IPSEC for Windows Packet Filtering



Similar documents
CREATING AN IKE IPSEC TUNNEL BETWEEN AN INTERNET SECURITY ROUTER AND A WINDOWS 2000/XP PC

Windows Firewall Configuration with Group Policy for SyAM System Client Installation

OvisLink 8000VPN VPN Guide WL/IP-8000VPN. Version 0.6

Setting Up Scan to SMB on TaskALFA series MFP s.

Install MS SQL Server 2012 Express Edition

Install and configure server

How To Set Up A Vpn Tunnel Between Winxp And Zwall On A Pc 2 And Winxp On A Windows Xp 2 On A Microsoft Gbk2 (Windows) On A Macbook 2 (Windows 2) On An Ip

How To Create An Easybelle History Database On A Microsoft Powerbook (Windows)

Step-by-Step Guide for Setting Up VPN-based Remote Access in a Test Lab

Configuring a Windows 2003 Server for IAS

Immotec Systems, Inc. SQL Server 2005 Installation Document

How To Industrial Networking

Step-by-Step Guide for Creating and Testing Connection Manager Profiles in a Test Lab

IBM TCP/IP Network Port Monitor

freesshd SFTP Server on Windows

Lab Configuring Access Policies and DMZ Settings

Configuring IPsec between a Microsoft Windows XP Professional (1 NIC) and the VPN router

a) Network connection problems (check these for existing installations)

Setting up Your Acusis Address. Microsoft Outlook

Hyper-V Replica Essentials

Basic Exchange Setup Guide

How to Program a Commander or Scout to Connect to Pilot Software

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Configuring Network Load Balancing with Cerberus FTP Server

Step-By-Step Guide to Deploying Lync Server 2010 Enterprise Edition

FTP Server Configuration

Download/Install IDENTD

Spam Marshall SpamWall Step-by-Step Installation Guide for Exchange 5.5

This document details the following four steps in setting up a Web Server (aka Internet Information Services -IIS) on Windows XP:

Using DC Agent for Transparent User Identification

HP Device Manager 4.6

Alpha High Level Description

Basic Exchange Setup Guide

AirStation VPN Setup Guide WZR-RS-G54

EventSentry Overview. Part I Introduction 1 Part II Setting up SQL 2008 R2 Express 2. Part III Setting up IIS 9. Part IV Installing EventSentry 11

Setup Guide for Exchange Server

Step-by-Step Setup Guide Wireless File Transmitter FTP Mode

enicq 5 System Administrator s Guide

How To Configure Windows Server 2008 as a RADIUS Server with MS-CHAP v2 Authentication

Setting Up and Configuring programs to Work with NetOp

Guide to Setting up Internet Connection Sharing for Windows

Configuration Guide for Exchange 2003, 2007 and 2010

Creating client-server setup with multiple clients

Installing Policy Patrol on a separate machine

Astaro Security Gateway V8. Remote Access via L2TP over IPSec Configuring ASG and Client

Cisco QuickVPN Installation Tips for Windows Operating Systems

Use this guide if you are no longer able to scan to Sharpdesk. Begin with section 1 (easiest) and complete all sections only if necessary.

Do not connect the printer to your computer s USB port until step #10

TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link:

SafeWord Domain Login Agent Step-by-Step Guide

DI-804HV with Windows 2000/XP IPsec VPN Client Configuration Guide

Securing Windows Remote Desktop with CopSSH

BioWin Network Installation

Step-by-Step Guide for Setting Up VPN-based Remote Access in a

Installation of MicroSoft Active Directory

Virtual Office Remote Installation Guide

Using Windows Task Scheduler instead of the Backup Express Scheduler

Windows Firewall with Advanced Security Step-by-Step Guide - Deploying Firewall Policies

Internet Guide. Prepared for 55 John Street

Installation and Connection Guide to the simulation environment GLOBAL VISION

Establishing a VPN tunnel to CNet CWR-854 VPN router using WinXP IPSec client

Recommended Network Setup

HELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE

intertrax Suite resource MGR Web

Using IPSec in Windows 2000 and XP, Part 2

Test Case 3 Active Directory Integration

How to configure MAC authentication on a ProCurve switch

JAVS Scheduled Publishing. Installation/Configuration... 4 Manual Operation... 6 Automating Scheduled Publishing... 7 Windows XP... 7 Windows 7...

Step-by-Step Guide for Setting Up Network Quarantine and Remote Access Certificate Provisioning in a Test Lab

VPN: Installing the IPSec client

Installing the VPN Client for Microsoft Windows OS

Configuring Windows 2000/XP IPsec for Site-to-Site VPN

Configuring the WT-4 for ftp (Ad-hoc Mode)

Deploying Windows Streaming Media Servers NLB Cluster and metasan

Laboratory Exercises V: IP Security Protocol (IPSec)

How to make a VPN connection to our servers from Windows 7

1. Set Daylight Savings Time Create Migrator Account Assign Migrator Account to Administrator group... 4

Scan to Quick Setup Guide

Microsoft SQL Server Installation Guide

Configuring Outlook for Windows to use your Exchange

DriveLock Quick Start Guide

How to set up popular firewalls to work with Web CEO

Installing Windows Rights Management Services with Service Pack 2 Step-by- Step Guide

WhatsUp Event Alarm v10.x Listener Console User Guide

1 PC to WX64 direction connection with crossover cable or hub/switch

Guideline for setting up a functional VPN

Acronis Backup & Recovery 11.5 Quick Start Guide

A browser must be open and connected through Jeffco s network How to set up network printing over WI-FI

Setting up Sharp MX-Color Imagers for Inbound Fax Routing to or Network Folder

Step-by-Step Configuration

ILTA HANDS ON Securing Windows 7

Tool Tip. SyAM Management Utilities and Non-Admin Domain Users

Internet Protocol Security (IPSec)

Installation Notes for Outpost Network Security (ONS) version 3.2

Step-by-Step Setup Guide Wireless File Transmitter FTP Mode

The Discovery Series

Installing Kaspersky Security Center 10.0 on Microsoft Windows Server 2012 Core Mode

Use 802.1x EAP-TLS or PEAP-MS-CHAP v2 with Microsoft Windows Server 2003 to Make a Secure Network

Step-by-step installation guide for monitoring untrusted servers using Operations Manager ( Part 3 of 3)

Transcription:

IPSEC for Windows Packet Filtering David Taylor SR Information Security Specialist University of Pennsylvania ltr@isc.upenn.edu 215-898-1236 (Revision Date: 14 October 2005) *NOTE* This document is going to be revised to remove the wizard function making it a little easier to read and implement. Also, REMOVE the mirror settings for the ports you block. I will fix this in the near future. *Use at your own risk*. This document is a guide to help you become familiar with IPSEC and how to setup basic filters to block traffic. You are responsible for proper testing of implementations in your own networks. Improper setup and lack of testing could cause disruptions in network communications. Overview IPSEC can be used to filter packets in a variety of scenarios. Successful implementation of IPSEC policies can significantly minimize the risk of unauthorized access to computers. The granularity of IPSEC filters makes it a desirable method of controlling access in lieu or in addition to built in firewalls. This would greatly enhance security of Windows 2000 machines that currently don t come with a built-in firewall. Using IPSEC should be considered as an added layer of security. This could buy valuable time in the event a serious 0-Day exploit/worm is released. It will also buy a lot of quality sleep time at night for LSPs who suddenly find out they have less to worry about. Logistics IPSEC can be implemented via Active Directory Group Policies, Local Security Policies as well as command line tools such as IPSECPOL.EXE (Windows 2000) and IPSECCMD.EXE (Windows XP). Here we will focus mainly on the GUI interface. Since I don t have direct access to a Domain Controller I will be using the Local Security Policy. This should look pretty much the same if you are using Group Policies from a Windows 2000+ Domain Controller. Local Security Policy Editor The editor can be started by going to the Control Panel and Opening the Administrative Tools folder and then clicking on Local Security Policy. Once you have your Policy Editor opened click on the IP Security Policies on Local Machine choice (will be different on a Domain Controller but will be obvious which choice to make). As you can be in Figure #1 below I have created an IPSEC policy

named affectionately Hacker Blaster. Before a policy will take affect it must be Assigned which can be done by right-clicking on the policy and choosing Assign. In this document we are going to setup IP and Port filters. There are going to be many wizards popping up asking you to set specific things. In this case we are only going to be filtering Inbound traffic to the computer. Figure #1 We are going to go ahead and create a new IPSEC Policy for this system. 1) Right Click on IP Security Policies and choose Create IP Security Policy 2) A wizard will appear Click Next 3) Give your policy a name My Test Policy 4) Click Next 5) Leave Activate the default response rule checked and hit next 6) Leave current settings for next string as is and click Next 7) Ignore this warning on non-domain systems and click the Yes button

8) Click Finish - Policy properties will appear 9) Click Add where yet another wizard will appear Click Next

10) This rule will not apply to a tunnel Hit Next 11) This will apply to All network connections click Next

12) We are once again greeted with the same method as previously seen Click Next 13) Once again click Yes

14) Finally we see something interesting. By default you will only see the first two entries. Ignore the other two for now. Here we are going to go ahead and create a new Filter for commonly attacked ports. Click the Add button now. 15) First we will create a Filter for the most attacked ports and call it Evil Ports. Next click the Add button 16) Great, another Wizard pops up. Hit Next

17) Set the IP Traffic Source to Any IP Address and click Next 18) Set the IP Traffic Destination to My IP Address and hit Next

19) Set the IP Protocol Type to TCP and hit Next

20) Leave the From port section blank and set the To this port to 445 and click Next then click Finish 21) Now we have a port filter for port TCP/445. You can then click the Add button and add more ports. Refer to the list at the bottom of this page for a list I use.

22) Make sure the radio button next to Evil Ports is selected and click Next 23) And of course we have another wizard popping up. Click Next and give your Filter Action a name. I chose Block Connections Click Next

24) Make sure the Block radio button is highlighted and click Next then click Finish

25) Make sure the radio button next to Block Connections is set and click Next - then click Finish then click OK At this point we have created a port filter which will drop all incoming connections to TCP 445. If other ports are added such as 139, 135 and 5000 this will remove most of the standard attack surface from the computer. Another huge benefit of this will be removing the ability for these systems on the network to attack each other in the even one does get infected by user intervention such as installing a pretty screen saver that has a backdoor installed. Now, there may be systems that you want to have access to these Evil Ports such as a Domain Administrator s workstation or an SMS server and the like. Here we will create a filter that allows these systems access. And yes, more wizards to click on. 26) Double click on the My Test Policy

27) Click Add then click Next and use the This rule does not specify a tunnel Click Next

28) Choose All network connections and click Next

29) Use the default authentication method and click Yes on the warning if it pops up. 30) We are now going to create a Trusted IP filter list. Click Add

30) Once again a wizard appears. Click Next

31) Here we have several choices. In this example we are going to use an IP address. DNS names may be the best way to go in a Domain, however. 32) Here we enter in a specific IP address and click Next

32) Choose My IP Address as the destination of the traffic and click Next 33) To allow all traffic from this trusted IP address leave protocol type to Any and click Next then click Finish then click OK

34) Make sure the radio button next to Trusted IP Addresses is set and click Next 35) Make sure the radio button next to Permit is set and click Next then click Finish

36) Now we have our trusted IP filter in place. Click Apply then OK 37) Make sure the policy is Assigned Using Active Directory Group Policies this is a pretty easy task to accomplish. You create your IPSEC policy and add it to a Group Policy and then apply to Organizational Units as appropriate. Using this method on stand-alone machines is somewhat tedious but much easier to do than having to rebuild the machines after a system compromise. Port Description 445 Netbios over TCP/IP 139 Netbios 135 Epmap 5000 Plug and Play

Some helpful links How to block specific network protocols and ports by using IPSec This is a great resource for using IPSECPOL.EXE and IPSECCMD.EXE http://support.microsoft.com/?id=813878 Step-by-Step Guide to Internet Protocol Security (IPSec) This shows how to use different authentication methods including certificates. There are also a lot of useful links on this page. http://www.microsoft.com/windows2000/techinfo/planning/security/ipsecsteps.asp IANA assigned ports for reference http://www.iana.org/assignments/port-numbers David Taylor SR Information Security Specialist University of Pennsylvania ltr@isc.upenn.edu 215-898-1236