Wednesday, 2012-01-04

*** test (4ab0d485@gateway/web/freenode/ip.74.176.212.133) has joined #wikid16:04
testhello16:05
*** test has quit (Ping timeout: 258 seconds)16:09
*** nowen has quit (Quit: Leaving.)18:08
*** nowen (~nowen@adsl-74-176-212-133.asm.bellsouth.net) has joined #wikid19:29
*** XaaS (ad498917@gateway/web/freenode/ip.173.73.137.23) has joined #wikid20:26
XaaS@nowen - are you you around?20:26
nowenyes- but on the phone20:26
nowenwith Chris :)20:26
XaaSOh OK - I have some questions for you20:27
XaaSYou free to talk now? :)20:32
nowenha! yes20:34
XaaSHope it went well with Chris (not sure what you guys were talking about)20:34
XaaSI am contacting you about pre-registering tokens20:34
XaaSand what it takes to do both OS and Phone tokens20:34
nowenyeah, the phone tokens don't support it now.  At best we could try to do for Advanced server20:37
nowenstill not sure about how to modify the setup for software that is downloaded from the app store20:37
XaaSIf you had the ability to put the server code and the pre-reg code in at the same time???20:38
nowenhmm, yeah, my mind was affixed to dedicated server code20:39
XaaShave a checkbox to enable pre-regisitration20:39
XaaSand it undims a prereg field20:39
nowenshould work.  We need to do all new tokens for Advanced anyway20:40
XaaSor have a seperate pre-reg wikid domain that only does pre-registration - you connect your token to the wikid domain and then it asks for the pre-reg code20:41
nowenyeah, that might be better - one step to start - enter domain.20:42
XaaSWe can beta it for you20:42
nowenawesome20:44
XaaSWe really could use the ability for WiKID to support multiple RADIUS clients with different secrets20:51
nowenbut the same IP address?20:52
nowenbecause, it does  support multiple RADIUS clients with different secrets and IP addresses20:52
XaaSyes - multi-tenancy using a single NPS/IAS server to do the RADIUS pass-through authentication and accounting...20:52
XaaSthe point is to use 1 (or 2 for HA) NPS servers that can handle multiple WiKID domains20:53
nowencan NPS handle radius attributes?20:54
XaaSyes it can20:54
nowenI wonder if you can do the same via radius attributes?20:55
XaaSI didn't think the NPS server was the issue (unless we need to configure attributes I didn't know about)20:56
nowenwhat are the users logging into? a vpn, private cloud, your hosted cloud?20:59
XaaSeither a VPN connection via MS Forefront TMG/UAG21:00
XaaSsomething that supports RADIUS typically21:00
nowenok,  where are they going?  are they getting their own hosted cloud?21:01
XaaSit depends on the rules - it typically puts them on the VLANs (networks) where their VMs are residing.21:03
nowenok - what assigns them to their vlan?21:03
XaaSIt's set up by either a policy which can be controlled by Active Directory or other rules in TMG21:04
nowencan one of the rules be a radius return attribute?21:08
XaaShmm... not sure - they are more like they either allow or deny traffic to different networks/ip's depending on the permissions attached to the rules21:09
nowen"The 3rd option is the really interesting one where the VLANs are dynamically assigned by the Policy Server based on the health state of the client. This assignment happens by having the Policy Server pass identifiers to the Network Access Device (via RADIUS attributes) telling it which VLAN to assign the client to."21:09
nowenhttp://blogs.technet.com/b/nap/archive/2006/05/31/444128.aspx21:10
nowennot quite what we want, but close21:10
XaaSactually - TMG doesn't do VLANs directly - you need to use a NIC that provides multiple VLAN support and presents as virtual NICs21:13
nowenwhat tells the NIC to provide the VLAN?21:15
XaaSlike in VMware the Intel E1000/Pro 1000 MT driver can be replaced with the Microsoft provided one and use the Intel drive and be configured to present a separate virtual NIC for each VLAN exposed.21:15
* nowen displays cloud ignorance21:15
*** XaaS has quit (Ping timeout: 258 seconds)21:19
*** XaaS (ad498917@gateway/web/freenode/ip.173.73.137.23) has joined #wikid21:40
XaaS@nowen - sorry - internet issues21:40
nowennp21:40
XaaSGood article on VGT in VMware - http://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=100425221:41
nowenwhere does the dynamic part happen?21:44
XaaSSo this is how the VLANs get configured on the TMG with the Intel PRO/1000 E1000 drivers - http://img35.imageshack.us/img35/166/96796611.gif21:50
XaaSAs you add the VLANs into the NIC, new virtual NICs appear in your Device Manager21:51
nowenok - but how does the user get assigned to one? Is that still Forefront?21:51
XaaSyes - that is in TMG21:53
XaaSIn the firewall policy screen - http://araihan.files.wordpress.com/2010/03/120.jpg21:53
XaaSFYI - this is Microsoft position on supporting VLANs with ISA/TMG - http://blogs.technet.com/b/isablog/archive/2006/10/04/802.1q-and-isa-server.aspx21:54
XaaSThat is why we use the Intel E1000 drivers for VMware to support 802.1q VLAN support21:56
XaaSTMG just sees each one of those virtual NICs as a separate perimeter leg (DMZ) or internal leg...21:57
XaaSdepending on how we configure it21:57
XaaSCheck this out for on the Three Leg (Perimeter) Network (which is the configuration we use) - http://www.isaserver.org/tutorials/Deeper-Dive-TMG-Firewall-Network-Templates.html22:01
XaaSBut we have more than "3" legs22:01
nowenso when a customer is added, you create a vlan for them manually?22:03
nowenand then when they login, you route them to it?22:03
XaaSsometimes - depending on how many VMs they use22:04
XaaSwe typically can do something in VMware called PVLANs (Private VLANs) on an existing VLAN22:05
XaaShttp://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=101069122:05
XaaSWe can put the VM on a shared VLAN in Promiscuous, Isolated or Community mode and have it be logically isolated22:07
XaaSAll we need to do is put the routing information into the TMG22:07
XaaSas well as how the VPN clients attach to that PVLAN22:08
XaaSbased upon their credentials22:08
nowenso, the routing info is in the TMG and instructions on how to connect the vpn and it fulfills those orders based on their creds?22:12
nowenare the creds in the TMG? or AD?22:18
XaaSAD22:26
XaaSyes about the routing info22:26
nowenso, we're back to Forefront setting up the pvlan based on something - credentials, radius attributes, something22:37
nowenXaaS: I have to head out. can we resume tomorrow?22:46
*** XaaS has quit (Ping timeout: 258 seconds)22:49
*** nowen has quit (Quit: Leaving.)22:50

Generated by irclog2html.py 2.11.0 by Marius Gedminas - find it at mg.pov.lt!