UWSADS Campus IPsec and Trust
The purpose of this document is to provide a high level step-by-step guide to establishing an IPsec tunnel and one-way forest trust with uwsads.wisconsin.edu.
Prerequisites:
Complete the following steps so a trust can be established.
- Campus administrators have been in contact with UWSADS administrators to schedule collaboration of resources.
- Campus administrators have administrative rights to establish a trust in their environment.
- At a minimum, the firewall must be enabled to allow all inbound and outbound traffic.
- Connection Profiles will not function if profiles (Public/Private/Domain) are set to disabled.
- Appropriate firewall rules (at this time, IPsec ports) have been allowed through both host-based and physical firewalls to:
- uwsadsdc-prd-01.uwsads.wisconsin.edu - 144.92.104.76
- uwsadsdc-prd-02.uwsads.wisconsin.edu - 144.92.104.77
- The trust NetBOIS names are unique - a full list of existing trust NetBIOS names can be found on the UWSADS KB site: UW System Active Directory Services Knowledge Base
IPsec Configuration:
We recommend configuring a GPO for your IPsec rules as opposed to modifying each individual host. The steps below can be extrapolated for both a local security policy, and a group policy object.
Using PowerShell:
-
Create the group policy object and assign it to the Domain Controller's OU
-> $gpo = New-GPO -Name 'Domain Controllers - IPsec for UWSADS' -comment 'IPsec settings for UWSADS trust'
-> $gpo | New_GPLink -Target "ou=domain controllers,dc=contoso,dc=com" -LinkEnabled Yes
-
Create the connection security rule.
-> $gponame = 'contoso.com\Domain Controllers - IPsec for UWSADS'
-> $proposal = New-NetIPsecAuthProposal -Machine -PreSharedKey 'som3 10ng PreSharedKey'
-> $ipsecauth = New-NetIPsecPhase1AuthSet -DisplayName 'UWSADS IPsec PSK' -Proposal $proposal -PolicyStor GPO:$gponame
-> $uwsadsips = @('144.92.104.76', '144.92.104.77')
-> $campusips = @('192.168.1.1', '172.16.1.1')
-> NewNetIPsecRule -DisplayName 'UWSADS <-> CAMPUS' -RemoteAddress $uwsadsips -LocalAddress $campusips -Phase1AuthSet $ipsecauth.InstanceID -InboundSecurity Require -OutboundSecurity Require -PolicyStore GPO:$gponame
Computer Configuration -> Policies -> Windows Settings -> Security Settings -> Windows Firewall with Advanced Security
-
Right click "Connection Security Rules" and select "New Rule..."
-
Under "Rule Type", select "Server-to-server"
- Click "Next"
-
Under "Endpoints":
- Endpoint 1 contains the IP addresses of your local campus domain controllers - please share these addresses/friendly names with UWSADS administrators.
-
Endpoint 2 contains the IP addresses of the uwsads.wisconsin.edu domain controllers. The current addresses/FQDNs are specified in the prerequisites of this document.
- Click "Next"
-
Under "Requirements", select the third radio dial, "Require authentication for inbound and outbound connections".
- Click "Next"
-
Under "Authentication Method", select "Advanced", and then click "Customize..."
Note: We will be using a pre-shared key which will require coordination between campus administrators and UWSADS administrators.
- Click "Next"
-
Select all profiles you wish to configure the rule for.
- Click "Next"
-
Under "Name", enter a descriptive name of the connection profile, e.g. "CAMPUS <-> UWSADS"
- Click "Finish"
-
Ensure the policy is in place on your domain controllers.
- wf.msc -> Connection Security Rules
-
wf.msc -> Monitoring -> Connection Security Rules
- This is testable by using ping tests from host to host.
-
Connection statistics are able to be monitored in wf.msg -> Monitoring -> Security Associations -> Main Mode
- An initial troubleshooting task if there is no connectivity would be to restart the Windows Firewall service, or restart the host.
DNS Configuration
We will be configuring a conditional forwarder in both the local campus doamin and the UWSADS domain. This allows the resolution of DNS entries, which may not be public to the internet.
Using PowerShell:
-> Add-DnsServerConditionalForwarderZone -Name "uwsads.wisconsin.edu" -ReplicationScope "Forest" -MasterServers 144.92.104.76,144.92.104.77
- Open the DNS management console and connect to an authoritative DNS server.
-
Right click "Conditional Forwarders"
- Select "New Conditional Forwarder"
-
The "DNS Domain" is "uwsads.wisconsin.edu".
-
"IP Addresses" are the UWSADS IP addresses specified in the prerequisites of this document.
-
Select the option to "Store this conditional forwarder and replicate to all DNS servers in this forest"
- Click "Ok"
- Test DNS resolution of the FQDNs of the UWSADS domain controllers by using "nslookup uwsads.wisconsin.edu".
Establish a one-way trust:
-
With appropriate administrative credentials, open "Active Directory Domains and Trusts"
-
Right click on the domain name and select "Properties"
- Click "New Trust..."
- Click "Next"
- Enter "uwsads.wisconsin.edu
- Select "Forest Trust".
-
Select "One-way incoming" (or outgoing if doing this from the UWSADS domain)
Note: If working with a UWSADS administrator, there is the potential to establish the trust on both sides from either a campus domain controller, or UWSADS domain controller.
- Click "Next"
-
Select "Forest-wide authentication".