Technical.white paper. IP.Security.features. Intel®.Ethernet.Server.Adapters.and. Microsoft®.windows.Server®.2008 TablE.Of contents Network security is an increasingly crucial issue for network administrators. Attacks from outside – and from within the data-center network – must be thwarted Introduction................................ 2 to protect service levels, prevent loss of intellectual property, avoid theft of sensi- The.Basics.of.IPsec..................... 3 tive client data, meet regulatory compliance, and mitigate corporate liability. Internet Protocol Security (IPsec) provides network administrators with a suite Server.and.Domain.. Isolation.(S&DI).......................... 4 of tools to create a robust defense against network attacks from any source. Network.Access.. This white paper provides an introductory overview of IPsec as implemented in Protection.(NAP)........................ 6 Microsoft® Windows Server® 2008. Additionally, the role of new-generation Intel® DirectAccess (DA) ................................9 Ethernet Server Adapters and Ethernet controllers is discussed in terms of how they offload IPsec processing onto silicon to enhance security while maintaining The Challenges with VPNs ...................9 line-rate network throughput. Intel®.Ethernet.Server.Adapters.. with.IPsec.Offload...................... 10 Conclusion................................. 12 For More Information ...........................12 Technical White paper IP Security Features – Intel® EThErNET SErver AdapterS and MicroSoft® Windows SErver® 2008 Introduction IPsec provides the ability to Attacks on networks – both from outside and from within the network – continue to be a challenge for network admin- implement customizable security for istrators and a potentially costly liability for enterprises. protecting communication among Malicious attacks, such as viruses and Denial of Service and between workgroups, local area (DoS), cause loss of time and business and require use of valuable resources to resolve. Data theft, especially confi- network (lAN) computers, domain dential client or customer information, can cause loss of clients and servers, branch offices, customer trust at minimum and may cost millions of dollars extranets, and roving clients. in legal fees and restitution should a class-action suit arise. Equally troubling are recent estimates that now place the number of attacks from within networks as high as eighty Microsoft® Windows Server® 2008 contains a robust imple- percent of all successful attacks on corporate networks. mentation of IPsec that does not require any hardware or These attacks can come from employees, on-site contractors, software upgrades to make IPsec work end-to-end. This consultants, anyone with access to the corporate network. gives network managers a powerful and cost-effective Considering the potential for loss from data theft – whether suite of tools for implementing network security, including it be loss of market advantage or liability for identity theft – capabilities for server and domain isolation (S&DI) and the time and expense of providing robust network security Network Access Protection (NAP). is really minimal. however, during development of the Windows Server 2008 What network administrators need is a flexible, comprehen- IPsec implementation, there were concerns about the sive set of security tools that can be configured to provide impact of additional packet processing on system perfor- varying types and levels of security to meet the diverse mance. To address this concern, Microsoft and Intel worked requirements of different organizations. To meet this need, together on means to minimize the impact on throughput. the Internet Engineering Task Force (IETF) developed a Through these efforts, Microsoft included in its software set of security standards collectively referred to as Internet design the ability to offload IPsec encryption, and Intel Protocol Security or IPsec. IPsec is, essentially, a framework contributed by providing IPsec encryption and decryption of protocols for providing end-to-end security at the packet offloading to hardware on its new generation of Ethernet processing layer of the network. IPsec provides the ability server adapters and controllers. Encryption offloading to implement customizable security for protecting communi- provides enhanced security while maintaining throughput cation among and between workgroups, local area network at near line-rate and minimizing CPu utilization. This white (lAN) computers, domain clients and servers, branch paper provides an overview of the key features and benefits offices (which might be physically remote), extranets, of IPsec as implemented by Microsoft and the performance and roving clients. and security enhancements provided by Intel® Ethernet Server Adapters. 2 Technical White paper IP Security Features – Intel® EThErNET SErver AdapterS and MicroSoft® Windows SErver® 2008 The.Basics.of.IPsec In the interconnected business world of today, sensitive infor- the policies and rules are applied automatically by Windows mation is constantly flowing across networks. Whether it is the Server 2008. Windows Firewall with Advanced Security Internet, intranets, branch offices, or through remote access, (WFAS) is another key feature for simplification in Windows there are numerous places and ways that information security Server 2008. Windows Firewall and IPsec configuration are can be compromised. The challenge for network administrators integrated into WFAS to provide a single tool that simplifies and other information technology (IT) professionals is to ensure setup and eliminates potential conflicts between IPsec and that sensitive network traffic is kept safe from: firewall security policies. • Data modification while in transit (data integrity) In general operation, two computers using IPsec to • Data being read and interpreted while in transit communicate will create two kinds of security associa- (data confidentiality) tions (SAs). These are referred to as main mode and quick mode. In main mode, the computers mutually authenticate • Spoofing of data by unauthenticated parties (data origin authentication) themselves to each other. Authentication is an establish- ment of a certain level of trust, similar to the various levels • Resubmission (replayed) to gain unauthorized access to of badges issued to employees, visitors, and contractors at protected resources (anti-replay or replay protection) a corporate front desk. In quick mode, the two computers IPsec, as implemented in Windows Server 2008, safeguards negotiate the specifics of the SA based on the trust levels against all of the above attacks end-to-end in IP-based and policies previously set by IT. This negotiation includes networks. unlike antivirus, password authentication, and how the two computers will digitally sign and encrypt traffic other security methods that protect at firewalls and routers between each other to ensure secure communications. at the edge of the private network, IPsec protects within the This is analogous to authenticating a vendor or visitor by network. As a consequence, intrusions that breach the firewall establishing identity and issuing an entrance badge, then are still blocked or protected against by IPsec. hence, IPsec negotiating a nondisclosure agreement before exchanging has the advantage of protecting against both internal and sensitive information with the vendor. external attack. Each computer is governed by an IPsec policy that is set up IPsec uses various methods of protection, most notably policy- once and assigned by the IT administrator. The policy can based packet filtering and encryption. This means that security have any number of rules. Each rule has a filter list and a in terms of which computers can talk to each other or access filter action, and the filter list consists of one or more filters certain types of data is governed by policies that are set up that specify the characteristics of the traffic that the filter by the IT organization. IPsec is configurable to meet specific should process, for example addresses, port numbers, and security needs for isolating sensitive systems and data within protocol types. The filter action specifies the action to be an organization and ensuring safe data transit throughout the taken for the specified traffic, whether to permit it, block it, intranet as well as over the Internet to remote sites or branch or negotiate a pair of IPsec SAs. Security actions can have offices. Additionally, a key feature of Windows Server 2008 is various policy-driven options, including encryption suites, the simplification of IPsec policy management for IT adminis- per-packet authentication methods, how often to generate trators. All the administrator has to do is set policy at one point new authentication keys, whether to allow or block commu- for all or any set of user machines and servers. once set, nication with computers not supporting IPsec, and so forth. 3 Technical White paper IP Security Features – Intel® EThErNET SErver AdapterS and MicroSoft® Windows SErver® 2008 In short, IPsec is an extensive framework of tools that allows At this point, several possible questions may come to mind. IT to build customized security based on policies designed For example: how much processing burden does IPsec by IT. Additionally, because IPsec is integrated into the place on the hosts? By far, the largest burden is packet operating system (oS) at the Network layer (layer 3 of the encryption and decryption.
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages12 Page
-
File Size-