Title: Securing an Extranet
1Securing an Extranet
- Identifying Common Firewall Strategies
- Securing Internet-Accessible Resources in a
Demilitarized Zone (DMZ) - Securing Data Flow Through a DMZ
2Identifying Common Firewall Strategies
- Identifying firewall features to protect the
extranet - Comparing DMZ configurations
3Firewall Overview
4Firewall Services
- Network Address Translation (NAT)
- Packet filtering
- Static address mapping
- Stateful inspection of network traffic
- Advanced features
5Protecting Private Network Addressing with NAT
6Private Network Addressing
- RFC 1918 reserves three ranges of IP addresses
for private network addressing - 10.0.0.0 10.255.255.255 (10.0.0.0/8)
- 172.16.0.0 172.31.255.255 (172.16.0.0/12)
- 192.168.0.0 192.168.255.255 (192.168.0.0/16)
7Packet Filters
8Typical Packet Filter Fields
- Source address
- Source port
- Destination address
- Destination port
- Protocol
- Action
9Port Numbers
- To determine what ports are used by specific
services and applications, view the Services text
file in the systemroot\system32\drivers\etc
folder. - To view a listing of well-known port numbers, go
to www.isi.edu/in-notes/iana/assignments
/port-numbers.
10Mirroring Packet Filters
11Firewall Strategies
- Choose one of the following typical firewall
strategies, based on the organization's risk
level. - Specify allowed protocols and prohibit everything
else. - Specify prohibited protocols and allow everything
else. - Higher security networks specify the allowed
protocols and prohibit everything else.
12Static Address Mapping
13Stateful Inspection
- Simple packet filters might not provide enough
security. - Packet filters define which ports are left open
at the firewall to redirect network traffic to
Internet-accessible resources. - Many protocols use random ports above port 1024
at the client computer side. - Stateful inspection allows the firewall to
inspect and open the ports used for an initial
connection and then close them when the
connection is terminated. - If any suspect ports are requested, the firewall
can recognize the attack and drop the connection. - Stateful inspection allows firewall rules to be
established so that User Datagram Protocol
(UDP)-based protocols (such as SNMP) can pass
through successfully.
14Advanced Techniques
- Configuring time-out tolerance
- Allows the firewall to disconnect sessions before
the synchronize (SYN) queue overflows - Impedes SYN flood attacks, which attempt to lock
up the firewall and prevent further connections
by flooding it with incomplete Transmission
Control Protocol (TCP) sessions - Content scanning
- Allows the firewall to inspect the commands
transmitted within a session - Can also scan all incoming content for known
virus signatures
15Making the Decision Designing Firewall Features
- NAT
- Packet filters
- Static address mapping
- Stateful inspection
- Time-out tolerances
- Content scanning
16Applying the Decision Designing the Market
Florists Firewall
- NAT
- The private network client computers require
access to the Internet. - All outgoing IP addresses will be replaced with
the NAT common address (client.marketflorist.tld
IP address 131.107.88.2). - Packet filters
- Packet filtering must be defined to allow only
the authorized protocols to connect to each
network resource. - Several protocols are allowed to enter the
extranet for each Market Florist server.
17Applying the Decision Designing the Market
Florists Firewall (Cont.)
- Static address mapping
- www.marketflorist.tld
- ftp.marketflorist.tld
- mail.marketflorist.tld
- vpn.marketflorist.tld
- Stateful inspection
- Flower Power uses UDP as its transport protocol.
- UDP-based applications do not establish sessions.
- Stateful inspection ensures that the Flower Power
connections are not hijacked. - Stateful inspection ensures that all response
packets use the same IP addresses and UDP ports
that were used by the initial request packets.
18Applying the Decision Designing the Market
Florists Firewall (Cont.)
- Time-out tolerance
- Time-outs disconnect sessions to protect the Web
site and other extranet resources from a denial
of service attack. - Time-out tolerance prevents SYN flooding attacks
against the network. - Content scanning
- To prevent uploads of data to the MFFTP server,
the firewall should deploy content scanning and
prevent all attempts to use the FTP PUT command. - This provides greater protection by scanning the
File Transfer Protocol (FTP) transmissions for
disallowed commands.
19Comparing DMZ Configurations
- It is unadvisable to host Internet-accessible
resources within the private network. - Place all Internet-accessible resources in a
network segment (called a DMZ) between the
private network and the public network. - Other terms for DMZ are screened subnet and
perimeter network. - There are three types of DMZ designs
three-pronged firewall, mid-ground, and hybrid
(or multizone). - A DMZ is part of the public and private network.
20A Three-Pronged Firewall DMZ
21A Mid-Ground DMZ
22A Hybrid DMZ with a Single Firewall
23A Hybrid DMZ with Multiple Firewalls
24Making the DecisionChoosing Among DMZ
Strategies
- Three-pronged firewall DMZ
- Mid-ground DMZ
- Hybrid DMZ
25Applying the Decision Developing a DMZ Strategy
for Market Florist
26Securing Internet-Accessible Resources in a DMZ
- Securing Internet Information Server (IIS)
- Securing other services within the DMZ
27Securing Internet Information Server (IIS)
- The content on a Web server is the most common
network resource exposed to the Internet. - IIS 5.0, included with Microsoft Windows 2000
Server, allows an organization to host Web sites. - Additional configuration is required to fully
secure an IIS server when it is exposed to the
Internet.
28Preventing Attacks Against the Web Servers
- Change all default account names.
- Ensure that the Web server is not a member of the
same forest as the private network.
29Preventing Attacks Against the Web Servers (Cont.)
- Separate content into different folders by type.
30Preventing Attacks Against the Web Servers (Cont.)
- Secure available content by type.
31Preventing Attacks Against the Web Servers (Cont.)
- Remove all sample applications from the Web
server.
32Preventing Attacks Against the Web Servers (Cont.)
- Disable unnecessary services.
- Block commonly attacked ports with Internet
Protocol Security (IPSec). - Enable IIS logging.
- Implement Secure Socket Layer (SSL) to protect
secure areas of the Web server. - Deploy an intrusion detection system.
- Disable the use of parent paths.
- Apply the IIS 5.0 security checklist.
- Mitigate against successful attacks.
- Maintain the latest service packs and hot fixes
for the Web server.
33Making the Decision Securing a Web Server
- Track all access to the Web server.
- Provide the strongest security to Web-accessible
data. - Prevent an attacker from accessing unauthorized
areas of the disk subsystem. - Prevent port scans against commonly attacked
ports. - Detect hacking attempts.
- Prevent a successful attack against the Web
server from compromising other data stored on the
network. - Ensure that the latest security fixes are applied
to the Web server. - Limit the effect of a successful hacking attempt.
- Apply the recommended security configuration for
the Web server.
34Applying the Decision Configuring the Web Server
for Market Florist
- Configure the Web server as a Network Load
Balancing Service (NLBS) cluster. - Configure the NLBS cluster to load balance
equally among the four nodes. - Apply any additional security configurations
uniformly against all four servers.
35Applying the Decision Configuring the Web Server
for Market Florist (Cont.)
- Configuration for the four Web servers
- Enable auditing on each Web server.
- Separate the content from the rest of the Web
site. - Implement SSL on the Web server.
- Apply Internet Protocol Security (IPSec) to
restrict public network access to the Web server. - Apply the IIS 5.0 security checklist
recommendations to the IIS servers.
36Applying the Decision Configuring the Web Server
for Market Florist (Cont.)
- Recommended IPSec filters
37Securing Other Services Within the DMZ
- FTP services
- Telnet services
- Domain Name System (DNS) services
- Terminal Services
- All services
38Protect Transmitted Data Between Computers in the
DMZ
39Making the Decision Protecting
Internet-Accessible Resources
- Protect the following resources
- FTP services
- Telnet services
- DNS services
- All services
- Interaction between servers
40Applying the Decision Protecting
Internet-Accessible Resources at Market Florist
- Implement the following resources
- FTP service
- DNS service
- Telnet services
- Terminal Services
- Interaction between servers
41Securing Data Flow Through a DMZ
- Determining a firewall strategy
- Securing DNS resolution traffic
- Securing Web traffic
- Securing FTP traffic
- Securing mail traffic
- Securing application traffic
- Securing Terminal server traffic
- Securing VPN traffic
42Specify Allowed Protocols and Prohibit Everything
Else
- The packet filters identify all protocols that
can pass through the firewall. - If the packet filter does not identify a packet,
the packet is assumed to be disallowed and is
dropped. - This strategy is typically used at external
firewalls to define which protocols are allowed
to enter the DMZ and the private network. - This strategy is also used in high-security
networks where only authorized protocols are
allowed to enter the DMZ and the private network.
43Specify Prohibited Protocols and Allow Everything
Else
- The packet filters identify all protocols that
must be dropped at the firewall. - If the packet filter does not identify a packet,
the packet is allowed to pass through the
firewall. - This strategy is typically used at internal
firewalls to block private network users from
specific protocols. - This strategy is also used in lower security
networks where only unauthorized protocols are
blocked at the firewall.
44Order of the Packet Filters
- The order of processing depends on the specific
firewall product. - Two common methods for processing packet filters
- Process the packet filters in the order in which
they are entered. - Process the most specific packet filters before
the more general packet filters.
45Making the Decision Choosing Firewall Strategies
- The "Specify allowed protocols and prohibit
everything else" strategy - The "Specify prohibited protocols and allow
everything else" strategy - The "Specify allowed protocols and prohibit
everything else strategy and then create packet
filters that deny specific protocols
46Applying the Decision Choosing a Firewall
Strategy for Market Florist
- The "Specify allowed protocols and prohibit
everything else" strategy best meets the security
needs of the Market Florist network. - It allows Market Florist to define only
authorized protocols that can enter the DMZ and
the private network. - If a protocol is not included in the packet
filter list, the protocol is assumed to be denied
access to the DMZ or private network.
47Securing DNS Resolution Traffic
- The DNS service is used as a locator service in a
Microsoft Windows 2000 network. - DNS is also used as the locator service for the
Internet. - When designing security for the DNS service,
define how DNS traffic moves through the private
network and the DMZ to the Internet. - Separate the internal DNS service from the
external DNS service.
48DNS Traffic Flow in a DMZ
49Internal Firewall Rules to Restrict DNS Usage
50External Firewall Rules to Restrict DNS Usage
51Making the Decision Securing DNS Resolution
Traffic
- Establish packet filters at the external firewall
to allow only TCP port 53 and UDP port 53 packets
to reach the DNS server. - Establish packet filters at the internal firewall
to allow only the internal DNS server to send TCP
port 53 and UDP port 53 packets to the external
DNS server. - Configure the internal DNS server to forward all
irresolvable DNS queries to the external DNS
server. - Configure the external DNS server to forward
irresolvable DNS queries to the ISPs DNS server.
52Applying the Decision Securing DNS Resolution
Traffic at Market Florist
53Securing Web Traffic
- A Web server is one of the most common network
resources for Internet access. - A Web server listens for connections from
external client computers on TCP port 80 for HTTP
and port 443 for HTTPS connections.
54Web Server Placement in the DMZ
55External Packet Filters for a Web Server
56Making the Decision Securing Web Traffic
- Establish packet filters at the external firewall
to allow only TCP port 80 and TCP port 443
packets to reach the Web server. - Implement SSL protection for Web pages that
require external users to input sensitive data. - When authentication is required to a Web site,
use either Windows Integrated Authentication or
Basic Authentication with SSL encryption to
protect credentials from interception.
57Applying the Decision Securing Web Traffic for
Market Florist
58Securing FTP Traffic
- FTP allows data to be transferred to and from a
central location. - FTP uses two separate channels for FTP sessions.
- A control stream (a connection to TCP port 21)
sends FTP commands from the FTP client software
to the FTP server. - A data stream (a connection to TCP port 20)
transfers data. - Active FTP clients require the FTP server to
initiate the data transfer. - Establish packet filters that allow the FTP
server to initiate FTP data sessions.
59Providing FTP Access in a DMZ
60FTP Server Packet Filters
61Making the Decision Securing FTP Traffic at
Market Florist
- Establish packet filters at the external firewall
to allow only TCP port 20 and TCP port 21 packets
to reach the FTP server. - If active FTP clients exist, or if it is unknown
if they exist, establish reverse packet filters
that originate at the FTP server for TCP port 20
and TCP port 21. - To provide maximum password security, allow only
anonymous access to the FTP server.
62Applying the Decision Securing FTP Traffic at
Market Florist
63Applying the Decision Securing FTP Traffic at
Market Florist (Cont.)
- Configure the FTP server to accept only anonymous
connections. - Authenticated access is not required to download
floral arrangement brochures. - John Coake and Pat Coleman will use Telnet from
the private network to manage the data in the
Ftproot folder. - To allow Telnet access from the private network,
the internal firewall must either allow all
access or restrict access to TCP port 23 on the
MFFTP server.
64Securing Mail Traffic
65Common Protocols Supported by Mail Servers
- Post Office Protocol v3 (POP3)
- Internet Mail Access Protocol v4 (IMAPv4)
- Simple Message Transfer Protocol (SMTP)
- Lightweight Directory Access Protocol (LDAP)
66Protect Protocols Using SSL
- Implement Secure Sockets Layer (SSL) to protect
POP3, IMAPv4, and LDAP. - These protocols use SSL encryption to protect
user account and password verification during the
authentication process.
67Mail Server Packet Filters
68Making the Decision Securing Mail Traffic
- Determine which protocols will be allowed to
access the mail server from the public network. - Establish packet filters at the external firewall
to allow only the necessary ports to connect to
the mail server. - Establish restrictions on SMTP relaying to
prevent the mail server from becoming a source
for unsolicited bulk e-mail. - Restrict the protocols that can be used to
connect to the mail server from the private
network.
69Applying the Decision Securing Mail Traffic at
Market Florist
- Market Florist must restrict the protocols that
can connect to the mail server in the DMZ. - Only POP3 and SMTP will be used to connect to the
mail server from the public network.
70Applying the Decision Securing Mail Traffic at
Market Florist (Cont.)
- Mail Server Packet Filters for Market Florist
71Applying the Decision Securing Mail Traffic at
Market Florist (Cont.)
- Mail Server Configuration
- Allow only SMTP relaying if the user
authenticates with the MFMAIL server before the
e-mail client attempts the SMTP relay action. - Do not restrict use of network IP addresses,
since the sales force will connect from unknown
IP addresses.
72Securing Application Traffic
- Servers in the DMZ are often required to store or
access data from an application server in the
private network. - Configure the internal firewall to allow only
specific protocols to pass between the server in
the DMZ and the application server in the private
network. - It is risky to place the application server in
the DMZ because data stored on the application
server might be compromised. - Ensure that only authorized connections between
the server in the DMZ and the application server
in the private network can take place.
73Securing Application Traffic Managing the
Connection Between the Two Servers
- Attach the server in the DMZ directly to the
computer on the private network, using a
crossover cable and a protocol other than TCP/IP. - Open the firewall to allow the native protocol to
transfer between the server in the DMZ and the
application server in the private network. - Use IPSec to encrypt the data transmitted between
the server in the DMZ and the application server
in the private network.
74Securing Application Traffic SQL Server Packet
Filters for the Internal Firewall
75Securing Application Traffic IPSec Packet
Filters for the Internal Firewall
76Securing Application Traffic External Firewall
- Public network clients are only allowed to
connect to the Web server. - The public network clients do not query the SQL
server on the private network. - The Web server actually performs the query on the
external customers behalf. - For the transaction to occur, the external
customer only needs to connect to the Web server
using HTTP or HTTPS.
77Making the Decision Securing Application Traffic
- Determine which protocols are required to access
the server-based component in the DMZ. - Configure the external firewall to allow only
public network client computers to connect to the
server in the DMZ. - Determine which protocols the server-based
component uses to connect to the application
server in the private network. - Determine the most secure method to connect the
server in the DMZ to the application server in
the private network. - Define the necessary packet filters at the
internal firewall to allow only the required
protocols to exchange data between the DMZ and
the private network.
78Applying the Decision Securing Application
Traffic at Market Florist
- Market Florist must allow customers to connect to
the SQL server on the private network. - All data transmitted between the Web server
(MFWEB) and the SQL server (MFSQL) must be
encrypted using IPSec transport mode.
79Applying the Decision Securing Application
Traffic at Market Florist (Cont.)
80Securing Terminal Server Traffic
- Terminal Services allows an administrator to
connect to servers on the network by using Remote
Desktop Protocol (RDP). - Configure Terminal Services to run in Remote
Administration mode rather than Application
Services mode.
81Securing Access to a Terminal Server
82Terminal Services Packet Filters
83Making the Decision Securing Terminal Server
Traffic
- Configure the firewall to allow only connections
to TCP port 3389, the RDP protocol, to pass
through the firewall. - Configure the terminal server to use the highest
level of encryption supported by the client
computers, subject to local import and export
laws. - If only administrative access to the terminal
server is required, configure the terminal server
to use Remote Administration mode.
84Applying the Decision Securing Terminal Server
Traffic at Market Florist
- Use Terminal Services to manage all servers in
the DMZ from the private network. - Configure Terminal Services to use Remote
Administration mode at all computers in the DMZ.
85Applying the Decision Securing Terminal Server
Traffic at Market Florist (Cont.)
- Terminal Services Packet Filters
86Securing VPN Traffic
- The organization must consider how the protocol
affects the firewall and network infrastructure
design. - Layer Two Tunneling Protocol (L2TP) and IPSec
tunnel mode both use IPSec to provide encryption
services to the tunnel. - IPSec cannot pass through a firewall that
performs NAT on incoming and outgoing packets.
87Securing PPTP Tunnel Traffic
- Special considerations are not needed when
placing a Point-to-Point Tunneling Protocol
(PPTP) tunnel server in the network. - It does not matter if the external firewall
performs NAT on incoming and outgoing packets. - The only requirement is to place the tunnel
server in the DMZ.
88PPTP Tunnel Server in the DMZ
89PPTP Packet Filters at the External Firewall
90Securing PPTP Tunnel Traffic Protect the Active
Directory Database
- Deploy the PPTP server as a member of a workgroup
rather than as a member of the domain. - To support domain authentication, configure the
tunnel server as a Remote Authentication Dial-In
User Service (RADIUS) client to a RADIUS server
on the private network. - No additional encryption is required because the
RADIUS protocol provides encryption services.
91Securing PPTP Tunnel Traffic RADIUS
Authentication Filters at the Internal Firewall
92Securing L2TP/IPSec Tunnel Traffic
- L2TP tunnel connections do not allow placing the
tunnel server behind a firewall that performs
NAT. - Modify the DMZ configuration to meet this
requirement.
93L2TP Tunnel Server in the DMZ Using Public
Network Addressing
94L2TP Tunnel Server in the Hybrid DMZ
95Securing Access to an L2TP Perimeter Server
96L2TP/IPSec Filters at the External Firewall
97Making the Decision Securing VPN Traffic
- Use public network addressing if the L2TP tunnel
server is placed in the DMZ. - If the DMZ uses private network addressing as
defined in RFC 1918, either - Establish an outer DMZ that uses public network
addressing - Configure the L2TP server as a perimeter server
with an interface on the public network to accept
tunnel connections - Configure the external firewall to pass the
tunneling protocol used by the tunnel server in
the DMZ. - Configure the internal firewall to allow RADIUS
authentication to a RADIUS server on the private
network.
98Applying the Decision Securing VPN Traffic at
Market Florist
- The MFTUNNEL server is assigned an IP address of
192.168.77.9, which is an RFC 1918-defined
private network address. - The only tunneling protocol supported in this
network infrastructure is PPTP. - Configure the firewall to allow the MFTUNNEL
server to pass RADIUS authentication and account
packets to the Internet Authentication Services
(IAS) server at IP address 10.10.10.200.
99Applying the Decision Securing VPN Traffic at
Market Florist (Cont.)
- Tunnel Packet Filters at the Market Florist
Firewall
100Chapter Summary
- Identifying firewall features to protect the
extranet - Comparing DMZ configurations
- Securing Internet Information Server (IIS)
- Securing other services within the DMZ
- Determining a firewall strategy
- Securing DNS resolution traffic
101Chapter Summary (Cont.)
- Securing Web traffic
- Securing FTP traffic
- Securing mail traffic
- Securing application traffic
- Securing terminal server traffic
- Securing VPN traffic