Enabling Secure Internet Access with TMG

Slides:



Advertisements
Similar presentations
Enabling Secure Internet Access with ISA Server
Advertisements

1 Configuring Internet- related services (April 22, 2015) © Abdou Illia, Spring 2015.
Module 5: Configuring Access to Internal Resources.
PKI 2: Protezione del traffico Web tramite SSL Fabrizio Grossi.
1 Configuring Web services (Week 15, Monday 4/17/2006) © Abdou Illia, Spring 2006.
Securing the Perimeter – Exchange and VPN Access with ISA Server 2004 Jamie Sharp CISSP Security Advisor Amit Pawar National Technology Specialist Microsoft.
Implementing ISA Server Caching. Caching Overview ISA Server supports caching as a way to improve the speed of retrieving information from the Internet.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Installing and Maintaining ISA Server. Planning an ISA Server Deployment Understand the current network infrastructure Review company security policies.
1 Enabling Secure Internet Access with ISA Server.
Ing. Ondřej Ševeček | GOPAS a.s. | MCM: Directory Services | MVP: Enterprise Security | | |
1 Advanced Application and Web Filtering. 2 Common security attacks Finding a way into the network Exploiting software bugs, buffer overflows Denial of.
Chapter 6 Configuring, Monitoring & Troubleshooting IPsec
Managing Client Access
Module 4 Managing Client Access. Module Overview Configuring the Client Access Server Role Configuring Client Access Services for Outlook Clients Configuring.
1 ISA Server 2004 Installation & Configuration Overview By Nicholas Quinn.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Configuring a Web Server. Overview Overview of IIS Preparing for an IIS Installation Installing IIS Configuring a Web Site Administering IIS Troubleshooting.
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
Hands-On Microsoft Windows Server Security Enhancements in Windows Server 2008 Windows Server 2008 was created to emphasize security –Reduced attack.
Chapter 13 – Network Security
1 Chapter 6: Proxy Server in Internet and Intranet Designs Designs That Include Proxy Server Essential Proxy Server Design Concepts Data Protection in.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
Module 9: Configuring IPsec. Module Overview Overview of IPsec Configuring Connection Security Rules Configuring IPsec NAP Enforcement.
Module 4: Configuring ISA Server as a Firewall. Overview Using ISA Server as a Firewall Examining Perimeter Networks and Templates Configuring System.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Module 11: Remote Access Fundamentals
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Securing Internet Access Designing an Internet Acceptable Use Policy Securing Access to the Internet by Private Network Users Restricting Access to Content.
Module 8: Planning and Troubleshooting IPSec. Overview Understanding Default Policy Rules Planning an IPSec Deployment Troubleshooting IPSec Communications.
Designing Secure SharePoint External Access Ondrej Sevecek | MCM: Directory | MVP: Security |
Module 6: Integrating ISA Server 2004 and Microsoft Exchange Server.
Module 9: Implementing Caching. Overview Caching Overview Configuring General Cache Properties Configuring Cache Rules Configuring Content Download Jobs.
Module 6: Managing Client Access. Overview Implementing Client Access Servers Implementing Client Access Features Implementing Outlook Web Access Introduction.
Module 2: Overview of IIS 7.0 Application Server.
1 Installing and Maintaining ISA Server Planning an ISA Server Deployment Understand the current network infrastructure. Review company security.
Module 7: Advanced Application and Web Filtering.
Implementing ISA Server Caching
1 Week #5 Routing and NAT Network Overview Configuring Routing Configuring Network Address Translation Troubleshooting Routing and Remote Access.
Microsoft ISA Server 2000 Presented by Ricardo Diaz Ryan Fansa.
Security fundamentals Topic 10 Securing the network perimeter.
Module 7: Implementing Security Using Group Policy.
1 Chapter Overview Creating Web Sites and FTP Sites Creating Virtual Directories Managing Site Security Troubleshooting IIS.
Module 10: Windows Firewall and Caching Fundamentals.
Securing the Network Perimeter with ISA Server 2004 Ravi Sankar IT Professional Evangelist Microsoft.
3/5/2016Faculty : Trần Thị Ngọc Hoa1 From Proxy Server To ISA 2006  Overview  History  Functions  Caching Process  Caching Types  How does it work.
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
IS 4506 Windows NTFS and IIS Security Features.  Overview Windows NTFS Server security Internet Information Server security features Securing communication.
Regan Little. Definition Methods of Screening Types of Firewall Network-Level Firewalls Circuit-Level Firewalls Application-Level Firewalls Stateful Multi-Level.
Labs. Session 1 Lab: Installing and Configuring Windows 7 Exercise 1: Migrating Settings by Using Windows Easy Transfer Exercise 2: Configuring a Reference.
Security fundamentals
Virtual Private Network Access for Remote Networks
Web and Proxy Server.
TMG Client Protection 6NPS – Session 7.
Installing TMG & Choosing a Client Type
Module 3: Enabling Access to Internet Resources
CONNECTING TO THE INTERNET
Configuring Windows Firewall with Advanced Security
Securing the Network Perimeter with ISA 2004
Configuring and Troubleshooting Routing and Remote Access
Implementing TMG Server Publishing
Configuring TMG as a Firewall
Lesson #10 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 10 Configuring Network and Firewall Settings.
IIS.
Server-to-Client Remote Access and DirectAccess
Message Digest Cryptographic checksum One-way function Relevance
Configuring Internet-related services
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

Enabling Secure Internet Access with TMG 6NPS – Session 3

Objectives Create policy elements, access rules, and connection limits. Policy elements include schedule, protocols, user groups, and network objects

What is Secure Access to Internet Resources? Every organization defines secure access slightly different A Internet usage policy needs to be developed, defining how users can use the Internet What is secure access to the Internet? Users can access the resources that they need, web, email Secure Internet connection, not revealing any information about the internal system Secure data transfers, credit card information, client data Block downloading of malicious programs

Guidelines for Designing an Internet Usage Policy Internet usage policy defines what actions users are allowed to perform while connected to the Internet This is the basis for configuring the TMG settings Internet usage policies should do the following; Describe the need for an Internet usage policy. Why is it being created, legal reasons, confidential client information Describe what the policy covers. Details description of what is acceptable and unacceptable Identify the people within the organization who are responsible for creating and enforcing the policy Define how violations are handled. Disciplinary actions

How TMG Enables Secure Access to Internet Resources TMG provides the following functionality to enable secure access: Implementing TMG as a multilayer firewall Implementing TMG as a proxy server Using TMG to implement the organization's Internet usage policy Restrictions based on users and groups Restrictions based on computers Restrictions based on protocols Restrictions based on Internet destinations Restrictions based on content being downloaded from the Internet

How TMG Enables Secure Access to Internet Resources Is the … User allowed access? Computer allowed access? Protocol allowed? Destination allowed? Content allowed? TMG Web Server Proxy Server

What is a Proxy Server? A proxy server is a server that is situated between a client application and a server to which the client connects A proxy server can provide enhanced security and performance Proxy servers make the Internet connection more secure in the following ways: User Authentication Filtering client requests Content inspection Logging user access Hiding the internal network details Improve Internet access performance

Why Use a Proxy Server? Improved Internet access security: TMG Web Server Improved Internet access security: User authentication Filtering client requests Content inspection Logging user access Hiding the internal network details Improved Internet access performance

How Does a Forward Web Proxy Server Work? Proxy servers can be used to secure both inbound and outbound Internet access When used to secure outbound Internet access, it is configured as a forwarding proxy server

How Does a Forward Web Proxy Server Work? Is the … User allowed access? Protocol allowed? Destination allowed? 3 6 1 5 2 4 Web Server TMG

How Does a Reverse Web Proxy Server Work? Operates in much the same way as a forward Web proxy server Reverse proxy makes internal resources accessible to external clients

What Is a Reverse Web Proxy Server? Is the … Request allowed? Protocol allowed? Destination allowed? Web Server 3 DNS Server 4 5 2 1 6 TMG

How to Configure TMG as a Proxy Server

DNS Configuration for Internet Access If no internal DNS server is available to resolve Internet addresses, configure the TMG clients to use an Internet DNS server Configure TMG clients to use an internal DNS server if the DNS server can resolve Internet addresses TMG can proxy DNS requests for Web proxy and Forefront TMG clients but not for SecureNET clients TMG includes a DNS cache that caches the results of all DNS lookups performed through TMG

How to Configure Web Chaining Internet Branch Office Branch Office Head Office

How to Configure Dial-Up Connections Enable dial-up for connections to this network Logon using this account Use this dial-up connection

Practice: Configure TMG as a Proxy Server Configuring the proxy server settings on TMG TMG Internet DC

What Are Access Rule Elements? Used to Configure Protocols The protocols that will be allowed or denied by an access rule Users The users that will be allowed or denied by an access rule Content Types The content type that will be allowed or denied by an access rule Schedules The time of day when Internet access will be allowed or denied by an access rule Network Objects The computers or destinations that will be allowed or denied by an access rule

How to Configure Protocol Elements

How to Configure User Elements

How to Configure Content Type Elements Define the MIME types and file extensions to include

How to Configure Schedule Elements Define the times when this schedule is active or inactive

How to Configure Domain Name Sets and URL Sets Use this to configure access to an entire domain Use this to configure access to a URL

Practice: Configuring Firewall Rule Elements Configuring a new user set Configuring a new content type element Configuring a new schedule element Configuring a new URL set TMG Internet DC

Configuring TMG Authentication Authentication and TMG Clients Authentication Methods Basic authentication – plaintext, least secure Digest authentication – hashing, must use Active Directory with reversible encryption, less secure than AD default Integrated Windows authentication – Kerberos v5 or NTLM protocol, default authentication method for windows Digital certificates authentication RADIUS authentication RSA SecureID authentication

Practice: Configuring TMG Server Authentication Enabling Authentication TMG Internet Client1 DC

What Are Access Rules? Access rules always define: Destination Network Destination IP Destination Site Allow Deny User Protocol IP Port/Type Source network Source IP Schedule Content Type

How Network Rules and Access Rules Are Applied 3 4 5 1 2 6 Web Server TMG Domain Controller

How to Configure Access Rules

How to Configure HTTP Policy Configure additional filtering options Configure maximum header length Configure maximum payload length Configure maximum URL and query length

Practice: Managing Access Rules Creating a DNS Lookup Rule Creating a Managers Access Rule Testing Internet Access TMG Internet Client1 DC

How to Troubleshoot Access to Internet Resources To troubleshoot Internet access issues: Check for DNS name resolution Determine the extent of the problem Review access rule objects and access rule configuration Review access rule order Check access rule authentication Use TMG logging to determine which access rule is granting or denying access

Lab: Enabling Access to Internet Resources Exercise 1: Configuring TMG Access Rule Elements Exercise 2: Configuring TMG Access Rules Exercise 3: Testing TMG Access Rules