multicast routing protocols, but can use a third-party version of one of these protocols. 8.3.2. Planning Security for Remote Access UsersUsing RRAS, you can configure remote access so that individual users at remote locations can access the organization's network. Remote access can be used in this way for dial-up, broadband, and wireless connections from remote clients. All three types of remote access connections can use VPN as well to enhance security. 8.3.2.1. Analyzing protocol security requirementsBefore you configure remote access for remote clients, you should determine how remote access security should be configured to best safeguard the internal network from attack and ensure that organizational security policies and requirements are met. You should start by determining:
One of the ways you can secure remote access is to configure the dial-in properties of the user's account. In Active Directory Users And Computers, you can configure dial-in properties for individual users. To set these for an individual user, right-click the account name, select Properties, and then click the Dial-in tab. As Figure 8-15 shows, you can set the dial-in properties thar are described next. Figure 8-15. Configuring dial-in properties.
8.3.2.2. Planning authentication methods for remote access clientsRRAS enables administrators to configure Virtual Private Network (VPN) access for remote clients. With VPN connections, both Point-to-Point Tunneling Protocol (PPTP) and Layer 2 Tunneling Protocol (L2TP) are supported. By default, the appropriate protocol can be automatically selected when a connection is made. Because L2TP uses IPSec for advanced encryption, L2TP is more secure than PPTP. RRAS supports Windows authentication and RADIUS authentication. Windows authentication is the default authentication method, and it allows you to use standard Windows security for authentication. RADIUS authentication can be used if your organization has Remote Authentication Dial-in User Service (RADIUS) servers. To configure authentication, right-click a server entry in the Routing And Remote Access console, select Properties, and then use the Authentication Provider selection list on the Security tab to configure the desired authentication method (see Figure 8-16). Figure 8-16. Set the desired authentication provider.The Accounting Provider list lets you specify whether and how connection requests and sessions are logged. Windows Accounting logs connection requests and sessions in logfiles stored in the Remote Access Logging folder. RADIUS Accounting sends details about connection requests and sessions to the RADIUS server. The RADIUS server in turn logs this information. Tip: RADIUS proxy and server support is a new feature in Windows Server 2003. You can install and use Microsoft Internet Authentication Service (IAS) to provide RADIUS proxy and server services. If you have multiple remote access servers, you can use RADIUS authentication and accounting to centralize the authentication and accounting. Do this by configuring the remote access servers to use RADIUS authentication and accounting, and then configuring a RADIUS server, such as an IAS server, to handle authentication and accounting. This allows remote access users to access any remote access server, and means you only have to maintain a single set of user accounts on the RADIUS server. When planning a remote access server deployment in a large network environment, keep these advantages in mind. The method a RRAS server uses to authenticate remote access clients is determined by the Authentication Methods settings. You can view and manage the configured authentication methods using the dialog box shown in Figure 8-17. To configure authentication methods, right-click a server entry in the Routing And Remote Access console, select Properties, and then click the Authentication Methods button on the Security tab. Figure 8-17. Managing RRAS authentication methods.Table 8-15 summarizes the available user authentication methods. Before changing the settings, keep the following in mind:
When you've configured VPN and set L2TP as the protocol type, you can use IPSec with L2TP to enhance security. To do this, you must define a custom IPSec policy, and then configure L2TP security options. To configure L2TP security options, right-click a server entry in the Routing And Remote Access console, select Properties, and then click the Security tab. Select the Allow Custom IPSec Policy For L2TP Connection checkbox. In the Pre-Shared Key text box, type a preshared key to use with the custom IPSec policy. Each client computer that will remotely access the network over VPN and be subject to the IPSec policy must be configured with the same preshared key. 8.3.2.3. Planning remote access policiesAfter the RRAS server authenticates a remote user and verifies his identity, the server next attempts to authorize the user. Authorization determines whether the server should permit the user to connect, based on any conditions that may apply to when and how the user can remotely access the server. Remote access policies are used to define specific conditions that users must meet before RRAS authorizes them to access the server or the network. You can:
To view and manage remote access policies, select the Remote Access Policies node in the Routing And Remote Access console. Policies are reviewed in priority order, with the highest priority being 1. To create a policy, right-click the Remote Access Policies node, and then select New Remote Access Policy. The New Remote Access Policy Wizard, shown in Figure 8-18, walks you through the steps of creating the remote access policy and setting conditions. Figure 8-18. Use the New Remote Access Policy Wizard to define a remote access policy.When multiple policies are listed in the Remote Access Policies node as shown in Figure 8-19, you can control the order in which policies are reviewed for applicability by right-clicking a policy and using the Move Up or Move Down options as appropriate. The order of policies is important to determine how conditions are applied to a connection that has been authenticated but is not yet authorized. Tip: Before RRAS can use remote access policies, the Control Access Through Remote Access Policy option must be set in the Dial-in tab of the user's properties dialog box. Use Active Directory Users And Computers to set this option. This option is not available in Windows 2000 Mixed Mode domains, in which the Allow Access setting is equivalent to the Control Access Through Remote Access Policy setting, when operating at the Windows Server 2003 domain functional level. Figure 8-19. Listing remote access policies.If a connection matches the conditions specified in a policy, the profile associated with the policy is applied to the connection. You can view and edit policy profiles by right-clicking the policy, and then clicking the Edit Profile button on the Settings tab. Using the Edit Dial-in Profile properties dialog box, shown in Figure 8-20, you can then set dial-in contracts, IP address assignment, authentication, encryption, and other options for the connection. Figure 8-20. Setting options for the policy profile.When remote access is controlled through policy, RRAS reviews policies using the following rules:
8.3.3. Troubleshooting TCP/IP RoutingExam 70-293 tests your ability to troubleshoot TCP/IP routing in the following areas:
|