over route network relation over NAT network relation from private to public side



Similar documents
A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

About Firewall Protection

HP ProLiant DL320 Firewall/VPN/Cache Server User Guide

Chapter 12 Supporting Network Address Translation (NAT)

Deploying F5 to Replace Microsoft TMG or ISA Server

Architecture and Data Flow Overview. BlackBerry Enterprise Service Version: Quick Reference

NetSpective Global Proxy Configuration Guide

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Security Technology: Firewalls and VPNs

Chapter 4 Firewall Protection and Content Filtering

Barracuda Link Balancer Administrator s Guide

Monitoring Forefront TMG

Step By Step Guide: Demonstrate DirectAccess in a Test Lab

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

The Bomgar Appliance in the Network

Introduction to the EIS Guide

Network Configuration Settings

Step-by-Step Configuration

NETASQ MIGRATING FROM V8 TO V9

Guideline for setting up a functional VPN

nappliance misa Server 2006 Standard Edition Users Guide For use with misa Appliances 2006 nappliance Networks, Inc.

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

PRODUCT VERSION: LYNC SERVER 2010, LYNC SERVER 2013, WINDOWS SERVER 2008

Basic Network Configuration

Windows Server 2003 default services

Introduction to Computer Security Benoit Donnet Academic Year

How to use mobilecho with Microsoft Forefront Threat Management Gateway (TMG)

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Chapter 4 Firewall Protection and Content Filtering

Proxies. Chapter 4. Network & Security Gildas Avoine

F-Secure Internet Gatekeeper

Chapter 6 Virtual Private Networking Using SSL Connections

Configuration Guide BES12. Version 12.2

Funkwerk UTM Release Notes (english)

Introduction to Mobile Access Gateway Installation

HTTP. Internet Engineering. Fall Bahador Bakhshi CE & IT Department, Amirkabir University of Technology

Configuration Guide. BES12 Cloud

Firewall Firewall August, 2003

F-Secure Messaging Security Gateway. Deployment Guide

A Guide to New Features in Propalms OneGate 4.0

Owner of the content within this article is Written by Marc Grote

OVERVIEW OF TYPICAL WINDOWS SERVER ROLES

WHITE PAPER Citrix Secure Gateway Startup Guide

NEFSIS DEDICATED SERVER

Chapter 4 Security and Firewall Protection

Installation and configuration guide

Web Application Proxy

N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work

Securing Networks with PIX and ASA

Firewall Defaults, Public Server Rule, and Secondary WAN IP Address

Installation and configuration guide

Configuration Guide BES12. Version 12.1

Third Party Integration

SSL VPN Technology White Paper

Citrix Access on SonicWALL SSL VPN

Lesson Plans Managing a Windows 2003 Network Infrastructure

WatchGuard SSL v3.2 Update 1 Release Notes. Introduction. Windows 8 and 64-bit Internet Explorer Support. Supported Devices SSL 100 and 560

6421B: How to Install and Configure DirectAccess

Configuring PA Firewalls for a Layer 3 Deployment

Table of Contents. Configuring IP Access Lists

Product Manual. Administration and Configuration Manual

Stateful Inspection Technology

Networking for Caribbean Development

Implementing and Managing Security for Network Communications

How To Configure A Kiwi Ip Address On A Gbk (Networking) To Be A Static Ip Address (Network) On A Ip Address From A Ipad (Netware) On An Ipad Or Ipad 2 (

UserGate Proxy & Firewall v.6 User guide

Configuration Guide BES12. Version 12.3

Kaseya Server Instal ation User Guide June 6, 2008

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0

CSE331: Introduction to Networks and Security. Lecture 12 Fall 2006

SonicOS 5.9 One Touch Configuration Guide

Description of Microsoft Internet Information Services (IIS) 5.0 and

INTRODUCTION TO FIREWALL SECURITY

Chapter 8 Router and Network Management

Firewall Defaults and Some Basic Rules

SonicOS 5.9 / / 6.2 Log Events Reference Guide with Enhanced Logging

vcloud Director User's Guide

Firewalls. Chapter 3

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

Dell SonicWALL SRA 7.5 Citrix Access

Quickstart guide to Configuring WebTitan

Migrating from Microsoft ISA Server 2004/2006 to Forefront Threat Management Gateway (TMG) 2010

Active Directory Group Policy. Administrator Reference

Configuring Windows Server 2008 Network Infrastructure

McAfee Web Gateway 7.4.1

Move over, TMG! Replacing TMG with Sophos UTM

Fireware Essentials Exam Study Guide

VMware vcloud Air Networking Guide

REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER

Deploying the Barracuda Load Balancer with Office Communications Server 2007 R2. Office Communications Server Overview.

Citrix Receiver for Mobile Devices Troubleshooting Guide

FortiOS Handbook - Load Balancing VERSION 5.2.2

Source-Connect Network Configuration Last updated May 2009

Configuring SSL VPN on the Cisco ISA500 Security Appliance

Filtering remote users with Websense remote filtering software v7.6

Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.

Symantec Endpoint Protection 11.0 Network Threat Protection (Firewall) Overview and Best Practices White Paper

Appendix D: Configuring Firewalls and Network Address Translation

Innominate mguard Version 6

Chapter 8 Security Pt 2

Transcription:

Threat Management Gateway 2010 FIREWALL RULES Firewall Rules Access Rules over route network relation over NAT network relation from private to public side Server Publishing Rules over NAT network relation from public to private side also called Port Forwarding or Port Address Translation

NAT Firewall Rules Web Server Publishing Rules reverse proxy connections over NAT network relation from public to private side proxy (Web Listener) listening on port 80/443 on the public side Web Farm Publishing Rule can load-balance several web servers Access Rules (Routing/NAT) LAN TMG Internet DMZ

NAT Publishing (Port Forwarding) LAN TMG Internet DMZ Rules Ordered list starts at the top if the conditions are not met, proceeding with the next rule last rule Denies the rest Allow/Deny the traffic redirect/notify only for HTTP/S traffic

Default Rule Rules Example

Threat Management Gateway 2010 BASIC ACCESS RULES Access Rules Used only over Route relationship NAT relationship from private to external Stateful inspection firewall TCP, UDP, ICMP,... after the first packet enables replies in opposite direction for some time

Stateful inspection TCP first SYN Initiated connection after SYN/SYN-ACK/ACK Estabilished connection after RST/FIN Closed connection 1440 minutes timeout UDP/ICMP first UDP packet Initiated connection 1 minute timeout Stateful inspection Application filters DNS, ICMP,... understands protocol internals do not enable more replies if not expected HTTP/S although TCP based URL/extensions/content-type filtering can happen even later (GET, HTTP 200 OK) Allowed/Denied connection

Conditions Source/Destination IP addresses Protocol must use Outbound protocol definition Inbound protocols are for publishing rules only (mutually exclusive) Custom Protocols

Lab Create the following access rules Ping everywhere DNS, HTTP, HTTPS from DC1 to External do it with three separate rules Telnet from Internal to External RDP from All protected networks to External FTP from Internal to External and DMZ Start logging Try Ping from DC1 to www.expensive-pc.com and monitor the traffic by using the Logs console Lab On DC1 attach!tools.iso and open CMD Try the following from command prompt d:\portqry -n www.expensive-pc.com -e 3389 d:\portqry -n www.expensive-pc.com -e 23 d:\portqry -n www.expensive-pc.com -e 53 -p UDP Try monitoring the traffic with TMG Logging and Network Monitor Network Monitor is installed on DC1

Domain/URL sets Domain name sets evaluated by using reverse DNS queries URL sets can be evaluated only on HTTP/S traffic if used with other protocols, the condition just does not apply and the rule does not trigger Some examples

TMG DNS Client Cache TMG does not use the DNS Client service Maintains its own DNS resolver cache Can be managed and listed by DNSCACHE tool Lab Create the following access rules NTP from Internal to tik.cesnet.cz and tak.cesnet.cz HTTP to *.book-vendors.com, *.expensive-pc.com, *.public-secure-ca.com HTTP to *.microsoft.com try it, this may not work HTTP to *.servis24.cz try it, this will not work

URL Categories Microsoft Reputation Service checked online at http://www.microsoft.com/security/portal/mrs/ Every URL can be categorized to several categories finance.yahoo.com seznam.cz RTM/SP1 applies only the primary category starting with Software Update 1 for SP1 the firewall checks also the non-primary categories of a site URL Categories

URL Categories Lab: Optional Create Deny access rule from Internal to Veapons URL Category Set Try accessing http://www.heckler-koch.de Try other web sites with the online checker http://www.anonymizer.in/anonymizer etc.

Extensions/content-types Can be evaluated only on HTTP/S traffic if used with other protocols, the condition just does not apply and the rule does not trigger Extensions checked on GET/POST command only the fourth packet passing Extensions and content-types checked on 200 OK reply HTTP GET

HTTP GET Response HTTP GET for JPG

HTTP Response with JPG Lab Prevent users from downloading.jpg files from www.book-vendors.com there is no default document you need to test http://www.bookvendors.com/books.htm Prevent users from downloading application/pdf from anywhere from the internet

Lab From DC1 try accessing https://www.paypal.com Monitor the traffic with Network Monitor Look at the encrypted packets the HTTP headers should not be visible Allow rules can deny! Application filters although the rule is Allow, the application filter can sometimes deny the traffic anyway HTTP, FTP, RPC Authenticated rules

HTTP Filter Defaults FTP Filter Defaults

FTP Filter Defaults RPC Filter Defaults

All outbound traffic Allows only defined protocols not actually any! Applies default application filters can be modified All outbound traffic

HTTPS over Proxy Proxy allows only ports 443 and 563 to CONNECT over SSL KB 283284 Other ports need to be defined create.vbs script SSL over Proxy Scripts Enumerate enabled ports set isa=createobject("fpc.root") set rngs=isa.getcontainingarray.arraypolicy.webproxy.tunnelportranges for each rng in rngs WSCript.Echo rng.name &, & rng.tunnelhighport &, & rng.tunnellowport next Add an enabled port set isa=createobject("fpc.root") set rngs=isa.getcontainingarray.arraypolicy.webproxy.tunnelportranges rngs.addrange("ssl 9443", 9443, 9443) rngs.save

Threat Management Gateway 2010 AUTHENTICATED TRAFFIC Authenticated traffic Client Protocols Pros Cons VPN all traffic all traffic must be dialed manually Web Proxy Firewall Client HTTP HTTPS FTP over Proxy TCP UDP no installation on clients seamless, permanent must be configured on clients problems with WINHTTP, Java,.NET clients must be installed on clients compatibility and troubleshooting problems only for domain users on domain member computers Socks Proxy TCP UDP must be supported by client applications usually some portable tools for Linux etc. Basic authentication only

Authenticated traffic HTTP Authentication Methods Basic (RADIUS/LDAP) very standard clear-test (Base-64 encoded) always pops-up user Windows Authentication open standard, about 2003 encrypted hashed (NTLM/Kerberos) SSO possible Digest standard, RFC from 1997 always pops-up user

Authentication Selection Non-Windows browsers Basic + SSL Windows browsers Windows authentication + SSL Incorrect Order of Rules

Correct Order of Rules Threat Management Gateway 2010 WEB PROXY

Proxy Server HTTP 1.1 Proxy Authentication Windows Integrated (vs. Active Directory only) cannot be forwarded to the server Kerberos supported by IE 7.0+ Basic (vs. Active Directory, RADIUS) no LDAP authentication support Defaults to TCP 8080 Autoconfiguration for clients Web Proxy

Web Proxy Client (per user) Web Proxy Client (WinHTTP) PROXYCFG NETSH WINHTTP SET PROXY

Web Proxy Client (WinHTTP) Services/applications use WinHTTP API to access web services WSUS, BITS, scripts, Symantec,... Proxy settings always per-computer as against those of IE which are per-user If not configured, use WPAD Can be configured by ProxyCfg statically HKLM\Software\Microsoft\Windows\CurrentVersion\In ternet Settings\Connections\WinHTTPSettings Bypass local addresses Web Proxy allows routeback on internal interfaces no authentication required unless Require all users to authenticate configured Just wise to not overload proxy by such a traffic

Proxy Autoconfiguration Script URL/IP exemptions Multiple TMG array members CARP load balancing Lab On Seven1 manually configure IE client to use web proxy Modify the access rules so that All Users can access HTTP on the internet except for the *.book-vendors.com Enable Sales user group members to access *.book-vendors.com

Proxy Autoconfiguration Proxy Autoconfiguration Can be published on TMG on port TCP 80 http://tmg/wpad.dat

Autoconfiguration script Cached by clients for 50 min. To disable caching see KB271361 Consider bypassing local IPs and domains (not by default) Bypassing IPs requires DNS resolution Proxy Autoconfiguration Web Server DNS DHCP WPAD.DAT 1 2 Client 3 Proxy Proxy

Proxy Autoconfiguration DHCP primary means client NIC must have DHCP turned on DHCP Option 252 http://tmg.gopas.virtual/wpad.dat DNS secondary if DHCP method not available DNS query for WPAD.[connection-specific-suffix] Troubleshooting Autoproxy Windows 2008 DNS blocks some queries by default WPAD ISATAP dnscmd /config /globalqueryblocklist isatap Clients cache the WPAD file %userprofile%\appdata\local\microsoft\windows\te mporary Internet Files Deleting cache from IE GUI is not sufficient!

Troubleshooting Autoproxy Lab Enable Web Proxy Autodiscovery in TMG Configure either method DHCP/DNS for autoconfiguration Configure Seven1 client to use the autodisovery in IE and test the connection to the http://www.bookvendors/books.htm under Leo user he is member of the Sales group On DC1 disable autodiscovery and disable proxy use at all just to have an environment with and without proxy for testing from Seven1 and DC1

Kerberos with Proxy Kerberos most secure IE7+ can use Kerberos for proxy authentication Don t use IP addresses for client configuration Use real computer domain names instead Or create CNAME aliases never use A records Kerberos for Proxy

Kerberos for WPAD WPAD.DAT and Array.Dll are returning IP addresses by default Start the following VBS script on TMG to switch to names Set oisa = CreateObject("FPC.Root") Set oarray = oisa.getcontainingarray Set owebproxy = oarray.arraypolicy.webproxy If owebproxy.carpnamesystem = 0 Then WScript.Quit owebproxy.carpnamesystem = 0 owebproxy.save true Threat Management Gateway 2010 ADVANCED ACCESS RULES

FTP Uses FTP application filter enables outbound passive FTP enables inbound active FTP Troubleshooting Windows 2008+ Server Windows Firewall must be configured to enable active FTP client netsh advfirewall show global netsh advfirewall set global statefulftp enable Passive FTP Client TCP 21 FTP Server TMG TCP???

Active FTP Client TCP??? TCP 21 FTP Server TMG IE Using Passive FTP

FTP Access Rules FTP protocol TCP 21 for Secure NAT clients can be authenticated only by VPN or Firewall Clients FTP over HTTP protocol TCP 8080 from client to proxy normal HTTP proxy authentication if you need authenticated access to the remote server from IE, you must use ftp://login:password@ftp.domain.com Lab Create access rule for FTP and FTP over HTTP from Internal to External Enable FTP upload on the rule Enable active FTP in the global application filter configuration Open Windows Explorer window and navigate to ftp://ftp-user:pa$$w0rd@ftp.book-vendors.com Upload some file into the FTP server

Enable domain membership Ping (Windows 2003 and older clients) DNS (UDP 53) Kerberos (UDP/TCP 88) NTP (UDP 123) SMB/CIFS (TCP 445) LDAP (UDP/TCP 389) LDAPS (TCP 636) LDAP GC (UDP/TCP 3268) LDAPS GC (TCP 3269) RPC (TCP random Windows Vista and newer NETLOGON clients) AD CS static port + enable DCOM Domain Membership Rules

RPC/DCOM for Domain Members Lab Enable DMZ computers to access domain controllers in the Internal network Connect WEB-DMZ to the gopas.virtual domain

SMTP Application Filter Lab Create the following access rules SMTP to DMZ/Edge from MBX SMTP from Edge to MBX SMTP from Edge to External Test the connections from MBX d:\portqry -n 10.30.0.31 -e 25

Threat Management Gateway 2010 WEB PROXY FILTER Advanced HTTP Filtering Web Proxy filter By default does not block anything ISA 2004 by default verified normalization

GET/POST/HEAD Methods GET Method used to download a web page or files HTML FORM query included in the URL after? or # sign can be bookmarked, is visible in history, has size limit not suitable for logins/passwords etc. POST Method used to upload HTML FORM data and download the resulting web page not bookmarked nor visible in history better for large data and logins/passwords GET/POST/HEAD Methods HEAD Method used to download only response headers used to refresh/validate cache data used by proxies and clients

GET Example POST Example

Lab Create the following access rule Allow HTTP from DC to External for All Users Configure IE on DC to not use proxy Play with www.book-vendors.com/books.htm and the GET/POST application links try monitoring the traffic by using the Network Monitor Block the POST method on the Access Rule and verify it is working Lab Attach!tools.iso to DC1 Install ie-http-headers and use the IE GUI to monitor HTTP request made when accessing http://google.com Optional: try finding the user password when logging on to https://gmail.com with kamil.idtt@gmail.com

High-bit Characters URL is only 7-bit If GET needs to encode Unicode characters, they get encoded into % Lab From DC try the GET application on http://www.book-vendors.com/books.htm Type a name containing some Czech characters Look up the encoded characters in the URL Optional: block high-bit characters on the access rule and verify the Czech names are not working anymore

Verify Normalization http://google.com Standard ASCII encoding http://%67 %6F %6F %67 %6C %65.com sometimes used by SPAM but still legal Double illegal encoding http://%67 %6F... http:// %25%36%37 %25%36%66... should be blocked on TMG, but some applications may require it Recommended HTTP Filter

Recommended HTTP Filter Threat Management Gateway 2010 SYSTEM POLICY RULES

System Policy Rules Hidden by default Enables TMG to access vital services Some can be customized Some are modified automatically VPN client traffic Connectivity verifiers AD Best Practice Allow DCOM from TMG to AD certificate enrollment Fix the CA DCOM port to a static one and create a custom protocol for it Component Services / CERTSVC Request / Endpoints certutil -setreg ca\interfaceflags +0x8

AD Best Practice RDP Best Practice? Allow RDP and Ping access from anywhere to TMG? applied even in lock-down mode will enable at least some access even if firewall has some problems Security RDP on Windows 2008 uses SSL and Kerberos by default Install valid SSL certificate if not domain member

RDP Best Practice? Lab Configure Active Directory system policy rule to allow DCOM Configure AD CS on DC1 to use static DCOM port Create custom protocol for that AD CS port and create an access rules allowing the traffic from Local Host to DC1 you can test the rule works by using MMC / Certificates / Local Computer console and Request new certificate for GOPAS Domain Computer template

Threat Management Gateway 2010 MALWARE INSPECTION Malware Inspection and NIS Optional subscription services 6 month trial period Only for HTTP/S inspected traffic For access rules only

Antivirus operation Downloads the whole content first to local temp Performs antivirus check Only after then passing the file back to the client problematic user experience Antivirus Settings

Trickling and Progress Progress notification returns progress web page (requires script) Standard trickling returns the file directly, but only with very slow speed only small portion of the file gets to the client until inspected Fast trickling returns the file quickly most of the file (even with virus) gets to the client temp/cache before finally blocked by TMG Trickling Standard trickling for commonly large downloads PDF, ZIP, EXE etc. keeping clients live Fast trickling nearly the normal user experience virus can partly/whole appear on the client before the download is finally blocked by proxy used for probably clear content such as audio/*, video/*

Trickling Settings User Experience

Definition updates Require subscription Require direct access to Microsoft Update or WSUS offline update installation not possible Using WSUS consider doing WSUS synchronization more frequently than once a day Definition updates

Lab Enable Malware Inspection on the present HTTP access rule Try downloading the sample files from http://www.expensive-pc.com/pc.htm Compare user download experience with the clear and infected large files Network Inspection System Intrusion detection for known IP/TCP and application layer exploits

Network Inspection System Network Inspection System

Behavioral Inspection Lab: Optional On a web-site on the WEB-EXT computer disable HTTP Keep-alives IIS / Web Site / HTTP Response Headers / Set Common Headers / Enable Keep-alives IE will close the TCP connections immediately after downloading the web page From DC1 access the web site and pressing CTRL-F5 for some time try the Flood Mitigation is working by blocking the client you need to let it refresh by default 600 times or change the setting

Threat Management Gateway 2010 ADVANCED TOPICS CRL Checking TMG checks CRLs for forward HTTPS traffic Sometimes blocks web pages that would normally just display errors to users

CRL Checking Defaults HTTP Compression Enabled, but not configured by default Can decrease download sizes increases CPU load on TMG

HTTP Compression DiffServ Prioritization TMG can mark HTTP/S traffic with IP DiffServ priority bits no actual QoS shaping in TMG GUI must be done on network devices manually Conditions URLs, domains, networks

DiffServ Defaults Lab: Optional Enable DiffServ Prioritization for some traffic Look at the DifferentiatedServicesField in IP header of the outgoing packets

Threat Management Gateway 2010 CACHE Caching Not enabled by default Any inspected HTTP/S connection regardless it goes over proxy port or not Usually saves about 20% of link Very large cache possible with x64 platform

What can be cached Static HTML usual web sites are dynamically built (news, free mail, e-shops, search engines etc.) Pictures, videos, ZIP/EXE files etc. Partial downloads Content-Range header used by various downloaders and Windows Update HTTP Caching Headers Cache-Control no-cache max-age maximum time in seconds to remain in cache private can be cached only if could be user separated Last-Modified static content (picture, HTM) file last modification date Date the timestamp when the response message was generated by the originating web server Expires

IE Operation Clients use their local cache as well If you really want to download the content directly from the source without using any intermediate proxies CTRL-F5 TMG Cache Settings

TMG Cache Settings Lab: Optional Use ie-http-headers to look at and compare cache-related HTTP headers in requests for pages such as http://google.com http://msn.com http://centrum.cz Try to determine the time the individual elements of the web pages would remain in the cache

Threat Management Gateway 2010 LOGGING NOTES Logging Notes All rules log everything by default excessive data Disable logging on Default Rule be aware of security implications! Create a block rule just to disable logging of some anyway blocked traffic usually broadcast NetBIOS Datagram, DHCP (Request)?

Logging Disabled Ondřej Ševeček GOPAS a.s. MCM: Directory Services MVP: Enterprise Security ondrej@sevecek.com www.sevecek.com THANK YOU