Posts Tagged ‘Server 2008’

Cisco ASA5505 Firewall overview

Cisco ASA5505 firewall is a small box with the following layout:

It has eight Ethernet ports marked 0 to 7 and one Console port marked blue.

–  Connect the Console port to the local server or any computer from which you will configure the box: the Console      cable must be connected to Serial port of the computer. Note: it is needed for configuration only; later this    connection can be removed.

–  Port 0 of the ASA must be attached to Internet Provider’s equipment: connect it to the ISP modem.

–  Port 2 of the ASA must be attached to the local Ethernet switch.

–  Connect the Server and computers to the Ethernet switch.

 

CONFIGURATION

In order to configure the firewall, you will need a configuration template (not included in this document, supplied as a separate file). Follow the instructions inside the configuration template in order to adjust it to the profile of your site and use the following configuration sequence:

–  Log in to the server or a computer that was connected to ASA box;

–  Open up the HyperTerminal program (Start à Programs à Accessories à Communications). Set up a new connection to COM1 port.

–  Clear any existing configuration from the firewall using the following set of commands:

Devicename> enable

Devicename# config terminal

Devicename(config)# clear configure all

Devicename(config)# write memory

–  While in configuration mode, copy-paste the configuration file that you prepared earlier.

–  Save the configuration of the firewall:

Devicename(config)# write memory

 

Having this done, your firewall is set up for operation. Verify if your internet are working.

 

 

 

Active Directory is Microsoft’s implementation of a directory service. A directory service holds information about resources within the domain. Resources are stored as objects and include users, computers, groups, printers, and more.

In Windows Server 2008, five different server roles support Active Directory:

 

>Active Directory Domain Services

>Active Directory Certificate Services

>Active Directory Federation Services

>Active Directory Lightweight Directory Services

>Active Directory Rights Management Services

 

The primary role is Active Directory Domain Services. The other roles add to the capabilities of Active Directory. Objects include users, computers, groups, and more. The Active Directory database is stored only on servers holding the role of domain controllers.

 

A significant benefit of using Active Directory Domain Services is that it enables you as an administrator to manage desktops, network servers, and applications all from a centralized location.

 


A read-only domain controller (RODC) hosts a read-only copy of the Active Directory database. This is somewhat of an untrue, because changes can be made to the database. However, the changes can come only from other domain controllers, and the entire database isn’t replicated; instead, only a few select objects are replicated.

 

Usually, domain controllers are considered peers where they are all equal (with a few exceptions). Any objects can be added or modified such as adding a user or a user changing their password on any domain controller. These changes are then replicated to other domain controllers. However, with RODCs, changes to the domain controller can come only from other domain controllers. Moreover, the changes are severely restricted to only a few select objects.

 

The huge benefit of the RODC is that credentials of all users and computers in Active Directory are not replicated to the RODC. This significantly improves the security of domain controllers that are placed at remote locations.

 


Network Access Protection (NAP) is an added feature that can help protect your network

from remote access clients. NAP helps you protect the network from the clients.

Within a local area network (LAN), you can control client computers to ensure they are safe and healthy. You can use Group Policy to ensure that it’s locked down from a security perspective and that it is getting the required updates. Antivirus and spyware software can be pushed out, regularly updated and run on clients. You can run scripts to ensure that all the corporate policies remain in place.

 

However, you can’t control a client accessing your network from a hotel or someone other Place. It’s entirely possible for a virus-ridden computer to connect to your network and cause significant problems. The solution is NAP, which is a set of technologies that can be used to check the health of a client. If the client is healthy, it’s allowed access to the network. If unhealthy, it’s quarantined and allowed access to remediation servers that can be used to bring the client into Compliance with the requirements. Health policies are determined and set by the administrator.

 

In the network you  use Windows Software Update Services (WSUS) to approve and  install the updates on clients. Since the VPN client isn’t in the network, they might not have the required updates. The client would be quarantined, and a WSUS server could be used as a remediation server to push the updates to the client. Once the updates are installed, the client could be rechecked and issued a health certificate and then granted access to the network.

 


Exchange Server 2010 cannot send out SMTP messages to the Internet by default. To achieve

this you’ll need to create an SMTP connector, which is a connector between one or more

Hub Transport Server and the Internet. Since this information is stored in Active Directory,

all Hub Transport Servers in the organization know of its existence and know how to route

messages via the SMTP connector to the Internet.

To create an SMTP connector to the Internet, follow these steps:

1. Logon to the Exchange Server 2010 server using a domain administrator account, and

open the Exchange Management Console;

2. Expand “Microsoft Exchange On-Premises” and then expand the Organization

Configuration.

3. Click on the Hub Transport, and then click on the “Send Connectors” tab in the middle

pane;

4. In the Actions Pane click on “New Send Connector”;

5. On the Introduction page enter a friendly name, “Internet Connector” for example,

and in the “Select the intended use for this Send connector” drop-down box select the

Internet option. Click Next to continue;

6. On the Address Space page, click on the Add button to add an address space for the

Internet Connector. In the address field enter an asterisk *, leave the cost on default and

click OK. Click Next to continue;

7. On the Network settings page you can select if the Send Connector will use its own

network DNS settings to route E-mail to other organizations, or to use a smart host.

Change this according to your own environment and click Next to continue;

8. On the source server page you can choose multiple source servers for the Send

Connector. You can compare this to Bridgehead Servers in Exchange Server 2003. When

you enter multiple Hub Transport Servers, the Exchange organization will automatically

load balance the SMTP traffic between the Hub Transport Servers. Since we have only

one Hub Transport Server installed we can leave this as default. Click Next to continue;

9. Check the Configuration Summary, and if everything is ok click on New to create the

Send Connector;

10. On the Completion page click Finish.

You have now created a Send Connector that routes messages from the internal Exchange

Server 2010 organization to the Internet.


Exchange recipients clearly need an email address for receiving email. For receiving email

from the Internet, recipients need an email address that corresponds to an accepted domain.

Recipients are either assigned an email address using an Email Address Policy, or it is also

possible to manually assign e-mail addresses to recipients.

To configure Email Address Policies follow these steps:

1. Logon to an Exchange Server 2010 server with domain administrator credentials and

open the Exchange Management Console;

2. Expand the “Microsoft Exchange On-Premises”;

3. Expand the Organization Configuration;

4. Click on Hub Transport in the left pane;

5. In the middle pane there are eight tabs, click on the on labelled E-Mail Address Policies;

6. There will be one default policy that will be applied to all recipients in your organization.

For now the default policy will be changed so that recipients will have the E-mail address

corresponding to your Accepted Domain. Click on New E-mail Address policy to create a

new policy;

7. On the Introduction page enter a new Friendly Name. Click the Browse button to select

a container or Organizational Unit in Active Directory where you want to apply the

filter. Select the Users container. Click Next to continue;

8. On the Conditions page you can select conditions on how the recipients in the container

will be queried, for example on State, Province, Department, Company etc. Do not select

anything for this demonstration, and click Next to continue;

9. On the E-mail Addresses tab click the Add button, the SMTP E-mail Address pop-up

will be shown. Leave the local part default (Use Alias) and select the “Select the accepted

domain for the e-mail address” option and click Browse;

10. Select the Accepted Domain you entered earlier , click OK twice and

click Next to continue;

11. On the Schedule page you have the option to apply the policy immediately or schedule

a deploy during, for example, non-office hours. This is useful when you have to change

thousands of recipients. For now leave it on Immediately and click Next to continue;

12. Review the settings, and if everything is ok then click New to create the policy and apply

it immediately;

13. When finished successfully click the Finish button.

You can check the E-mail address on a recipient through the EMC to confirm your policy

has been correctly applied. Expand the Recipient Configuration in the left pane of the

Exchange Management Console and click on ‘Mailbox’. In the middle pane a list of recipients

should show up, although right after installation only an administrator mailbox should be

visible. Double click on the mailbox and select the E-mail Addresses tab. The Administrator@

yourdomain.com should be the primary SMTP address.


The first thing for Exchange Server 2010 to configure is the accepted domains. In order to

receive SMTP messages from the Internet, an Exchange server has to know what domains

it will be receiving email for, as well as which domains it is responsible for. These are called

‘accepted domains’, and there are three types:

• Authoritative Domain – For this type of domain, the Exchange organization is fully

responsible and there will be no other messaging environment responsible. This

Exchange organization will also generate NDR (Non Delivery Report) messages when

mailboxes are not available.

• Internal Relay Domain – The Exchange organization will receive mail for this type of

domain, but it will relay all messages to an Exchange organization within the company.

• External Relay Domain – And for this type of domain, the Exchange organization will

receive mail, but it will relay all messages to a messaging platform outside the company.

For all three scenarios the MX records for the domain will be pointing to your Exchange

organization, and mail will be initially delivered to your Exchange servers.

Accepted domains are configured on the organization level and, as such, are known by all

Hub Transport Servers. If you are using an Edge Transport Server as well, the accepted

domain information will also be synchronized to the Edge Transport Servers.

To configure accepted domains follow these steps:

1. Logon to an Exchange Server 2010 server with domain administrator credentials and

open the Exchange Management Console;

2. Expand the “Microsoft Exchange On-Premises”;

3. Expand the Organization Configuration;

4. Click on Hub Transport in the left pane;

5. In the middle pane there are eight tabs, click on the Accepted Domains one;

6. One entry will appear, and the name will be the local domain (FQDN) that’s used when

installing the Active Directory. In the Actions pane click on New Accepted Domain;

7. In the New Accepted Domain Wizard enter a (friendly) name and the Accepted Domain

itself, for example yourdomain.com. When entered, select the type of Accepted Domain

in your Exchange Organization. In this example select the “Authoritative Domain”. Click

New to continue;

8. The Accepted Domain will now be created, and you can now click Finish on the Completion

window.

You have just created an accepted domain in your Exchange organization; the Exchange

server will accept messages for this domain, and if no recipients are found a NDR (Non

Delivery Report) will be generated.


When the installations of both the internal Exchange organization and the Edge Transport

Server are finished, the “post setup” configuration can be started. As in Exchange Server 2007,

there are a couple of additions and changes in the configuration that have to be made to the

Exchange Server 2010 instance before mail can be sent or received from the Internet.

• Enter an Exchange Server 2010 license key.

• Enter accepted domains and setup email address policies.

• Configure a Send Connector to send e-mail to the Internet.

• Configure the Hub Transport Server to accept anonymous SMTP if an Edge Transport

Server is not used.

• Add a Certificate to the Client Access Server role.

• Configure the Client Access Server role.


When all the prerequisite software for the Exchange Server 2010 Edge Transport Server role is

installed, you can move on to the Exchange server itself

1. Logon to the server with local administrator credentials, go to the installation media and

start the setup.exe installation program

2. Once all prerequisite software is installed correctly, the first two options are grayed out

and you can directly select “Install Exchange Server 2010”

3. On the Introduction Page click Next

4. Accept the License Agreement and click Next

5. Select whether or not you want to participate in the Error Reporting Feature and click

Next

6. On the Installation Type page select “Custom Installation” and click Next. If needed you

can select another directory where the Exchange software is installed

7. On the Server Role Selection page select the Edge Transport Server role. Notice that

when you select this role the other roles (Mailbox, Client Access & others) are grayed out

immediately. Click Next to continue.

8. The setup program will now perform a readiness to check to see if your server is capable

of running the Edge Transport Server role. When successfully completed click Install to

continue.

9. The Exchange binaries will now be copied to the local disk, the Management Tools will

be installed and the Edge Transport Server will be installed. This can take quite some

time to finish.

10. When finished you can continue configuring the Edge Transport Server using the

Exchange Management Console.

The Edge Transport Server is now installed, but not yet configured. It is possible to configure

everything, like the Accepted Domains, Send Connectors etc., manually using the Exchange

Management Console. An easier way is to use a synchronization process which synchronizes

information from the Hub Transport Server within the company’s Active Directory and

Exchange organization to the Edge Transport Server in the DMZ. This process is called the

Edge Transport Synchronization, or Edge sync.


The Active Directory Lightweight Directory Services (AD LDS), previously known as Active

Directory Application Mode or ADAM, can be installed using the Windows Server 2008

Server Manager. To install the AD LDS follow these steps:

1. Logon to the server, click the Start button and select the Server Manager.

2. In the Server Manger, click “Roles” and in the action click “Add Roles”.

3. Click Next on the “before you begin” page.

4. On the “select server role” page, select the “Active Directory Lightweight Directory

Services” and click Next.

5. On the Introduction page, click Next.

6. On the Confirmation page, click Install.

7. On the Installation Results page, click Finish.

The Active Directory Lightweight Directory Services role is now installed and the server is

ready for the Edge Server Role.