ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Securing a Windows lab environment.

    IT Discussion
    networking security windows 2012 r2
    7
    30
    5.7k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • IRJI
      IRJ
      last edited by

      I'm considering building a Windows lab environment on my network. I was thinking I could allow friends and colleagues access to help with training and testing. I was thinking I could I could have a vhdx drive with a clean image u could use to quickly restore the servers back to a fresh install state. I could even schedule this nightly or every few days depending on need. If it goes well eventually clients.

      Network security would have to be locked down on its own network. What would be the best way to insure a secure network?

      Bill KindleB 1 Reply Last reply Reply Quote 1
      • scottalanmillerS
        scottalanmiller
        last edited by

        LogMeIn?

        gjacobseG 1 Reply Last reply Reply Quote 0
        • scottalanmillerS
          scottalanmiller
          last edited by

          You can use Pertino if you want but that will expose all of the lab users to each other.

          1 Reply Last reply Reply Quote 1
          • gjacobseG
            gjacobse @scottalanmiller
            last edited by

            @scottalanmiller said:

            LogMeIn?

            Didn't LMI go fee based? Not even the basic services are available now unless you pay for it.

            scottalanmillerS 1 Reply Last reply Reply Quote 0
            • scottalanmillerS
              scottalanmiller @gjacobse
              last edited by

              @g.jacobse said:

              @scottalanmiller said:

              LogMeIn?

              Didn't LMI go fee based? Not even the basic services are available now unless you pay for it.

              Correct. Contant @Minion-Queen if you are looking to do LMI on a budget.

              1 Reply Last reply Reply Quote 0
              • scottalanmillerS
                scottalanmiller
                last edited by

                I don't know of any hosted service with user security that is free anymore. 😞

                1 Reply Last reply Reply Quote 0
                • C
                  Carnival Boy
                  last edited by

                  LMI Hamachi is $29 per year per network, so still pretty cheap.

                  scottalanmillerS 1 Reply Last reply Reply Quote 0
                  • scottalanmillerS
                    scottalanmiller @Carnival Boy
                    last edited by

                    @Carnival-Boy said:

                    LMI Hamachi is $29 per year per network, so still pretty cheap.

                    That's Hamachi, not LMI itself. Hamachi is like Pertino - you'd be completely exposing all of the end users to each other.

                    1 Reply Last reply Reply Quote 0
                    • C
                      Carnival Boy
                      last edited by

                      I know. I didn't know you'd be exposing all of the end users though. I thought that happened with a mesh network, but not a hub and spoke? I'm a VPN noob though. How are they exposed in a hub and spoke configuration?

                      scottalanmillerS 1 Reply Last reply Reply Quote 0
                      • Reid CooperR
                        Reid Cooper
                        last edited by

                        I would use a "glass pane" solution like LMI, TeamViewer or something based on VNC or whatever. Using a VPN solution seems overly risky if you don't control the desktops of the end users.

                        1 Reply Last reply Reply Quote 0
                        • scottalanmillerS
                          scottalanmiller @Carnival Boy
                          last edited by

                          @Carnival-Boy said:

                          I know. I didn't know you'd be exposing all of the end users though. I thought that happened with a mesh network, but not a hub and spoke? I'm a VPN noob though. How are they exposed in a hub and spoke configuration?

                          Hamachi does both methods. In the hub and spoke mode there is still a single network and all nodes are exposed to each other. It just makes data transfers slower and more cumbersome since they have to flow through the spoke.

                          Technically Pertino is a hub and spoke, it just presents itself as a mesh.

                          C 1 Reply Last reply Reply Quote 0
                          • C
                            Carnival Boy @scottalanmiller
                            last edited by

                            @scottalanmiller said:

                            Hamachi does both methods.

                            I know. What I obviously don't understand is the difference between the two and the advantages of hub and spoke (given that it is slower and offers no extra security).

                            scottalanmillerS 1 Reply Last reply Reply Quote 0
                            • scottalanmillerS
                              scottalanmiller @Carnival Boy
                              last edited by

                              @Carnival-Boy said:

                              I know. What I obviously don't understand is the difference between the two and the advantages of hub and spoke (given that it is slower and offers no extra security).

                              It's really just impressions. Hub and spoke is needed to manage any sizable VPN. Since hub and spoke can masquerade as mesh and since mesh doesn't scale past a few nodes, hub and spoke is really the only way that it is done. Pertino and Hamachi both use hub and spoke and both make it look like a mesh.

                              The benefit to a true mesh (Pertino doesn't do this) is that you can connect directly between end points. But every end point has to maintain a continuous channel to every other end point. If you have three end points, no big deal, that's only two connections per node. Go to four and you have three. Start getting much bigger and that is a lot of VPN channels being set up and torn down and keys being managed and potentially communications failures on a node by node basis. So, realistically, true mesh doesn't actually exist.

                              The benefit to hub and spoke is that it actually works plus you can have network management and monitoring in the hub.

                              1 Reply Last reply Reply Quote 0
                              • C
                                Carnival Boy
                                last edited by

                                Cheers. So in what way are the end users exposed to each other? What could an attack on one to another look like?

                                scottalanmillerS 1 Reply Last reply Reply Quote 0
                                • scottalanmillerS
                                  scottalanmiller @Carnival Boy
                                  last edited by

                                  @Carnival-Boy said:

                                  Cheers. So in what way are the end users exposed to each other? What could an attack on one to another look like?

                                  The exposure is the same as being on the same LAN because, effectively, they are. Any attack that can happen in an office can happen on a VPN. Hopefully everyone has a local firewall on their machines, often those get disabled on a VPN connection, but not necessarily. But you lack a true firewall between you and the others on the network.

                                  If you have a VPN only to provide access to use tools like RDP and all nodes are well locked down you can be reasonably secure. But the assumption of using a tool like this rather than one like LMI, TV, VNC, RDP directly is that you are going to do other things and that's where the danger really comes in.

                                  C 1 Reply Last reply Reply Quote 0
                                  • Bill KindleB
                                    Bill Kindle @IRJ
                                    last edited by

                                    @IRJ said:

                                    I'm considering building a Windows lab environment on my network. I was thinking I could allow friends and colleagues access to help with training and testing. I was thinking I could I could have a vhdx drive with a clean image u could use to quickly restore the servers back to a fresh install state. I could even schedule this nightly or every few days depending on need. If it goes well eventually clients.

                                    Network security would have to be locked down on its own network. What would be the best way to insure a secure network?

                                    Here's what I've done. Pair up pFsense in a VM and also utilize Pertino. That combination has been working extremely well for me for about two months.

                                    scottalanmillerS 1 Reply Last reply Reply Quote 1
                                    • scottalanmillerS
                                      scottalanmiller @Bill Kindle
                                      last edited by

                                      @Bill-Kindle said:

                                      Here's what I've done. Pair up pFsense in a VM and also utilize Pertino. That combination has been working extremely well for me for about two months.

                                      How many outsiders do you have utilizing your lab?

                                      Bill KindleB 1 Reply Last reply Reply Quote 0
                                      • Bill KindleB
                                        Bill Kindle @scottalanmiller
                                        last edited by

                                        @scottalanmiller said:

                                        @Bill-Kindle said:

                                        Here's what I've done. Pair up pFsense in a VM and also utilize Pertino. That combination has been working extremely well for me for about two months.

                                        How many outsiders do you have utilizing your lab?

                                        Just myself right now. I fire up the lab in virtualbox when I want to use it, and remote into the guests using Pertino and RDP. pFsense is used to completely seperate the network from the host machine using a virtual router.

                                        I guess I could give access to 6 more people with my personal Pertino account.

                                        scottalanmillerS 1 Reply Last reply Reply Quote 0
                                        • scottalanmillerS
                                          scottalanmiller @Bill Kindle
                                          last edited by

                                          @Bill-Kindle said:

                                          I guess I could give access to 6 more people with my personal Pertino account.

                                          yes, they would all get access to each other too.

                                          Bill KindleB 1 Reply Last reply Reply Quote 0
                                          • Bill KindleB
                                            Bill Kindle @scottalanmiller
                                            last edited by

                                            @scottalanmiller said:

                                            @Bill-Kindle said:

                                            I guess I could give access to 6 more people with my personal Pertino account.

                                            yes, they would all get access to each other too.

                                            True. Which is one thing I've asked Pertino in the past if they were coming up with a way to prevent that and only allow the client to access a particular set of machines through the use of ACL's. Last I checked that wasn't possible yet.

                                            scottalanmillerS 1 Reply Last reply Reply Quote 0
                                            • 1
                                            • 2
                                            • 1 / 2
                                            • First post
                                              Last post