Module 10: Designing Security for Data Transmission

Size: px
Start display at page:

Download "Module 10: Designing Security for Data Transmission"

Transcription

1 Module 10: Designing Security for Data Transmission Table of Contents Module Overview 10-1 Lesson 1: Creating a Security Plan for Data Transmission 10-2 Lesson 2: Creating a Design for Security of Data Transmission Lab: Designing Security for Data Transmission 10-24

2 Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the example companies, organizations, products, domain names, e- mail addresses, logos, people, places, and events depicted herein are fictitious, and no association with any real company, organization, product, domain name, address, logo, person, place, or event is intended or should be inferred. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation. The names of manufacturers, products, or URLs are provided for informational purposes only and Microsoft makes no representations and warranties, either expressed, implied, or statutory, regarding these manufacturers or the use of the products with any Microsoft technologies. The inclusion of a manufacturer or product does not imply endorsement of Microsoft of the manufacturer or product. Links are provided to third party sites. Such sites are not under the control of Microsoft and Microsoft is not responsible for the contents of any linked site or any link contained in a linked site, or any changes or updates to such sites. Microsoft is not responsible for webcasting or any other form of transmission received from any linked site. Microsoft is providing these links to you only as a convenience, and the inclusion of any link does not imply endorsement of Microsoft of the site or the products contained therein. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property Microsoft Corporation. All rights reserved. Microsoft, Active Directory, ActiveX, BitLocker, BizTalk, Brute Force, Internet Explorer, MS-DOS, Outlook, PowerPoint, SQL Server, Visual Studio, Windows, Windows Live, Windows Mobile, Windows NT, Windows Server and Windows Vista are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. The names of actual companies and products mentioned herein may be the trademarks of their respective owners. Version 1.2

3 Module 10: Designing Security for Data Transmission 10-1 Module Overview In this module, you will learn how to determine threats and analyze risks to data transmission in an organization. You will also learn how to design security for various types of data transmission, including traffic on local area networks (LANs), wide area networks (WANs), Virtual Private Networks (VPNs), wireless networks, and the Internet. Objectives After completing this module, you will be able to: Create a security plan for data transmission. Design security for data transmission.

4 10-2 Module 10: Designing Security for Data Transmission Lesson 1: Creating a Security Plan for Data Transmission You can protect data that is stored on your network by securing access to it, but when you transmit data across the network in your organization, the data becomes vulnerable to various additional threats. Attackers can potentially intercept transmitted data, depending on how and where the data is transmitted. Objectives After completing this lesson, you will be able to: Describe how Microsoft Solutions Framework (MSF) provides a framework for designing secure data transmission. Describe how the defense in depth model defines secure data transmission. Describe the resources to protect. Apply a threat model to data transmission. Identify the cost to data in transit.

5 Module 10: Designing Security for Data Transmission 10-3 MSF and Security of Data Transmission When you create and deploy your security plan by using MSF, you must use the envisioning phase to identify your goals for data transmission security, and use the planning phase to identify how to achieve these goals. Considerations During the MSF Envisioning Phase When envisioning data transmission security, ensure that you consider the following: Scope of your plan. The location or locations to which your data is transmitted, which your plan will help to protect, and the data transmitted to or from those locations that requires security. Data travels over many types of networks in an organization. These networks have various levels of trust associated with them. For example, LANs are generally associated with a high degree of trust because they are located in an organization s physical facilities. Web server traffic is generally associated with a low level of trust because it crosses public links that are outside your organization s control. The types of networks that your organization uses to transmit data. Common networks include LANs, wireless networks, WANs for branch offices and trusted partners, VPNs for remote users, and the Internet. The goals of secure data transmission. To ensure that the data travels as securely as possible without making the data packets too large for efficient forwarding. Considerations During the MSF Planning Phase When planning to secure your data transmission, ensure that you consider the following:

6 10-4 Module 10: Designing Security for Data Transmission How to achieve the goals for secure data transmission. Select the correct secure data transmission technique for the appropriate data transmission to, from, or at the appropriate location. Defense in depth model. Ensure that your defenses are applied one after the other. This arrangement means that attackers must pass several countermeasures to meet their goal rather than just one. Risk management. Be proactive by identifying risk management strategies for as many risks as possible.

7 Module 10: Designing Security for Data Transmission 10-5 Defense in Depth and Security of Data Transmission The risks to organizations internal networks largely concern the sensitive data transmitted through the network defenses. The connectivity requirements for client workstations on these internal networks also have a number of risks associated with them. Network Architecture Well designed and properly implemented network architecture provides highly available, secure, scalable, manageable, and reliable network connectivity and services. A network segment consists of two or more devices that can communicate with each other on the same physical or logical section of the network. A logical section of the network is provided when a group of network hosts communicate as if they were on the same physical network segment, even though they are physically on different segments. If the segments are logical, they are referred to as virtual local area networks (VLANs). LANs are created by connecting either multiple network hosts or multiple network segments using the appropriate network devices. Organizations can take a number of steps to protect their internal network by using a defense in depth approach. Techniques include: Securing wireless LANs Internet Protocol security (IPsec) Network segmentation

8 10-6 Module 10: Designing Security for Data Transmission Resources to Protect with Data Transmission Security To help to protect your data when it is in transmission, you must consider the types of attacks to which your data transmissions may be susceptible. Examples of Attacks The following are typical examples of the scenarios that you must consider when envisioning and planning the security of your data transmissions. Each organization must be aware of the scenarios that are specific to them: An attacker sits in a car across the street from an organization and uses a highpowered antenna to intercept packets from the organization s wireless network. After intercepting packets, he performs an offline attack on the packets that were transmitted over the wireless network to obtain the Wired Equivalent Privacy (WEP) key that is used to help to protect the data. The attacker then configures his portable computer with the WEP key for the organization s WAN and then connects to the organization s network. An attacker forges from another employee and sends a message to the company president. The message contains links to Web sites that contain offensive content.

9 Module 10: Designing Security for Data Transmission 10-7 STRIDE Threat Model and Security of Data Transmission Threats and vulnerabilities to data transmission differ, depending on the mode of transmission and the goals of the attacker. Threats can range from passive monitoring to malicious disruption of traffic. For example, an attacker who wants to gain knowledge about data while it is transmitted can passively monitor the network from within an organization. This type of attack reveals data but does not interrupt data transmission. However, an attacker who wants to stop the transmission of traffic entirely can attempt a denial-of-service attack over the Internet that prevents legitimate traffic from flowing to and from a network. When identifying threats to data transmission, the Spoofing, Tampering, Repudiation, Information disclosure, Denial of service, Elevation of privilege (STRIDE) threat model can be applied. Each threat category described by STRIDE has a corresponding set of countermeasure techniques that must be used to reduce risk. The appropriate countermeasure depends upon the specific attack. Stride Threat Categories and Attack Methods Typical threats to data transmission include: Spoofing Spoofing an IP address to make packets appear to come from the internal network to bypass the access control list (ACL) on a router. Tampering Forging Internet Control Message Protocol (ICMP) packets to carry out an attack on a third party. Modifying data in transit.

10 10-8 Module 10: Designing Security for Data Transmission Repudiation Sending forged from a company official. Information disclosure Reading packets. Using a man-in-the-middle attack to intercept network traffic. Denial of service Flooding a computer with TCP SYN messages. Using multiple computers to automatically flood a network. Elevation of privilege Viewing authentication traffic. Viewing network management traffic. Reading wireless encryption packets.

11 Module 10: Designing Security for Data Transmission 10-9 Activity: Identifying Threats to Data Transmission In this activity, you will identify the costs to your organization of protecting data transmission. Scenario Contoso Pharmaceuticals is implementing a Web site so that customers can view their order histories over the Internet. Management has asked you to design a strategy for securing data transmission. To add security to Web transactions, one of the network administrators recommends using Secure Sockets Layer (SSL) on all sessions to the Web site. She also recommends purchasing and installing an SSL hardware accelerator card. Management is reluctant to purchase the SSL certificate that is required for using SSL, which costs $2,500. You determine that the SSL hardware accelerator card costs approximately $1,500. After discussing the issue with the other network administrators, you determine that management does not understand the possible threats to the information that will be transmitted.

12 10-10 Module 10: Designing Security for Data Transmission Questions Q How would you explain to management the threats so that you could justify the cost of the SSL certificate and SSL hardware accelerator card? A Compile data to show that the cost of the certificate and accelerator card is less than the Annual Loss Expectancy (ALE) from exposing customer information to attackers. A The potential ALE from such attacks is significant. The Web connection over the Internet is a public network, which has a low degree of trust. Customer information that could be threatened by network monitoring and other attacks includes addresses, telephone and credit card numbers, and information about the order. If an attacker compromises customer information that is not protected by using SSL, the negative publicity could cause customers to leave.

13 Module 10: Designing Security for Data Transmission Lesson 2: Creating a Design for Security of Data Transmission Designing security for data transmission requires that you secure communication across the network at the various layers of the four-layer Department of Defense Internet model. Each layer is vulnerable to various threats and therefore requires various methods for securing transmitted data. Objectives After completing this lesson, you will be able to: Describe the process to determine security requirements for data transmission. List methods for securing data communication channels. Describe considerations for securing communication at the application layer. Describe how IPsec secures data transmission. Describe the process for securing communication at the data link and physical layers. Apply some guidelines to choosing a VPN tunneling protocol.

14 10-12 Module 10: Designing Security for Data Transmission Process to Determine Security Requirements for Data Transmission To determine security requirements for data transmission: 1. Analyze business and technical requirements for securing data transmission. Your organization may have specific security requirements for data. For example, you may require encryption of all customer data when it is transmitted over public networks. 2. Determine what network traffic to secure. Not all data transmissions require the same level of security. Determine what types of network traffic must be secured, the level of security that they require, and the networks that you use to transmit data. 3. Identify requirements for operating systems and their compatibility with applications. Your organization may use applications or operating systems that support various data transmission protocols. You must determine how to secure the data despite these differences. 4. Identify methods for securing data transmission. There are often several methods that you can use to secure data transmission. Identify the method that is cost effective and provides the level of security that your organization requires. 5. Determine encryption requirements and restrictions. Transmission protocols may use a variety of encryption methods. Determine what encryption algorithms to use and the level of encryption that is necessary to secure data transmissions. Government or industry regulations for using encryption algorithms may also affect your decision. 6. Create an implementation strategy. After you complete your design, ensure that you create an implementation strategy for the security methods so that your organization deploys and implements them correctly.

15 Module 10: Designing Security for Data Transmission Methods for Securing Communication Channels A convenient way to understand data transmission security is to categorize where security can be applied at different layers of the Department of Defense Internet model. You can use different methods of security to secure data transmission at the application, network, data link, and physical layers. Methods for Securing Traffic at Different DOD Model Layers Use the following table as a guide to help you to select the appropriate method for securing data transmissions on your network. Internet model layer Application Network Data link Physical Methods for securing traffic SSL or TLS SMB signing S/MIME 802.1x RPC over HTTP(S) IPsec transport mode IPsec tunnel mode Switches rather than hubs Port authentication Strong physical security on wiring closets, data centers, Internet service providers (ISPs), and co-location facilities Restrictions on access to the LAN from public areas

16 10-14 Module 10: Designing Security for Data Transmission Considerations for Securing Communication at the Application Layer Security protocols at the application layer provide various services and levels of security. You must select the appropriate protocol for the applications in your environment. Application Layer Security Protocols The most common protocols include: SSL or Transport Layer Security (TLS). These protocols use public key and symmetric key encryption for TCP-based communications. Both SSL and TLS provide session encryption and integrity, and server authentication. SSL and TLS enable client computers and servers to communicate in a way that prevents successful eavesdropping, tampering, or message forgery. Both SSL and TLS require the use of digital certificates. To improve the performance of these protocols, add hardware accelerator cards or additional CPUs to servers. Server Message Block (SMB) signing. This protocol provides mutual authentication of SMB hosts for file and print services. Enabling signing also provides data integrity for SMB messages that are exchanged by SMB hosts, such as when a computer that is running Windows XP Professional operating system accesses a file share on a computer that is running Windows 2000 Server. SMB signing may significantly affect the performance of frequently used servers such as domain controllers. You must configure SMB signing on both client computers and servers. You can use Group Policy Objects (GPOs) to configure SMB signing. Secure/Multipurpose Internet Mail Extensions (S/MIME). This protocol is a secure extension of Multipurpose Internet Mail Extensions (MIME) that is used for exchanging digitally signed or encrypted messages. It protects

17 Module 10: Designing Security for Data Transmission messages from interception and forgery by proving message origin and data integrity, and performing encryption. S/MIME requires the use of digital certificates x. Uses port-based authentication to provide authenticated network access for Ethernet networks, including wireless and wired networks. Port-based network access control uses the physical characteristics of a switched LAN infrastructure to authenticate devices that are attached to a LAN port. It also prevents access to the port if the authentication process fails x requires a public key infrastructure (PKI) and a Remote Authentication Dial-In User Service (RADIUS) infrastructure. Remote Procedure Call (RPC) over Hypertext Transfer Protocol (HTTP). RPC over HTTP(S) enables users to remotely connect to a computer running Microsoft Exchange Server over the Internet without using a VPN connection. When you configure Microsoft Outlook messaging and collaboration client to connect to the users mailbox by using RPC over HTTP, the RPC packets that usually travel over TCP/IP directly are encapsulated in HTTP packets. This method is usually implemented with SSL to add session encryption and integrity, and server authentication to the HTTP session.

18 10-16 Module 10: Designing Security for Data Transmission Securing Data Transmission by Using IPsec Security Associations IPsec is a rule-based security protocol that protects data transmission at the network layer. When two IPsec-enabled computers communicate, they must agree on the IPsec configuration for the session. This agreement is called the security association. Encryption IPsec uses the following encryption methods: Data Encryption Standard (DES). Consists of a 56-bit symmetric cipher that is no longer considered secure. Triple DES (3DES). Consists of a 128-bit symmetric cipher that is based on the DES algorithm. Secure Hash Algorithm Version 1.0 (SHA1). Creates a 160-bit hash. Required for compliance with the Federal Information Processing Standard (FIPS). Message Digest 5 (MD5). Creates a 128-bit hash. Diffie-Hellman (DH). An asymmetric key exchange protocol that is based on discrete logarithms. For all computers that use IPsec, you must design IPsec policies that include the elements that are listed in the slide for the previous topic, Considerations for Securing Communication at the Application Layer. In addition, consider how IPsec affects network performance, network monitoring, and intrusion detection software. Also, determine whether IPsec is compatible with any older or non-microsoft operating systems that your organization uses.

19 Module 10: Designing Security for Data Transmission Process for Securing Communication at the Data Link and Physical Layers To prevent attackers from compromising data at the data link and physical layers, you must follow this process: 1. Require port authentication on switches. You can use 802.1x to authenticate on a port-by-port basis all devices that connect to a switch. Use port authentication to prevent unauthorized devices from connecting to your organization s network. 2. Replace hubs with switches. You can make network packet sniffing much more difficult for attackers by replacing passive hubs with active switches. 3. Restrict access to sensitive areas such as wiring closets and data centers. Only authorized personnel should have access to areas where network devices and communication links are physically located. Securing these areas can prevent an attacker from directly connecting to the network or sabotaging equipment. 4. Prohibit LAN access from public areas. These areas are generally associated with a low level of trust. Prohibit or greatly restrict access to LAN connections in public areas to prevent attackers from directly accessing your network.

20 10-18 Module 10: Designing Security for Data Transmission Guidelines for Choosing a VPN Tunneling Protocol If you must provide remote access to your network, you can help to secure the data transmissions by providing VPN tunnels. VPN Tunneling Protocols A VPN uses both public and private networks to create a network connection. Windows Server 2003 operating system supports Point-to-Point Tunneling Protocol (PPTP) and Layer 2 Tunneling Protocol (L2TP) for securing VPN connections. PPTP. A Layer 2 protocol that encapsulates Point-to-Point Protocol (PPP) frames in IP datagrams for transmission over IP-based networks such as the Internet. PPTP uses the Microsoft Point-to-Point Encryption (MPPE) protocol to secure PPTP tunnels. L2TP. Encapsulates PPP frames that are sent over IP-based or connection-oriented networks, such as frame relay networks. When configured to use IP as its datagram transport, L2TP can be used as a tunneling protocol over the Internet. L2TP has no native encryption method. If you use L2TP, you must use IPsec to secure the L2TP tunnel. Considerations Considerations for using tunneling protocols include: Compatibility with Network Address Translation (NAT). Although NAT-Traversal (NAT-T) is fully supported in Windows operating system, IPsec cannot be used to access a server behind a NAT, because NAT changes the IP header of packets. For more information about why IPsec NAT-T is not recommended for computers running Windows Server 2003 that are behind network address translators, see IPsec

21 Module 10: Designing Security for Data Transmission NAT-T is not recommended for Windows Server 2003 computers that are behind network address translators on the Microsoft Web site. For more information about how to configure an L2TP/IPsec server behind a NAT-T device in Windows Vista operating system, see How to configure an L2TP/IPsec server behind a NAT-T device in Windows Vista on the Microsoft Web site. User authentication. Both PPTP and L2TP authenticate the user account that initiates the tunnel. Computer authentication. When using L2TP, IPsec certificates authenticate the client computer and the server. PPTP does not authenticate computer accounts. Compatibility with other operating systems. L2TP and IPsec are supported by many operating systems and network devices. PPTP is primarily used by older Windowsbased computers. Support for workstations running Windows NT version 4.0 operating system. Windows NT 4.0 natively supports the PPTP protocol. With the addition of the L2TP/IPsec VPN client application, which was released in July 2002, Windows NT 4.0 can also support the L2TP and IPsec protocols for VPN connections.

22 10-20 Module 10: Designing Security for Data Transmission Practice: Data Transmission Threats and Countermeasures This practice enables you to review the difference between IPsec-encrypted and unencrypted data transmissions. Objectives In this practice, you will: Start Network Monitor. Capture and read an unencrypted transfer. Enable IPsec. Capture and attempt to read an encrypted transfer. Instructions Start the 2830B-LON-DC1 virtual machine. Start the 2830B-GLA-STA virtual machine. Start the 2830B-BON-CL1 virtual machine. To start Network Monitor 1. Log on to Glasgow as Administrator with a password of Pa$$w0rd 2. Click Start, point to All Programs, point to Microsoft Network Monitor 3.1, and then click Microsoft Network Monitor In the Microsoft Network Monitor 3.1 dialog box, under Select Networks, ensure Local Area Connection is selected, and then click P-Mode.

23 Module 10: Designing Security for Data Transmission In the Microsoft Network Monitor 3.1 dialog box, under Capture Network Traffic, click Create a new capture tab. To capture and read an unencrypted transfer 1. Log on to Bonn as Contoso\Administrator with a password of Pa$$w0rd 2. Click Start, and then click Run. 3. In the Open box, type \\london\share1 and then press ENTER. 4. Switch to Glasgow. 5. In the Microsoft Network Monitor 3.1 dialog box, on the menu, click Capture, and then click Start. 6. Switch to Bonn. 7. In the share1 on London dialog box, double-click Test Doc.txt. 8. When Test Doc has opened, switch to Glasgow. 9. n the Microsoft Network Monitor 3.1 dialog box, on the menu, click Capture, and then click Stop. 10. In the Network Conversations pane, click Other Traffic. 11. Scroll down the Frame Summary pane and click the entry that has: Source: The IP address for London Destination: The IP address for Bonn Protocol Name: SMB Description: SMB: R; Read Andx, FID = 0x0000, 23 bytes 12. Scroll down the Hex Details pane of this frame and notice that it includes the words, THIS IS A TEST OF IPSEC. 13. Close Microsoft Network Monitor 3.1 without saving any changes. To enable IPsec 1. Log on to London as Administrator with a password of Pa$$w0rd 2. Click Start, and then click Run. 3. In the Open box, type mmc and then click OK. 4. In Console1, click File, and then click Add/Remove Snap-in. 5. In Add/Remove Snap-in, click Add. 6. Click IP Security Policy Management, click Add.

24 10-22 Module 10: Designing Security for Data Transmission 7. In the Select Computer or Domain dialog box, ensure Local computer is selected, and then click Finish. 8. In Add Standalone Snap-in, click Close. 9. In Add/Remove Snap-in, click OK. 10. Click IP Security Policies on Local Computer. 11. In the results pane, right-click Secure Server (Require security), and then click Assign. 12. Close any open windows without saving any changes. 13. Switch to Bonn. 14. Close any open windows. 15. Click Start, and then click Control Panel. 16. In Control Panel, double-click Administrative Tools. 17. Double-click Local Security Policy. 18. Click IP Security Policies on Local Computer. 19. In the results pane, right-click Client (Respond Only), and then click Assign. 20. Close any open windows. To capture and attempt to read an encrypted transfer 1. On Bonn, click Start, and then click Run. 2. In the Open box, type \\london\share1 and then press ENTER. 3. Switch to Glasgow. 4. Click Start, point to All Programs, point to Microsoft Network Monitor 3.1, and then click Microsoft Network Monitor In the Microsoft Network Monitor 3.1 dialog box, under Select Networks, ensure Local Area Connection is selected, and then click P-Mode. 6. In the Microsoft Network Monitor 3.1 dialog box, under Capture Network Traffic, click Create a new capture tab. 7. In the Microsoft Network Monitor 3.1 dialog box, on the menu, click Capture, and then click Start. 8. Switch to Bonn. 9. In the share1 on London dialog box, double-click Test Doc. 10. When the Test Doc has opened, switch to Glasgow.

25 Module 10: Designing Security for Data Transmission In the Microsoft Network Monitor 3.1 dialog box, on the menu, click Capture, and then click Stop. 12. In the Network Conversations pane, click Other Traffic. 13. Scroll down the Frame Summary pane and notice that all packets between London and Bonn are using the Encapsulating Security Payload (ESP) protocol. After Completing This Practice Close the 2830B-BON-CL1 virtual machine. Do not save changes. Close the 2830B-GLA-STA virtual machine. Do not save changes. Close the 2830B-LON-DC1 virtual machine. Do not save changes.

26 10-24 Module 10: Designing Security for Data Transmission Lab: Designing Security for Data Transmission After completing this lab, you will be able to apply security design concepts to computer security. Estimated time to complete this lab: 30 minutes Lab Setup Note: You only need to complete these steps once per course. Before you begin the lab, you must: 1. Place the Student Materials CD in the CD-ROM drive. 2. Browse to the Webfiles folder on the CD, open the Downloads folder. 3. Double-click Allfiles.exe. 4. In the WinRAR self-extracting archive dialog box, click Install. Note: The files will be copied to C:\Program Files\Microsoft Learning\2830 on your computer. Lab Scenario For some time now, Contoso Pharmaceuticals has been debating whether to install wireless networks. Susan Burk and Ellen Adams agree that Contoso Pharmaceuticals must evaluate wireless LAN access at the new business offices in Geneva.

27 Module 10: Designing Security for Data Transmission Also, Garth Fort has approved the business-to-business (B2B) project. The B2B architects are busy making some of the design changes that have been suggested. John Y. Chen has sent you an that summarizes the changes. One thing that the B2B architects are not doing is designing the security for data transmission. Garth Fort continually reminds Contoso Pharmaceuticals employees how competitive the business is, so you must make sure that no one can eavesdrop on the B2B information when it is sent between servers.

28 10-26 Module 10: Designing Security for Data Transmission Exercise 1 Identifying Potential Data Transmission Vulnerabilities In this exercise, you will advise the organization on the potential vulnerabilities of data in transit. Scenario Ellen Adams has read several news articles on the Internet that discuss security problems with wireless networks. Before she gives final approval to the project, she wants to understand the security implications of wireless LAN access. If Contoso Pharmaceuticals installs wireless LAN access in the buildings at the Geneva facility, the organization will save $50,000 in construction costs because of reduced wiring and will improve employee productivity. Therefore, Ellen plans to approve the project. To ensure that security is maintained, Ellen wants you to prepare a list of the risks that are involved with installing an b wireless network in the buildings at the Geneva facility, and document how to mitigate those risks. The principal tasks for this exercise are as follows: Prepare a list of the risks that are involved with installing an b wireless network. Document mitigations for each of the risks identified. Task 1. Prepare a list of the risks that are involved with installing an b wireless network. 2. Document mitigations and considerations for each of the risks identified. Supporting information Apply the STRIDE threat model to an b wireless network. Use Job Aid 10 worksheet 1 from the C:\Program Files\Microsoft Learning\2830\Mod10\Labfiles\Job_Aids folder. Use Job Aid 10 worksheet 1 from the C:\Program Files\Microsoft Learning\2830\Mod10\Labfiles\Job_Aids folder.

29 Module 10: Designing Security for Data Transmission Exercise 2 Implementing Countermeasures In this exercise, you will implement countermeasures to help to protect transmission of data. Scenario Garth Fort has approved the plans for the B2B Web site, but the security of transmitted data must still be ensured. You must review the design changes that John Y. Chen is sending you and then send Ellen a list of traffic on the B2B network that is vulnerable, and what can be done to help protect it. The principal tasks for this exercise are: Read the from John Y. Chen. Document the vulnerable traffic on the B2B network. Suggest countermeasures to protect the traffic on the B2B network. Task 1. Read the from John Y. Chen. 2. Document the vulnerable traffic on the B2B network. 3. Suggest countermeasures to protect the traffic on the B2B network. Supporting information Open the C:\Program Files\Microsoft Learning\2830\Mod10\Labfiles \ s folder. Read the John Y. Chen B2B Approved. Use Job Aid 10 worksheet 2 from the C:\Program Files\Microsoft Learning\2830\Mod10\Labfiles\Job_Aids folder. Use Job Aid 10 worksheet 2 from the C:\Program Files\Microsoft Learning\2830\Mod10\Labfiles\Job_Aids folder. Note: The answers to the practices and labs are on the Student Materials CD.

30

Module 1: Introduction to Designing Security

Module 1: Introduction to Designing Security Module 1: Introduction to Designing Security Table of Contents Module Overview 1-1 Lesson 1: Overview of Designing Security for Microsoft Networks 1-2 Lesson 2: Introducing Contoso Pharmaceuticals: A Case

More information

Lab Answer Key for Module 6: Configuring and Managing Windows SharePoint Services 3.0. Table of Contents Lab 1: Configuring and Managing WSS 3.

Lab Answer Key for Module 6: Configuring and Managing Windows SharePoint Services 3.0. Table of Contents Lab 1: Configuring and Managing WSS 3. Lab Answer Key for Module 6: Configuring and Managing Windows SharePoint Services 3.0 Table of Contents Lab 1: Configuring and Managing WSS 3.0 1 Information in this document, including URL and other Internet

More information

Lab Answer Key for Module 9: Active Directory Domain Services. Table of Contents Lab 1: Exploring Active Directory Domain Services 1

Lab Answer Key for Module 9: Active Directory Domain Services. Table of Contents Lab 1: Exploring Active Directory Domain Services 1 Lab Answer Key for Module 9: Active Directory Domain Services Table of Contents Lab 1: Exploring Active Directory Domain Services 1 Information in this document, including URL and other Internet Web site

More information

Lab Answer Key for Module 1: Installing and Configuring Windows Server 2008. Table of Contents Lab 1: Configuring Windows Server 2008 1

Lab Answer Key for Module 1: Installing and Configuring Windows Server 2008. Table of Contents Lab 1: Configuring Windows Server 2008 1 Lab Answer Key for Module 1: Installing and Configuring Windows Server 2008 Table of Contents Lab 1: Configuring Windows Server 2008 1 Information in this document, including URL and other Internet Web

More information

Step-by-Step Guide for Creating and Testing Connection Manager Profiles in a Test Lab

Step-by-Step Guide for Creating and Testing Connection Manager Profiles in a Test Lab Step-by-Step Guide for Creating and Testing Connection Manager Profiles in a Test Lab Microsoft Corporation Published: May, 2005 Author: Microsoft Corporation Abstract This guide describes how to create

More information

Connecting Remote Users to Your Network with Windows Server 2003

Connecting Remote Users to Your Network with Windows Server 2003 Connecting Remote Users to Your Network with Windows Server 2003 Microsoft Corporation Published: March 2003 Abstract Business professionals today require access to information on their network from anywhere

More information

How to Secure a Groove Manager Web Site

How to Secure a Groove Manager Web Site How to Secure a Groove Manager Web Site Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the companies, organizations,

More information

How to Install Microsoft Mobile Information Server 2002 Server ActiveSync. Joey Masterson

How to Install Microsoft Mobile Information Server 2002 Server ActiveSync. Joey Masterson How to Install Microsoft Mobile Information Server 2002 Server ActiveSync Joey Masterson How to Install Microsoft Mobile Information Server 2002 Server ActiveSync Joey Masterson Copyright Information

More information

Lab Answer Key for Module 11: Managing Transactions and Locks

Lab Answer Key for Module 11: Managing Transactions and Locks Lab Answer Key for Module 11: Managing Transactions and Locks Table of Contents Lab 11: Managing Transactions and Locks 1 Exercise 1: Using Transactions 1 Exercise 2: Managing Locks 3 Information in this

More information

Deploying Remote Desktop IP Virtualization Step-by-Step Guide

Deploying Remote Desktop IP Virtualization Step-by-Step Guide Deploying Remote Desktop IP Virtualization Step-by-Step Guide Microsoft Corporation Updated: April 2010 Published: July 2009 Abstract Remote Desktop IP Virtualization provides administrators the ability

More information

Module 6. Configuring and Troubleshooting Routing and Remote Access. Contents:

Module 6. Configuring and Troubleshooting Routing and Remote Access. Contents: Configuring and Troubleshooting Routing and Remote Access 6-1 Module 6 Configuring and Troubleshooting Routing and Remote Access Contents: Lesson 1: Configuring Network Access 6-3 Lesson 2: Configuring

More information

Installing Windows Rights Management Services with Service Pack 2 Step-by- Step Guide

Installing Windows Rights Management Services with Service Pack 2 Step-by- Step Guide Installing Windows Rights Management Services with Service Pack 2 Step-by- Step Guide Microsoft Corporation Published: October 2006 Author: Brian Lich Editor: Carolyn Eller Abstract This step-by-step guide

More information

Module 1: Reviewing the Suite of TCP/IP Protocols

Module 1: Reviewing the Suite of TCP/IP Protocols Module 1: Reviewing the Suite of TCP/IP Protocols Contents Overview 1 Lesson: Overview of the OSI Model 2 Lesson: Overview of the TCP/IP Protocol Suite 7 Lesson: Viewing Frames Using Network Monitor 14

More information

Deploying Personal Virtual Desktops by Using RemoteApp and Desktop Connection Step-by-Step Guide

Deploying Personal Virtual Desktops by Using RemoteApp and Desktop Connection Step-by-Step Guide c623242f-20f0-40fe-b5c1-8412a094fdc7 Deploying Personal Virtual Desktops by Using RemoteApp and Desktop Connection Step-by-Step Guide Microsoft Corporation Published: June 2009 Updated: April 2010 Abstract

More information

Customizing Remote Desktop Web Access by Using Windows SharePoint Services Stepby-Step

Customizing Remote Desktop Web Access by Using Windows SharePoint Services Stepby-Step Customizing Remote Desktop Web Access by Using Windows SharePoint Services Stepby-Step Guide Microsoft Corporation Published: July 2009 Updated: September 2009 Abstract Remote Desktop Web Access (RD Web

More information

Site to Site Virtual Private Networks (VPNs):

Site to Site Virtual Private Networks (VPNs): Site to Site Virtual Private Networks Programme NPFIT DOCUMENT RECORD ID KEY Sub-Prog / Project Information Governance NPFIT-FNT-TO-IG-GPG-0002.01 Prog. Director Mark Ferrar Owner Tim Davis Version 1.0

More information

How To Set Up A Virtual Pc Classroom Setup Guide For A Student Computer Course

How To Set Up A Virtual Pc Classroom Setup Guide For A Student Computer Course 2824B: Implementing Microsoft Internet Security and Acceleration Server 2004 Microsoft Virtual PC Classroom Setup Guide Information in this document, including URL and other Internet Web site references,

More information

TS Gateway Step-By-Step Guide

TS Gateway Step-By-Step Guide TS Gateway Step-By-Step Guide Microsoft Corporation Published: December 2007 Modified: July 2008 Abstract Terminal Services Gateway (TS Gateway) is a new role service available to users of the Microsoft

More information

Implementing and Managing Security for Network Communications

Implementing and Managing Security for Network Communications 3 Implementing and Managing Security for Network Communications............................................... Terms you ll need to understand: Internet Protocol Security (IPSec) Authentication Authentication

More information

Step-by-Step Guide for Setting Up VPN-based Remote Access in a

Step-by-Step Guide for Setting Up VPN-based Remote Access in a Page 1 of 41 TechNet Home > Products & Technologies > Server Operating Systems > Windows Server 2003 > Networking and Communications Step-by-Step Guide for Setting Up VPN-based Remote Access in a Test

More information

Module 10: Supporting Remote Users

Module 10: Supporting Remote Users Module 10: Supporting Remote Users Contents Overview 1 Establishing Remote Access Connections 2 Connecting to Virtual Private Networks 13 Configuring Inbound Connections 17 Configuring Authentication Protocols

More information

Technical Brief for Windows Home Server Remote Access

Technical Brief for Windows Home Server Remote Access Technical Brief for Windows Home Server Remote Access Microsoft Corporation Published: October, 2008 Version: 1.1 Abstract This Technical Brief provides an in-depth look at the features and functionality

More information

AD RMS Step-by-Step Guide

AD RMS Step-by-Step Guide AD RMS Step-by-Step Guide Microsoft Corporation Published: March 2008 Author: Brian Lich Editor: Carolyn Eller Abstract This step-by-step guide provides instructions for setting up a test environment to

More information

Step-by-Step Guide for Setting Up Network Quarantine and Remote Access Certificate Provisioning in a Test Lab

Step-by-Step Guide for Setting Up Network Quarantine and Remote Access Certificate Provisioning in a Test Lab Step-by-Step Guide for Setting Up Network Quarantine and Remote Access Certificate Provisioning in a Test Lab Microsoft Corporation Published: May, 2005 Author: Microsoft Corporation Abstract This guide

More information

How To Set Up A Vpn Tunnel Between Winxp And Zwall On A Pc 2 And Winxp On A Windows Xp 2 On A Microsoft Gbk2 (Windows) On A Macbook 2 (Windows 2) On An Ip

How To Set Up A Vpn Tunnel Between Winxp And Zwall On A Pc 2 And Winxp On A Windows Xp 2 On A Microsoft Gbk2 (Windows) On A Macbook 2 (Windows 2) On An Ip WINXP VPN to ZyWALL Tunneling 1. Setup WINXP VPN 2. Setup ZyWALL VPN This page guides us to setup a VPN connection between the WINXP VPN software and ZyWALL router. There will be several devices we need

More information

Deploying Remote Desktop Web Access with Remote Desktop Connection Broker Step-by- Step Guide

Deploying Remote Desktop Web Access with Remote Desktop Connection Broker Step-by- Step Guide Deploying Remote Desktop Web Access with Remote Desktop Connection Broker Step-by- Step Guide Microsoft Corporation Updated: April 2010 Published: May 2009 Abstract RemoteApp and Desktop Connection provides

More information

Windows BitLocker Drive Encryption Step-by-Step Guide

Windows BitLocker Drive Encryption Step-by-Step Guide Windows BitLocker Drive Encryption Step-by-Step Guide Microsoft Corporation Published: September 2006 Abstract Microsoft Windows BitLocker Drive Encryption is a new hardware-enhanced feature in the Microsoft

More information

Microsoft Lync Server 2010

Microsoft Lync Server 2010 Microsoft Lync Server 2010 Scale to a Load Balanced Enterprise Edition Pool with WebMux Walkthrough Published: March. 2012 For the most up to date version of the Scale to a Load Balanced Enterprise Edition

More information

Windows Firewall with Advanced Security Step-by-Step Guide - Deploying Firewall Policies

Windows Firewall with Advanced Security Step-by-Step Guide - Deploying Firewall Policies Windows Firewall with Advanced Security Step-by-Step Guide - Deploying Firewall Policies Microsoft Corporation Published: October 2007 Author: Dave Bishop Editor: Scott Somohano Technical Reviewers: Sarah

More information

Creating a VPN Using Windows 2003 Server and XP Professional

Creating a VPN Using Windows 2003 Server and XP Professional Creating a VPN Using Windows 2003 Server and XP Professional Recommended Instructor Preparation for Learning Activity Instructor Notes: There are two main types of VPNs: User-to-Network This type of VPN

More information

Cisco Which VPN Solution is Right for You?

Cisco Which VPN Solution is Right for You? Table of Contents Which VPN Solution is Right for You?...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 NAT...2 Generic Routing Encapsulation Tunneling...2

More information

Step By Step Guide: Demonstrate DirectAccess in a Test Lab

Step By Step Guide: Demonstrate DirectAccess in a Test Lab Step By Step Guide: Demonstrate DirectAccess in a Test Lab Microsoft Corporation Published: May 2009 Updated: October 2009 Abstract DirectAccess is a new feature in the Windows 7 and Windows Server 2008

More information

Module 8: Implementing Group Policy

Module 8: Implementing Group Policy Module 8: Implementing Group Policy Contents Overview 1 Lesson: Implementing Group Policy Objects 2 Lesson: Implementing GPOs in a Domain 12 Lesson: Managing the Deployment of Group Policy 21 Lab: Implementing

More information

Windows Server 2003 Remote Access Overview

Windows Server 2003 Remote Access Overview Windows Server 2003 Remote Access Overview Microsoft Corporation Published: March 2003 Abstract Remote access allows users with remote computers to create a logical connection to an organization network

More information

Pre-lab and In-class Laboratory Exercise 10 (L10)

Pre-lab and In-class Laboratory Exercise 10 (L10) ECE/CS 4984: Wireless Networks and Mobile Systems Pre-lab and In-class Laboratory Exercise 10 (L10) Part I Objectives and Lab Materials Objective The objectives of this lab are to: Familiarize students

More information

APNIC elearning: Network Security Fundamentals. 20 March 2013 10:30 pm Brisbane Time (GMT+10)

APNIC elearning: Network Security Fundamentals. 20 March 2013 10:30 pm Brisbane Time (GMT+10) APNIC elearning: Network Security Fundamentals 20 March 2013 10:30 pm Brisbane Time (GMT+10) Introduction Presenter/s Nurul Islam Roman Senior Training Specialist nurul@apnic.net Specialties: Routing &

More information

Step-by-Step Guide for Setting Up VPN-based Remote Access in a Test Lab

Step-by-Step Guide for Setting Up VPN-based Remote Access in a Test Lab Página 1 de 54 Step-by-Step Guide for Setting Up VPN-based Remote Access in a Test Lab This guide provides detailed information about how you can use five computers to create a test lab with which to configure

More information

Network Security Fundamentals

Network Security Fundamentals APNIC elearning: Network Security Fundamentals 27 November 2013 04:30 pm Brisbane Time (GMT+10) Introduction Presenter Sheryl Hermoso Training Officer sheryl@apnic.net Specialties: Network Security IPv6

More information

Sophos UTM. Remote Access via PPTP. Configuring UTM and Client

Sophos UTM. Remote Access via PPTP. Configuring UTM and Client Sophos UTM Remote Access via PPTP Configuring UTM and Client Product version: 9.000 Document date: Friday, January 11, 2013 The specifications and information in this document are subject to change without

More information

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc. Securing Modern Substations With an Open Standard Network Security Solution Kevin Leech Schweitzer Engineering Laboratories, Inc. Copyright SEL 2009 What Makes a Cyberattack Unique? While the resources

More information

Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1 Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions

More information

Astaro Security Gateway V8. Remote Access via L2TP over IPSec Configuring ASG and Client

Astaro Security Gateway V8. Remote Access via L2TP over IPSec Configuring ASG and Client Astaro Security Gateway V8 Remote Access via L2TP over IPSec Configuring ASG and Client 1. Introduction This guide contains complementary information on the Administration Guide and the Online Help. If

More information

VPN. VPN For BIPAC 741/743GE

VPN. VPN For BIPAC 741/743GE VPN For BIPAC 741/743GE August, 2003 1 The router supports VPN to establish secure, end-to-end private network connections over a public networking infrastructure. There are two types of VPN connections,

More information

Windows Server Update Services 3.0 SP2 Step By Step Guide

Windows Server Update Services 3.0 SP2 Step By Step Guide Windows Server Update Services 3.0 SP2 Step By Step Guide Microsoft Corporation Author: Anita Taylor Editor: Theresa Haynie Abstract This guide provides detailed instructions for installing Windows Server

More information

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003 http://technet.microsoft.com/en-us/library/cc757501(ws.10).aspx Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003 Updated: October 7, 2005 Applies To: Windows Server 2003 with

More information

Update and Installation Guide for Microsoft Management Reporter 2.0 Feature Pack 1

Update and Installation Guide for Microsoft Management Reporter 2.0 Feature Pack 1 Update and Installation Guide for Microsoft Management Reporter 2.0 Feature Pack 1 Microsoft Corporation Published: December 2010 Microsoft Dynamics is a line of integrated, adaptable business management

More information

Sophos UTM. Remote Access via SSL. Configuring UTM and Client

Sophos UTM. Remote Access via SSL. Configuring UTM and Client Sophos UTM Remote Access via SSL Configuring UTM and Client Product version: 9.000 Document date: Friday, January 11, 2013 The specifications and information in this document are subject to change without

More information

Step-by-Step Secure Wireless for Home / Small Office and Small Organizations

Step-by-Step Secure Wireless for Home / Small Office and Small Organizations Step-by-Step Secure Wireless for Home / Small Office and Small Organizations Microsoft Corporation Published: October 2005 Author: Brit Weston Editor: Allyson Adley Abstract This white paper presents two

More information

Introduction to Hyper-V High- Availability with Failover Clustering

Introduction to Hyper-V High- Availability with Failover Clustering Introduction to Hyper-V High- Availability with Failover Clustering Lab Guide This lab is for anyone who wants to learn about Windows Server 2012 R2 Failover Clustering, focusing on configuration for Hyper-V

More information

Chapter 12 Supporting Network Address Translation (NAT)

Chapter 12 Supporting Network Address Translation (NAT) [Previous] [Next] Chapter 12 Supporting Network Address Translation (NAT) About This Chapter Network address translation (NAT) is a protocol that allows a network with private addresses to access information

More information

Creating and Deploying Active Directory Rights Management Services Templates Step-by-Step Guide

Creating and Deploying Active Directory Rights Management Services Templates Step-by-Step Guide Creating and Deploying Active Directory Rights Management Services Templates Step-by-Step Guide Microsoft Corporation Published: January 2008 Author: Brian Lich Editor: Carolyn Eller Abstract This step-by-step

More information

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Using etoken for SSL Web Authentication. SSL V3.0 Overview Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents

More information

Application Note: Onsight Device VPN Configuration V1.1

Application Note: Onsight Device VPN Configuration V1.1 Application Note: Onsight Device VPN Configuration V1.1 Table of Contents OVERVIEW 2 1 SUPPORTED VPN TYPES 2 1.1 OD VPN CLIENT 2 1.2 SUPPORTED PROTOCOLS AND CONFIGURATION 2 2 OD VPN CONFIGURATION 2 2.1

More information

Step-by-Step Guide for Setting Up IPv6 in a Test Lab

Step-by-Step Guide for Setting Up IPv6 in a Test Lab Step-by-Step Guide for Setting Up IPv6 in a Test Lab Microsoft Corporation Published: July, 2006 Author: Microsoft Corporation Abstract This guide describes how to configure Internet Protocol version 6

More information

Network Access Security. Lesson 10

Network Access Security. Lesson 10 Network Access Security Lesson 10 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Firewalls Given a scenario, install and configure routers and switches.

More information

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

2. From a control perspective, the PRIMARY objective of classifying information assets is to: MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected

More information

Pipeliner CRM Phaenomena Guide Add-In for MS Outlook. 2015 Pipelinersales Inc. www.pipelinersales.com

Pipeliner CRM Phaenomena Guide Add-In for MS Outlook. 2015 Pipelinersales Inc. www.pipelinersales.com Add-In for MS Outlook 205 Pipelinersales Inc. www.pipelinersales.com Add-In for MS Outlook Learn how to use sales lead management with Pipeliner MS Outlook Add-In. CONTENT. Setting up Pipeliner Add-In

More information

7.1. Remote Access Connection

7.1. Remote Access Connection 7.1. Remote Access Connection When a client uses a dial up connection, it connects to the remote access server across the telephone system. Windows client and server operating systems use the Point to

More information

How To Understand And Understand The Security Of A Key Infrastructure

How To Understand And Understand The Security Of A Key Infrastructure Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography Objectives Define digital certificates List the various types of digital certificates and how they are used

More information

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security? 7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk

More information

nappliance misa Server 2006 Standard Edition Users Guide For use with misa Appliances 2006 nappliance Networks, Inc.

nappliance misa Server 2006 Standard Edition Users Guide For use with misa Appliances 2006 nappliance Networks, Inc. nappliance misa Server 2006 Standard Edition Users Guide For use with misa Appliances The information contained in this document represents the current view of Microsoft Corporation on the issues discussed

More information

Troubleshooting File and Printer Sharing in Microsoft Windows XP

Troubleshooting File and Printer Sharing in Microsoft Windows XP Operating System Troubleshooting File and Printer Sharing in Microsoft Windows XP Microsoft Corporation Published: November 2003 Updated: August 2004 Abstract File and printer sharing for Microsoft Windows

More information

2007 Microsoft Office System Document Encryption

2007 Microsoft Office System Document Encryption 2007 Microsoft Office System Document Encryption June 2007 Table of Contents Introduction 1 Benefits of Document Encryption 2 Microsoft 2007 Office system Document Encryption Improvements 5 End-User Microsoft

More information

Windows Firewall with Advanced Security. Design Guide and Deployment Guide. Abstract

Windows Firewall with Advanced Security. Design Guide and Deployment Guide. Abstract Windows Firewall with Advanced Security Design Guide and Deployment Guide Microsoft Corporation Published: October 2008 Author: Dave Bishop Editor: Allyson Adley Reviewers: Bilal Aijazi, Boyd Benson, Shalaka

More information

DriveLock Quick Start Guide

DriveLock Quick Start Guide Be secure in less than 4 hours CenterTools Software GmbH 2012 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise

More information

Installing and Configuring vcenter Multi-Hypervisor Manager

Installing and Configuring vcenter Multi-Hypervisor Manager Installing and Configuring vcenter Multi-Hypervisor Manager vcenter Server 5.1 vcenter Multi-Hypervisor Manager 1.1 This document supports the version of each product listed and supports all subsequent

More information

Installation and configuration guide

Installation and configuration guide Installation and Configuration Guide Installation and configuration guide Adding X-Forwarded-For support to Forward and Reverse Proxy TMG Servers Published: May 2010 Applies to: Winfrasoft X-Forwarded-For

More information

SCADA SYSTEMS AND SECURITY WHITEPAPER

SCADA SYSTEMS AND SECURITY WHITEPAPER SCADA SYSTEMS AND SECURITY WHITEPAPER Abstract: This paper discusses some of the options available to companies concerned with the threat of cyber attack on their critical infrastructure, who as part of

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

AN OVERVIEW OF REMOTE ACCESS VPNS: ARCHITECTURE AND EFFICIENT INSTALLATION

AN OVERVIEW OF REMOTE ACCESS VPNS: ARCHITECTURE AND EFFICIENT INSTALLATION AN OVERVIEW OF REMOTE ACCESS VPNS: ARCHITECTURE AND EFFICIENT INSTALLATION DR. P. RAJAMOHAN SENIOR LECTURER, SCHOOL OF INFORMATION TECHNOLOGY, SEGi UNIVERSITY, TAMAN SAINS SELANGOR, KOTA DAMANSARA, PJU

More information

Installation and configuration guide

Installation and configuration guide Installation and Configuration Guide Installation and configuration guide Adding X-Username support to Forward and Reverse Proxy TMG Servers Published: December 2010 Applies to: Winfrasoft X-Username for

More information

Topics in Network Security

Topics in Network Security Topics in Network Security Jem Berkes MASc. ECE, University of Waterloo B.Sc. ECE, University of Manitoba www.berkes.ca February, 2009 Ver. 2 In this presentation Wi-Fi security (802.11) Protecting insecure

More information

Configuring Security Features of Session Recording

Configuring Security Features of Session Recording Configuring Security Features of Session Recording Summary This article provides information about the security features of Citrix Session Recording and outlines the process of configuring Session Recording

More information

VeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government.

VeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government. END USER S GUIDE VeriSign PKI Client Government Edition v 1.5 End User s Guide VeriSign PKI Client Government Version 1.5 Administrator s Guide VeriSign PKI Client VeriSign, Inc. Government Copyright 2010

More information

VPN Solutions. Lesson 10. etoken Certification Course. April 2004

VPN Solutions. Lesson 10. etoken Certification Course. April 2004 VPN Solutions Lesson 10 April 2004 etoken Certification Course VPN Overview Lesson 10a April 2004 etoken Certification Course Virtual Private Network A Virtual Private Network (VPN) is a private data network

More information

Chapter 5. Data Communication And Internet Technology

Chapter 5. Data Communication And Internet Technology Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN

More information

Remote Access VPNs Performance Comparison between Windows Server 2003 and Fedora Core 6

Remote Access VPNs Performance Comparison between Windows Server 2003 and Fedora Core 6 Remote Access VPNs Performance Comparison between Windows Server 2003 and Fedora Core 6 Ahmed A. Joha, Fathi Ben Shatwan, Majdi Ashibani The Higher Institute of Industry Misurata, Libya goha_99@yahoo.com

More information

Protecting Microsoft Internet Information Services Web Servers with ISA Server 2004

Protecting Microsoft Internet Information Services Web Servers with ISA Server 2004 Protecting Microsoft Internet Information Services Web Servers with ISA Server 2004 White Paper Published: June 2004 For the latest information, please see http://www.microsoft.com/isaserver/ Contents

More information

Microsoft Dynamics GP. Workflow Installation Guide Release 10.0

Microsoft Dynamics GP. Workflow Installation Guide Release 10.0 Microsoft Dynamics GP Workflow Installation Guide Release 10.0 Copyright Copyright 2008 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is the responsibility of

More information

20487B: Developing Windows Azure and Web Services

20487B: Developing Windows Azure and Web Services 20487B: Developing Windows Azure and Web Services Microsoft Hyper-V Classroom Setup Guide Contents Introducing Microsoft Hyper-V 1 Setup Overview 2 Activating Windows 8 Virtual Machines 2 Rearming Windows

More information

How to Configure a Secure Connection to Microsoft SQL Server

How to Configure a Secure Connection to Microsoft SQL Server How to Configure a Secure Connection to Microsoft SQL Server 1993-2015 Informatica Corporation. No part of this document may be reproduced or transmitted in any form, by any means (electronic, photocopying,

More information

2X SecureRemoteDesktop. Version 1.1

2X SecureRemoteDesktop. Version 1.1 2X SecureRemoteDesktop Version 1.1 Website: www.2x.com Email: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious

More information

CS5008: Internet Computing

CS5008: Internet Computing CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is

More information

Hands-On Lab: WSUS. Lab Manual Expediting WSUS Service for XP Embedded OS

Hands-On Lab: WSUS. Lab Manual Expediting WSUS Service for XP Embedded OS Lab Manual Expediting WSUS Service for XP Embedded OS Summary In this lab, you will learn how to deploy the security update to your XP Pro or XP embedded images. You will also learn how to prepare the

More information

File and Printer Sharing with Microsoft Windows

File and Printer Sharing with Microsoft Windows Operating System File and Printer Sharing with Microsoft Windows Microsoft Corporation Published: November 2003 Abstract File and printer sharing in Microsoft Windows allows you to share the contents of

More information

Sophos for Microsoft SharePoint startup guide

Sophos for Microsoft SharePoint startup guide Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning

More information

This chapter describes how to set up and manage VPN service in Mac OS X Server.

This chapter describes how to set up and manage VPN service in Mac OS X Server. 6 Working with VPN Service 6 This chapter describes how to set up and manage VPN service in Mac OS X Server. By configuring a Virtual Private Network (VPN) on your server you can give users a more secure

More information

Secure IIS Web Server with SSL

Secure IIS Web Server with SSL Secure IIS Web Server with SSL EventTracker v7.x Publication Date: Sep 30, 2014 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract The purpose of this document is to help

More information

Configuring Windows 2000/XP IPsec for Site-to-Site VPN

Configuring Windows 2000/XP IPsec for Site-to-Site VPN IPsec for Site-to-Site VPN November 2002 Copyright 2002 SofaWare Technologies Inc, All Rights Reserved. Reproduction, adaptation, or translation with prior written permission is prohibited except as allowed

More information

NETWORK SECURITY (W/LAB) Course Syllabus

NETWORK SECURITY (W/LAB) Course Syllabus 6111 E. Skelly Drive P. O. Box 477200 Tulsa, OK 74147-7200 NETWORK SECURITY (W/LAB) Course Syllabus Course Number: NTWK-0008 OHLAP Credit: Yes OCAS Code: 8131 Course Length: 130 Hours Career Cluster: Information

More information

Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer

Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer Other VPNs TLS/SSL, PPTP, L2TP Advanced Computer Networks SS2005 Jürgen Häuselhofer Overview Introduction to VPNs Why using VPNs What are VPNs VPN technologies... TLS/SSL Layer 2 VPNs (PPTP, L2TP, L2TP/IPSec)

More information

Executive Summary and Purpose

Executive Summary and Purpose ver,1.0 Hardening and Securing Opengear Devices Copyright Opengear Inc. 2013. All Rights Reserved. Information in this document is subject to change without notice and does not represent a commitment on

More information

How To Install Outlook Addin On A 32 Bit Computer

How To Install Outlook Addin On A 32 Bit Computer Deployment Guide - Outlook Add-In www.exclaimer.com Contents About This Guide... 3 System Requirements... 4 Software... 4 Installation Files... 5 Deployment Preparation... 6 Installing the Add-In Manually...

More information

Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder )

Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder ) Application Note Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder ) This document describes how to configure McAfee Firewall Enterprise to provide

More information

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

CS 356 Lecture 27 Internet Security Protocols. Spring 2013 CS 356 Lecture 27 Internet Security Protocols Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists

More information

Virtual Private Networks

Virtual Private Networks Virtual Private Networks ECE 4886 Internetwork Security Dr. Henry Owen Definition Virtual Private Network VPN! Virtual separation in protocol provides a virtual network using no new hardware! Private communication

More information

Kaseya Server Instal ation User Guide June 6, 2008

Kaseya Server Instal ation User Guide June 6, 2008 Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's

More information

How To Set Up A Load Balancer With Windows 2010 Outlook 2010 On A Server With A Webmux On A Windows Vista V2.2.5.2 (Windows V2) On A Network With A Server (Windows) On

How To Set Up A Load Balancer With Windows 2010 Outlook 2010 On A Server With A Webmux On A Windows Vista V2.2.5.2 (Windows V2) On A Network With A Server (Windows) On Load Balancing Exchange 2010 OWA for External Access using WebMux Published: April 2011 Information in this document, including URL and other Internet Web site references, is subject to change without

More information

Security + Certification (ITSY 1076) Syllabus

Security + Certification (ITSY 1076) Syllabus Security + Certification (ITSY 1076) Syllabus Course: ITSY 1076 Security+ 40 hours Course Description: This course is targeted toward an Information Technology (IT) professional who has networking and

More information

Hyper-V Server 2008 Getting Started Guide

Hyper-V Server 2008 Getting Started Guide Hyper-V Server 2008 Getting Started Guide Microsoft Corporation Published: October 2008 Author: Cynthia Nottingham Abstract This guide helps you become familiar with Microsoft Hyper-V Server 2008 by providing

More information