DESKTOP

Windows Server 2003 : Configuring a Windows IPSec Policy (part 4) - Using Group Policy to Implement IPSec, Monitoring and Troubleshooting IPSec

10/9/2012 9:22:46 PM

8. Using Group Policy to Implement IPSec

IPSec policies can also be created as part of a Group Policy Object (GPO) and will be distributed to the computers whose accounts are targeted by the GPO. These policies can be created by right-clicking on the IP Security Policies on Active Directory node of the GPO, selecting Create IP Security Policy, and following the wizard. Or, you can import a saved policy into the IP Security node of the GPO. Keep the following in mind when creating IPSec Group Policy-based policies:

  • Create and test the policy in a test network between two computers.

  • Assign the policy to an OU in a test forest. The OU should contain computer accounts from representative computers (for example, Windows 2000, Windows XP, and Windows Server 2003, if all of these operating systems will be assigned the policy in the production network).

  • When the policy is working as expected, add the policy to the production domain, but assign it (at first) to a small test OU.

  • After testing, assign the policy to larger groups of computers in the production domain.

To create an IPSec policy directly in a GPO, begin by opening the GPO for editing. Expand the GPO and drill down to the Windows Settings → Security Settings → IP Security Policies on the Active Directory node, as shown in Figure 14.

Right-click on the node and select Create IP Security Policy. Follow the wizard to implement the desired policy. The wizard works the same way as it does for the local IP Security Policy described earlier.

Figure 14. Group Policy based IPSec Policies can be created by running the wizard from with in a GPO

To import a saved IP Security Policy into a GPO, begin by opening the GPO for editing. Expand the GPO and drill down to the Windows Settings → Security Settings → IP Security Policies on Active Directory node. Right-click on the node and select All Tasks, then select Import Policies, as shown in Figure 15.

Figure 15. IPSec Policies can be exported from a local policy or GPO and then imported into a GPO

Browse to and select a saved IPSec policy and click Open.

9. Monitoring and Troubleshooting IPSec

When an IPSec policy does not work, it is often a simple configuration error. Many of these errors can be easily discovered by reviewing the policy configuration. Common errors are IP addresses that are entered incorrectly, mismatched encryption or integrity algorithms, and wrong port numbers. However, because there are a large number of things to be configured, knowing how to use monitoring and diagnostic tools is important. In addition, it is easy to configure a policy that does not work, but that you may think is working because the systems are communicating. If you monitoring IPSec, you can confirm that encryption is taking place.

Two Windows Server 2003 tools that can be used to monitor and troubleshoot IPSec on Windows Server 2003 are the netsh ipsec show command and the IP Security Monitor snap-in.

9.1. Using netsh to monitor IPSec

The netsh show command can be used to obtain policy information on the current IPSec session and to obtain diagnostics and logging information. If you can obtain the information using the graphical IP Security Monitor, you can obtain it using netsh.

To display the current IPSec policy, use the netsh ipsec static show all command. This will list all the information on the current policy. To narrow down the range of information displayed, you can use variations such as the following:

  • Show the filter list:

        show filter list name=filterlist
    

  • Show a specific rule:

        show rule name
    

  • Display a specific policy:

        show policy name=policy name
    

To find diagnostic information use the netsh ipsec dynamic set config commands, such as the following:

  • Set diagnostic logging from level 0, or disabled, to level 7 for all logging:

        ipsecdiagnostic value=7
    

  • Turn on or off IKE (Oakley) logging:

        Ikelogging value=
    

  • Disable Certificate Revocation List (CRL) checking (0), fail certificate validation if the certificate is revoked (1), or fail if any CRL check error occurs (2):

        strongcrlchecek value=
    

Several show commands provide useful troubleshooting information, including the following:

  • Resolve DNS or NetBIOS computer names associated with an IP address (helpful in determining if the policy impacts the correct computers):

        show all resolvedns=yes
    

  • Display information on the IPSec main mode SA:

        show mmsas
    

  • Display quick mode SAs:

        show qmsas
    

  • Display IKE main mode and/or IPSec quick mode statistics:

        show stats
    

netdiag is a command-line tool for Windows 2000 and Windows Server 2003. It can be used to display IPSec information, as well as test and view network configuration for Windows 2000 computers. The command can be used to test and view network configuration of Windows Server 2003 computers, but the netdiag /test:ipsec option is not available. The netsh command can be used to provide this information.


9.2. Using the IP Security Monitor to monitor IPSec

In the section "Setting Up the IPSec Monitor and Testing the Policy," the IP Security Monitor was used to monitor the test of the security negotiation policy. The tool is also available as an MMC snap-in for Windows XP. It cannot be used to monitor Windows 2000 IPSec. Use the tool to monitor the active Windows Server 2003 and/or Windows XP IPSec policy. Policy configuration information, quick mode and main mode statistics, as well as information on active SAs can be obtained.

Much of the information the tool presents is straightforward. However, some of the information on IPSec main mode and quick mode statistics is not. Some of this data only makes sense when it is collected and monitored over time, and when it is considered in context. For example, whether the number of pending requests or messages queued represents a problem (perhaps few are being serviced) may depend on the amount of processing normally done on this computer. Other policy statistics are easy to interpret. For example, if there are a large number of authentication failures and failed connections, it probably means that authentication is misconfigured, or it could mean an attempt is being made from an unauthorized computer. Table 2 provides an explanation of main mode statistics, and Table 3 provides an explanation of Quick Mode statistics.

Table 2. Main Mode statistics in the IP Security Monitor
StatisticExplanation
Active AcquireThe number of pending requests for IKE negotiation between IPSec peers.
Active ReceiveThe number of IKE messages queued for processing.
Acquire FailuresThe number of established outbound SA requests that have failed since the IPSec service started.
Receive FailuresThe number of errors in received IKE messages since the IPSec service started.
Send FailuresThe number of errors during IKE negotiation.
Acquire Heap SizeThe number of successive outbound requests required to establish SAs.
Receive Heap SizeThe number of IKE messages in IKE receive buffers.
Authentication failuresThe number of failed authentication failures since the start of the IPSec service. When connections are failing, check to see if authentication failures increase during connection attempts. If this is the case, authentication is most likely the problem. Look for common errors depending on the type of authentication used. If shared secrets are used, check to see if they match. If the method is Kerberos, are IPSec peers members of the domain? When the method is certificates, make sure that are they available and correct.
Negotiation failuresThe number of main mode and quick mode negotiation failures. If connections are failing and negotiation failures increase during connection attempts, check to see if security methods (or possibly authentication) are mismatched. .
Invalid cookies receivedCookies are values in received IKE messages and are used to help identify the corresponding main mode SA. (SPIs are used to identify quick mode SAs.) If invalid cookies are received, then the failure is with IKE negotiation.
Total acquireThe number of requests submitted to IKE. (Including those resulting from soft SAs).
Total get SPIRequests to driver for the SPI.
Key additionThe number of outbound quick mode SA additions.
Key updatesThe number of inbound quick mode SAs added by IKE.
Get SPI failuresThe number of failed requests for a unique SPI.
Key addition failuresThe number of failed outbound quick mode SA addition requests submitted by IKE.
Key update failuresA failed inbound quick mode SA addition request.
ISADB List SizeThe number of main mode state entries. This includes successful main modes, main modes in negotiation, and those that have failed or expired, but have not been deleted.
Connection list sizeThe number of quick mode negotiations in process.
IKE Main ModeThe number of successful SAs in main mode.
IKE quick modeThe total SAs in quick mode.
Soft associationsSAs that are not the result of an encrypted, main mode negotiation.
Invalid packets receivedThe number of invalid IKE messages. This can be the result of invalid header fields, payload lengths, and incorrect values. The preshared key may be mismatched. It may also be the result of retransmitted IKE messages.

Table3. Quick Mode statistics
StatisticExplanation
ActiveSecurity AssociationNumber of quick mode SAs. (Though two SAs are used during quick mode, only one of them will be shown here.)
Offloaded Security AssociationsNumber of quick mode SAs offloaded to hardware.
Pending Key OperationsNumber of key exchange operations.
Key AdditionsNumber of keys added for quick mode SAs since the computer started.
Key DeletionsNumber of keys quick mode SAs that have been successfully deleted since computer started.
RekeysNumber of successful rekey operations for quick mode.
Active TunnelsNumber of active tunnels.
Bad SPI PacketsNumber of packets with incorrect SPI. This may mean that the SPI expired and an old packet just arrived. If rekeying is frequent and/or there are a large number of SAs, this number may be higher than normal without being indicative of anything wrong. It might also indicate a spoofing attack.
Packets Not DecryptedNumber of packets not decrypted. Packets are not decrypted if they fail a validation check.
Packets not authenticatedMight indicate IPSec packet spoofing or modification attack or corruption by network devices.
Packets with Replay detectionNumber of packets that contain an invalid sequence number. Watch for increase because they might indicate a network problem or replay attack.
Confidential bytes sentNumber of encrypted bytes (those sent using ESP protocol).
Authenticated bytes sentNumber of bytes authenticated using AH or ESP.
Transport bytes sentNumber of received bytes using IPSec transport mode.
Bytes sent in TunnelsBytes sent using IPSec tunnel mode.
Bytes received in tunnelsBytes received.
Offloaded bytes sentNumber of bytes sent that use the hardware offload.
Offloaded bytes receivedNumber of bytes received using hardware offload.

To learn the basics of configuring, testing and monitoring IPSec, you must perform extensive preparation and practice. Once you have successfully written a few policies with the wizard, monitored them using the IPSec Monitor, and rewritten them using netsh, you are ready to write and use all but the most complex IPSec policies. While those policies may require more intensive study and testing, they are built on the information you've learned. A few of these extended operations are covered in the following discussion.

Other  
 
Most View
AMD No Longer A Windows-Only Chip Maker
Nginx HTTP Server : Setting up the prerequisites
Windows Sever 2003 : Planning DNS Security
The Linux Build: Part For Penguins (Part 4)
Fujifilm FinePix SL1000 – A 50x Optical Zoom Camera Review (Part 1)
Samsung BD-F7500 Smart Bluray Player
Samsung Galaxy Note 10.1 - Distinguishes Itself In A Crowded Market
Sony NEX-6 Mirrorless Camera Review (Part 10)
Sharepoint 2013 : Creating an eDiscovery query
Magnum KT120 New Light Amplifier Review
REVIEW
- First look: Apple Watch

- 3 Tips for Maintaining Your Cell Phone Battery (part 1)

- 3 Tips for Maintaining Your Cell Phone Battery (part 2)
VIDEO TUTORIAL
- How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 1)

- How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 2)

- How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 3)
Popular Tags
Microsoft Access Microsoft Excel Microsoft OneNote Microsoft PowerPoint Microsoft Project Microsoft Visio Microsoft Word Active Directory Biztalk Exchange Server Microsoft LynC Server Microsoft Dynamic Sharepoint Sql Server Windows Server 2008 Windows Server 2012 Windows 7 Windows 8 Adobe Indesign Adobe Flash Professional Dreamweaver Adobe Illustrator Adobe After Effects Adobe Photoshop Adobe Fireworks Adobe Flash Catalyst Corel Painter X CorelDRAW X5 CorelDraw 10 QuarkXPress 8 windows Phone 7 windows Phone 8 BlackBerry Android Ipad Iphone iOS
Top 10
3 Tips for Maintaining Your Cell Phone Battery (part 2) - Discharge Smart, Use Smart
3 Tips for Maintaining Your Cell Phone Battery (part 1) - Charge Smart
OPEL MERIVA : Making a grand entrance
FORD MONDEO 2.0 ECOBOOST : Modern Mondeo
BMW 650i COUPE : Sexy retooling of BMW's 6-series
BMW 120d; M135i - Finely tuned
PHP Tutorials : Storing Images in MySQL with PHP (part 2) - Creating the HTML, Inserting the Image into MySQL
PHP Tutorials : Storing Images in MySQL with PHP (part 1) - Why store binary files in MySQL using PHP?
Java Tutorials : Nested For Loop (part 2) - Program to create a Two-Dimensional Array
Java Tutorials : Nested For Loop (part 1)