Configuring Mobile Networking Slides
Configuring Mobile Networking Slides
Glenn Weadock
MDAA, MCAAA, MCT, MCSE, MCSA, MCITP, A+, SECURITY+
[email protected] www.i-sw.com
Topics in This Wireless networking
Module Wireless protocols
Wireless authentication
Bluetooth connectivity
Virtual Private Networks
Deploying network connections
Wireless Networking
Wi-Fi began back in 1999
(Apple called it “AirPort”)
Defined by the 802.11 set of standards for
2.4 and 5GHz frequency bands
Requires secure protocols for
authentication and encryption
Both communicators must use same
protocol
Organizations typically have a WAP
(Wireless Access Point) communicating
with computers, tablets, and/or phones
Wireless connections without a WAP
are called “ad hoc.”
Ad hoc wireless is best for occasional,
informal connections – much like
Bluetooth.
Windows 10/11 Wireless Settings
Settings applet
- Network & Internet > Wi-Fi
- Autoconnection, discoverability,
metering, random hardware addresses,
IP configuration
Control panels
- Network & Sharing Center
- IP configuration, discoverability,
file/printer sharing, adapter options,
wireless network properties
Wireless Choices in “Settings”
Show available networks
Hardware properties
- View only, except IP configuration
- Driver, network channel/band, etc.
POWERSHELL
- Get-NetAdapter …
- Enable-NetAdatper …
- Disable-NetAdapter…
- etc.
Demo
1997 2004
WEP WPA2
Part of 802.11 standard 802.11i
2003 2018
WPA WPA3
Interim solution Even better security
Wireless Protocols Timeline
1997 2004
WEP WPA2
Part of 802.11 standard 802.11i
2003 2018
WPA WPA3
Interim solution Even better security
Wireless Protocols Timeline
1997 2004
WEP WPA2
Part of 802.11 standard 802.11i
2003 2018
WPA WPA3
Interim solution Even better security
Wireless Protocols Timeline
1997 2004
WEP WPA2
Part of 802.11 standard 802.11i
2003 2018
WPA WPA3
Interim solution Even better security
Wired Equivalent Privacy (WEP)
Introduced in 1997
1997
WEP
Used a “stream cipher” called RC4
Part of 802.11 standard
Major weaknesses exposed in 2001
WEP keys could be cracked in < 1 hour
Key had either 64 or 128 bits
Wi-Fi Protected Access (WPA)
Firewall rules
- UDP 1645, 1646, 1812, 1813 (or alternates)
- NPS and RAS must use same ports
Tunneling/encapsulation
- Repackage data in different format
- Outer wrapping has routing info
- Work around firewall/port issues
Authentication
- Verify one or more parties
Encryption
- For safe passage over unsafe networks
Tunneling (a.k.a. Encapsulation)
Encrypted Encrypted
Data
Data Data
New “wrapper”
with routing
information to
navigate the
intervening
network
Tunneling Protocols in Windows 10/11
PPTP
- Point-to-Point Tunneling Protocol
L2TP/IPsec
- Layer 2 Tunneling Protocol
SSTP
- Secure Socket Tunneling Protocol
IKEv2
- Internet Key Exchange version 2
Client Authentication
VPN server
- With Network Policy Server installed
RADIUS server
- For centralizing authentication &
accounting
Authentication Protocols
PAP
Password Authentication Protocol
Plaintext; old OS’s; not recommended
CHAP
Challenge-Handshake Auth. Protocol
MSCHAPv2
Better. Mutual authentication (2-way)
EAP/PEAP
Extensible Authentication Protocol
Negotiated; flexible; can use certs
VPN Authentication with Certificates
Types:
EAP-TLS
PEAP-TLS
PEAP-MSCHAPv2
Better than passwords
Recommended for L2TP/IPsec
Optional for PPTP
Machine cert required for IKEv2
SSL cert required for SSTP (server)
IP Addressing
Automatic
- Use internal DHCP server to assign IPs
to remote clients
Public Internet
NLS not found
Resolve www.msftncsi.com NLS found
Create tunnel No tunneling
Use NRPT Ignore NRPT
Public or private firewall profile Domain firewall profile
DirectAccess Requirements
AD, DNS
- Wizard builds required GPOs
User Tunnel:
- Supports IKEv2, SSTP
- Device in domain, workgroup,
or Azure AD
- All Windows 10/11 editions
Deploying Network Connections
Types of connection to deploy for users:
- VPN
- Wi-Fi
- (Bluetooth isn’t complex enough)
Methods of deployment:
- Group Policy Preferences
- PowerShell + logon scripts
- Connection Manager
Administration Kit
- WCD and provisioning packages
- Configuration Manager
- Microsoft Intune or other MDM
Group Policy Preferences
Add-VPNConnection
User Configuration > Policies > Windows
Settings > Scripts (Logon/Logoff)
Connection Manager Administration Kit
OOBE
- Can apply after first OOBE page
- 5 quick taps on the Windows key
Runtime
- Settings > Accounts >
Access work or school >
Add or remove a provisioning package
- Odd insistence on a flash drive...?
- OR just double-click the PPKG file
Demo