Windows IP Security Filters October 23, 2002 Joe Klemencic Fermilab Business Services.

Slides:



Advertisements
Similar presentations
Chapter 10 Securing Windows Server 2008 MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration.
Advertisements

Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
Module 5: Configuring Access to Internal Resources.
Network Security. Reasons to attack Steal information Modify information Deny service (DoS)
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 13: Planning Server and Network Security.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Access Control for Networks Problems: –Enforce an access control policy Allow trust relationships among machines –Protect local internet from outsiders.
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
Chapter 7 HARDENING SERVERS.
Chapter 8 Administering TCP/IP.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Lesson 19: Configuring Windows Firewall
1 Enabling Secure Internet Access with ISA Server.
1 Advanced Application and Web Filtering. 2 Common security attacks Finding a way into the network Exploiting software bugs, buffer overflows Denial of.
Security Data Transmission and Authentication
Chapter 6 Configuring, Monitoring & Troubleshooting IPsec
Module 7: Configuring TCP/IP Addressing and Name Resolution.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Configuring Routing and Remote Access(RRAS) and Wireless Networking
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 9: Securing Network Traffic Using IPSec.
Module 8: Configuring Virtual Private Network Access for Remote Clients and Networks.
Chapter 6: Packet Filtering
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 12: Routing.
Intrusion Prevention System. Module Objectives By the end of this module, participants will be able to: Use the FortiGate Intrusion Prevention System.
Chapter 13 – Network Security
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Module 14: Configuring Server Security Compliance
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Windows 7 Firewall.
Module 9: Configuring IPsec. Module Overview Overview of IPsec Configuring Connection Security Rules Configuring IPsec NAP Enforcement.
Module 4: Configuring ISA Server as a Firewall. Overview Using ISA Server as a Firewall Examining Perimeter Networks and Templates Configuring System.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
8.1 © 2004 Pearson Education, Inc. Exam Designing a Microsoft ® Windows ® Server 2003 Active Directory and Network Infrastructure Lesson 8: Planning.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
IT:Network:Apps.  RRAS does nice job of routing ◦ NAT is nice ◦ BASIC firewall ok but somewhat weak  Communication on network (WS to SRV) is in clear.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Module 8: Planning and Troubleshooting IPSec. Overview Understanding Default Policy Rules Planning an IPSec Deployment Troubleshooting IPSec Communications.
Securing Data with Internet Protocol Security (IPSec) Designing IPSec Policies Planning IPSec Deployment.
Module 5: Designing Security for Internal Networks.
Hands-On Microsoft Windows Server 2003 Networking Chapter 9 IP Security.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 14: Windows Server 2003 Security Features.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 10: Planning and Managing IP Security.
Module 7: Implementing Security Using Group Policy.
Securing Data Transmission and Authentication. Securing Traffic with IPSec IPSec allows us to protect our network from within IPSec secures the IP protocol.
Module 10: Windows Firewall and Caching Fundamentals.
Configuring Network Connectivity Lesson 7. Skills Matrix Technology SkillObjective DomainObjective # Using the Network and Sharing Center Use the Network.
Client Access – Published applications Control through TEMPLATE.ICA Use SSL Authentication level –Remove: EncRc5-0 EncRc5-40 EncRc5-56.
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
Data Security in Local Network Using Distributed Firewall Presented By- Rahul N.Bais Guide Prof. Vinod Nayyar H.O.D Prof.Anup Gade.
Module 8 Implementing Security Using Group Policy.
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
IPSec The Wonder Protocol Anurag Vij Microsoft IT.
By Daniel Grim. What Is Windows NT? IPSEC/Windows Firewall NTFS File System Registry Permissions Managing User Accounts Conclusion Outline.
Securing Access to Data Using IPsec Josh Jones Cosc352.
Security Data Transmission and Authentication Lesson 9.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Virtual Private Network Access for Remote Networks
Enabling Secure Internet Access with TMG
Firewalls.
SECURING NETWORK TRAFFIC WITH IPSEC
Securing the Network Perimeter with ISA 2004
Module 8: Securing Network Traffic by Using IPSec and Certificates
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Implementing TMG Server Publishing
* Essential Network Security Book Slides.
Firewalls Purpose of a Firewall Characteristic of a firewall
Module 8: Securing Network Traffic by Using IPSec and Certificates
Presentation transcript:

Windows IP Security Filters October 23, 2002 Joe Klemencic Fermilab Business Services

What are IP Security Filters?  New feature in Windows 2000, XP &.NET  Initially created to authenticate and encrypt communications  Packet Filtering method adopted by Microsoft during Windows 2000 beta testing

Intended Usage  Authenticate host connections  Negotiate encryption schemes  Filter access to services by host/subnet It is important to note that the Authentication schemes are not User based authentication, but Machine based authentication.

Default Defined Policies  Client (Respond Only)  Request Security (Server)  Require Security (Server) Clients attempting to connect to resources that require Authentication and/or Encryption must have an appropriately configured response policy.

IP Security Policy Creation  Group Policy Editor (gpedit.msc) MMC Snap-In GUI manager  Group Policy Editor within an Active Directory OU Properties  IPSECPOL.EXE command line utility from the W2K Resource Kit (Windows 2000)  IPSECCMD.EXE command line utility from the Support Tools on the media CD (XP &.NET) Proper planning and testing is the key to a successful policy creation and implementation

Anatomy of an IP Security Policy  An IP Security Policy consists of: –IP Filters Define who, what, where –Source IP/Network Address –Destination IP/Network Address –Protocol/Port/Service –IP Filter Actions Define how –Permit –Block –Negotiate Security (Authenticate/Encrypt) Kerberos (Requires W2K Domain) PKI Shared Key

IP Security Filter Modes  Dynamic Mode –Adds anonymous rules to the policy agent –Can co-exist with a DS based policy  Static Mode –Creates or modifies the stored policy –Overwrites current named policy or activates new named policy

IP Filter Evaluation Order Rule Evaluation is from Most Granular to Least Specific 1. My IP Address 2. Specific IP Address Defined 3. Specific IP Subnet 4. Any IP Address A. Specific Protocol/Port combination B. Specific Protocol/Any Port C. Any Protocol

IP Filter Evaluation Order (cont) Visualize filter rule processing by applying weights Source/Destination Addresses: My IP Address: 3 Specific IP Address: 2 Specific Network: 1 Any Address: 0 Protocol Used: Specified (TCP/UDP/ICMP/RAW/…): 1 Any Protocol: 0 Source/Destination Service Ports: Specified (23/80/135/137/139/443/445…): 1 Any Port: 0

IP Filter Evaluation Order (cont) SourceSrc PortDestDest PortProtocolAction AnyAnyMyIPAnyAnyBlock 00300=300300=3 AnyAnyMyIP80TCPPermit 00311=500311= AnyMyIPAnyAnyPermit 10300=410300= AnyMyIP139TCPBlock 10311=610311=6 In this example, all traffic from the network, except TCP/139 would be allowed. Also allow TCP/80 traffic from anywhere would be allowed. All other traffic will be blocked.

Mirroring vs. Reverse Rules  The Mirror Rule option is only activated when defining Authentication or Encryption Filter Actions  When creating simple Permit/Block Packet Filters, always create the reverse rule at the same time to prevent inadvertent denial of legitimate traffic  BUT…. The reverse rule may inadvertently allow unsolicited connectivity

Reverse Rule  Consider the following: Src Src-Port Dst Dst-Port Prot Action MyIP Any Any 80 TCP Permit Any 80 MyIP Any TCP Permit Any Any MyIP Any Any Block In this ruleset, we are allowing the local machine to surf the Internet while prohibiting all other communication. An attacker could use a port-redirector and still connect to the local machine’s NetBios service as long as they source their connection from TCP/80.

Sample Implementation Scenarios Allow Web services from everywhere, but restrict FTP from only certain hosts Simple Packet Filtering Src Src-Port Dst Dst-Port Prot Action Any Any MyIP 80 TCP Permit MyIP 80 Any Any TCP Permit MyNet Any MyIP 21 TCP Permit MyNet Any MyIP 20 TCP Permit MyIP 21 MyNet Any TCP Permit MyIP 20 MyNet Any TCP Permit Any Any MyIP 21 TCP Block Any Any MyIP 20 TCP Block

Sample Implementation Scenarios Service Authentication Allow normal traffic from network, but request a Host to Kerberos authenticate from Wireless network This authentication is separate from the Application Authentication Mechanism Src Src-Port Dst Dst-Port Prot Action WLAN Any MyIP Any Any Kerberos Auth (auto-mirror)

Sample Implementation Scenarios Service Encryption Encrypt communications between servers while allowing for unencrypted traffic from workstations. Also, block communications from non-local workstations Src Src-Port Dst Dst-Port Prot Action DC1 Any MyIP Any Any Kerberos Auth & Encrypt (auto-mirror) MyIP Any DC1 Any Any Kerberos Auth & Encrypt (auto-mirror) MyNet Any MyIP Any Any Permit MyIP Any MyNet Any Any Permit Any Any MyIP Any Any Block

Usage Caveats Certain traffic is not inspected by an IP Policy - Anything with a source port of 88 (Kerberos)* - IKE - Multicast Traffic - Broadcast Traffic - RSVP/Quality of Service *This behavior may be changed by setting the following value in the Registry: HKLM\SYSTEM\CurrentControlSet\Services\IPSEC\NoDefaultExempt DWORD=1 See Microsoft Q article for more information

Usage Caveats (cont)  No logging available when using as a Packet Filter  Because of Rule Evaluation Order, an ill- defined rule may allow traffic intended to be blocked  Difficult to implement Packet Filtering on General Use Workstations, but optimal for Kiosks and Servers

Further Reading Securing W2K with IP Filters: Part 1 (Step-by-Step How-To Guide) Securing W2K with IP Filters: Part 2 (Implementing Encryption) Using IPSEC to Lock Down a Server Active Directory Replication Over Firewalls Microsoft Q Article: Domain Controller IPSEC Support How to Enable IPSEC Through a Firewall