Dr. Tom Shinderamp;#039;s Configuring ISA Server 1002004 [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Dr. Tom Shinderamp;#039;s Configuring ISA Server 1002004 [Electronic resources] - نسخه متنی

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
توضیحات
افزودن یادداشت جدید








Hardening the Base ISA Firewall Configuration and Operating System


While the ISA firewall software does an exceptional job of protecting the firewall from attack, there are things you can do to further harden the ISA firewall configuration and the underlying operating system.


In this section, we'll discuss the following hardening and local security issues:





  • ISA firewall service dependencies You need to know what services the ISA firewall depends on before disabling services on the firewall. In this section, we'll present the list of ISA firewall software dependencies.





  • Service requirements for common tasks performed on the ISA firewall There are several maintenance tasks that you can run on the ISA firewall that depend on features provided by the underlying operating system. In this section, we'll examine some of these features and the services they depend upon.





  • Client roles for the ISA firewall client rules This ISA firewall may need to act as a network client to a variety of network services. In this section, we'll review some of the network client roles and operating system services required for the ISA firewall to fulfill those roles.





  • ISA firewall administrative roles and permissions Not all ISA firewall administrators are created equal. In this section, we'll discuss the ISA firewall administrative roles and how to provide users more granular control over the ISA firewall configuration and management.





  • ISA firewall lockdown mode The ISA firewall needs to protect itself and the networks dependent on it in the event that an attack shuts down the ISA firewalls Firewall Service. In this section, we'll discuss the ISA firewall's Lockdown Mode.






ISA Firewall Service Dependencies



One of the more frustrating aspects of the ISA Server 2000 firewall was that there was never any definitive guidance regarding what services were required for full firewall functionality. Many ISA fans attempted to divine the service dependencies, but no hard and fast guidance was ever developed. To make life even more difficult for the ISA Server 2000 firewall administrator, the ISA Server 2000 System Hardening Templates invariably broke key features of the firewall and the underlying operating system.


These problems are corrected with the new ISA firewall. Now we know the exact services required by the ISA firewall software. Table 6.13 lists the core services that must be enabled for ISA Server and the ISA Server computer to function properly.







Warning


Do not use any of the default security templates included with the version of Windows on which you've installed the ISA firewall software. You should create your own custom security policy on the ISA firewall and then create a template based on that policy.





















































































Table 6.13: Services on which the ISA Firewall Software Depends


Service name




Rationale




Startup mode




COM+ Event System




Core operating system




Manual




Cryptographic Services




Core operating system (security)




Automatic




Event Log




Core operating system




Automatic




IPSec Services




Core operating system (security)




Automatic




Logical Disk Manager




Core operating system (disk management)




Automatic




Logical Disk Manager Administrative Service




Core operating system (disk management)




Manual




Microsoft Firewall




Required for normal functioning of ISA Server




Automatic




Microsoft ISA Server Control




Required for normal functioning of ISA Server




Automatic




Microsoft ISA Server Job Scheduler




Required for normal functioning of ISA Server




Automatic




Microsoft ISA Server Storage




Required for normal functioning of ISA Server




Automatic




MSSQL$MSFW




Required when MSDE logging is used for ISA Server




Automatic




Network Connections




Core operating system (network infrastructure)




Manual




NTLM Security Support Provider




Core operating system (security)




Manual




Plug and Play




Core operating system




Automatic




Protected Storage




Core operating system (security)




Automatic




Remote Access Connection Manager


Remote Procedure Call (RPC)


Secondary Logon




Required for normal functioning of ISA Server


Core operating system


Core operating system (security)




Manual


Automatic


Automatic




Security Accounts Manager


Server*




Core operating system Required for ISA Server Firewall Client Share (and others depending on


your requirements)*




Automatic


Automatic*




Smart Card




Core operating system


(security)




Manual




SQLAgent$MSFW




Required when MSDE


logging is used for ISA


Server (not installed when


Advanced Logging is not


selected during installation)




Manual




System Event Notification


Telephony




Core operating system


Required for normal


functioning of ISA Server




Automatic


Manual




Virtual Disk Service (VDS)




Core operating system


(management)




Manual




Windows Management


Instrumentation (WMI)




Core operating system


(WMI)




Automatic




WMI Performance Adapter




Core operating system (WMI)




Manual




*The startup mode for the Server service should be set as Automatic in the following circumstances:





*The startup mode for the Server service should be set as Automatic in the following circumstances:





  • You install Firewall client installation share on the ISA firewall





  • You use Routing and Remote Access Management, rather than ISA Server Management, to configure a virtual private network (VPN). Required if you want to use EAP user certificate authentication for demand-dial VPN connections and troubleshooting of demand-dial VPN connections





  • IF other tasks or roles table require the Server service





  • The startup mode for the Routing and Remote Access service is Manual. ISA Server starts the service only if a VPN is enabled. Note that the Server service is required only if you need access to Routing and Remote Access console (rather than Microsoft Internet Security and Acceleration Server 2004 management console) to configure a remote-access VPN or site-to-site.






Service Requirements for Common Tasks Performed on the ISA Firewall



Specific services must be enabled in order for the ISA firewall to perform necessary tasks. All services that are not used should be disabled. Table 6.14 lists a number of tasks the ISA firewall's underlying operating system may need to perform. Enable those services required to perform the tasks you want to perform on the ISA firewall and disable services responsible for tasks you will not be using.












































































Table 6.14: Services Required for Common Tasks Performed on the ISA Firewall


Task




Usage scenario




Services required




Startup mode




Application Installation locally using Windows Installer




Required to install, uninstall, or repair applications using the Microsoft Installer Service. Often required to install ISA firewall add-ins to enhance firewall functionality and protection




Windows Installer




Manual




Backup




Required if using NTBackup or other backup programs on the ISA firewall




Microsoft Software Shadow Copy Provider




Backup




Required if using NTBackup or other backup programs on the ISA firewall




Volume Shadow Copy




Manual




Backup




Required if using NTBackup or other backup program on the ISA firewall




Removable Storage Service




Manual




Error Reporting




Required for error reporting, which helps improve Windows reliability by reporting critical faults to Microsoft for analysis




Error Reporting Service




Automatic




Help and Support




Allows collection of historical computer data for Microsoft Product Support Services incident escalation




Help and Support




Automatic




Host the Firewall client installation share




Required to allow computers SMB/CIFS connections to the ISA firewall to install the Firewall client software




Server




Automatic




MSDE logging




Required to allow logging using MSDE databases. If you do not enable the applicable service, you can log to SQL databases or to files. However, you will not be able to use the Log Viewer in off-line mode. Required only when ISA Advanced logging is installed




SQLAgent$MSFW




Manual




MSDE logging




Required to allow logging using MSDE databases. If you do not enable the applicable service, you can log to SQL databases or to files. However, you will not be able to use the Log Viewer in off-line mode. Required only when Advanced logging is installed




MSSQL$MSFW




Automatic




Performance Monitor




Allows background




Performance Logs




Automatic




-Background Collect




Collecting of performance




and Alerts




data on the ISA firewall




Print to a remote computer




Allows printing from the ISA Server computer (not recommended)




Print Spooler




Automatic




Print to a remote computer




Allows printing from the ISA Server computer (not recommended that you send print jobs from the ISA firewall)




TCP/IP NetBIOS Helper




Automatic




Print to a remote computer




Allows printing from the ISA Server computer (not recommended that you send print jobs from the ISA firewall)




W orkstation




Automatic




Remote Windows administration




Allows remote management of the Windows server (not required for remote management of the ISA firewall software)




Server




Automatic




Remote Windows administration




Allows remote management of the Windows server (not required for remote management of the ISA firewall software)




Remote Registry




Automatic




Time Synchronization




Allows the ISA firewall to contact an NTP server to synchronize its clock. An accurate clock is important for event auditing and other security protocols.




Windows Time




Automatic




Remote Assistant




Allows the Remote Assistance feature to be used on this computer (not recommended that you run remote assistance sessions from the ISA firewall)




Help and Support




Automatic




Remote Assistant




Allows the Remote Assistance feature to be used on this computer (not recommended that you run remote assistance sessions from the ISA firewall)




Remote Desktop Help Session Manager




Manual




Remote Assistant




Allows the Remote Assistance feature to be used on this computer




Terminal Services




Manual





Client Roles for the ISA Firewall



The ISA firewall may need to act in the role of client to network services located on protected and non-protected Networks. Network client services are required for the ISA firewall to act in its role of network client. Table 6.15 lists possible network client roles the ISA firewall may act as, describes when they may be required, and lists the services that should be enabled when you enable the role.







Note


You will also need to enable the automatic update services if you are using a WUS or SUS server on your network.














































Table 6.15: Service Requirements Based on the ISA Firewall's Client Roles


Client role




Usage scenario




Services required




Startup mode




Automatic Update client




Select this role to allow automatic detection and update from Microsoft Windows Update.




Automatic Updates




Automatic Update client




Select this role to allow automatic detection and update from Microsoft Windows Update.




Background Intelligent Transfer Service




Manual




DHCP client




Select this role if the ISA Server computer receives its IP address automatically from a DHCP server.




DHCP Client




Automatic




DNS client




Select this role if the ISA Server computer needs to receive name resolution information from other servers.




DNS Client




Automatic




Domain member




Select this role if the ISA Server computer belongs to a domain.




Network location




Manual




Domain member




Select this role if the ISA Server computer belongs to a domain.




Net logon




Automatic




Domain member




Select this role if the ISA Server computer belongs to a domain.




Windows Time




Automatic




Dynamic DNS registration




Select this role to allow the ISA Server computer to automatically register its name and address information with a DNS Server.




DHCP Client




Automatic




Microsoft Networking client




Select this role if the ISA Server computer has to connect to other Windows clients. If you do not select this role, the ISA Server computer will not be able to access shares on remote computers; for example, to publish reports.




TCP/IP NetBIOS Helper




Automatic




Microsoft Networking client




Select this role if the ISA Server computer has to connect to other Windows clients. If you do not select this role, the ISA Server computer will not be able to access shares on remote computers; for example, to publish reports.




Workstation




Automatic




WINS client




Select this role if the ISA Server computer uses WINS-based name resolution.




TCP/IP NetBIOS Helper




Automatic





After determining the appropriate service configuration for your ISA firewall, you can save the configuration in a Windows security template (.inf) file. Check www.isaserver.org for sample ISA security templates covering several common scenarios. ISA Firewall Administrative Roles and Permissions Not all firewall administrators should have the same level of control over the ISA firewall's configuration and management. The ISA firewall allows you to provide three levels of control over the firewall software based on the role assigned to the user.


The ISA firewall's Administrative Roles are:





  • ISA Server Basic Monitoring





  • ISA Server Extended Monitoring





  • ISA Server Full Administrator





Table 6.16 describes the functions of each of these roles.






















Table 6.16: ISA Firewall Administrative Roles


Role




Description




ISA Server Basic Monitoring




Users and groups assigned this role can monitor the ISA Server computer and network activity, but cannot configure specific monitoring functionality.




ISA Server Extended Monitoring




Users and groups assigned this role can perform all monitoring tasks, including log configuration, alert definition configuration, and all monitoring functions available to the ISA Server Basic Monitoring role.




ISA Server Full Administrator




Users and groups assigned this role can perform any ISA Server task, including rule configuration, applying of network templates, and monitoring.




Users assigned to these roles can be created in the ISA firewall's local SAM, or they can be domain users if the ISA firewall is a member of the Internal network Active Directory domain. Any users can be assigned to one of the ISA firewall's Administrative roles, and no special privileges or Windows permissions are required. The only exception to this is when a user needs to monitor the ISA Server performance counters using Perfmon or the ISA Server Dashboard; the user must be a member of the Windows Server 2003 Performance Monitors User group.


Each ISA Server role has a specific list of firewall administrator and configuration tasks associated with it. Table 6.17 lists some firewall tasks and the Administrative roles that are allowed to perform each task.











































Table 6.17: ISA Firewall Tasks Assigned to ISA Firewall Administrative Roles


Activity




Basic Monitoring permissions




Extended Monitoring permissions




Full Administrator permissions




View Dashboard, alerts, connectivity, sessions, services




X




X




X




Acknowledge alerts




X




X




X




View log information




X




X




Create alert definitions




X




X




Create reports




X




X




Stop and start sessions and services




X




X




View firewall policy




X




X




Configure firewall policy




X




Configure cache




X




Configure VPN




X








Warning


Users with ISA Server Extended Monitoring permissions can export and import all configuration information, including secret configuration information. This means that they can potentially decrypt secret information.




To assign administrative roles, perform the following steps:





  1. Click Start, point to All Programs, point to Microsoft ISA Server, and click ISA Server Management.





  2. Click the server name in the left pane of the Microsoft Internet Security and Acceleration Server 2004 management console. Click Define Administrative Roles on the Tasks tab.





  3. On the Welcome to the ISA Server Administration Delegation Wizard page, click Next.





  4. On the Delegate Control page, click Add.





  5. In Group (recommended) or User dialog box, enter the name of the group or user to which the specific administrative permissions will be assigned. Click the down arrow in the Role drop-down list and select the applicable administrative role. Click OK.





  6. Click Next on the Delegate Control page.





  7. Click Finish on the Completing the Administration Delegation Wizard page.





  8. Click Apply to save the changes and update the firewall policy





  9. Click OK in the Apply New Configuration dialog box.






Lockdown Mode



The ISA firewall sports a new feature that combines the need to isolate the firewall and all Protected Networks from harm in the event that the ISA firewall is attacked, to the extent that the Firewall services are shut down. The ISA firewall accomplishes a combination of protection and protective accessibility by entering lockdown mode.


Lockdown mode occurs when:





  1. An attack or some other network or local host event causes the Firewall service to shut down. This can happen from a fault, or you can do it explicitly by configuring Alerts and then configuring an Alert Action that shuts down the Firewall service in response to the issue that triggered the Alert.





  2. Lockdown mode occurs when the Firewall service is manually shut down. You can shut down the Firewall service if you become aware of an ongoing attack while configuring the ISA firewall and the network to effectively respond to the attack.






Lockdown Mode Functionality



When in lockdown mode, the following functionality applies:





  1. The ISA Firewall's Packet Filter Engine (fweng) applies the lockdown firewall policy.





  2. Firewall policy rules permits outgoing traffic from the Local Host network to all networks, if allowed. If an outgoing connection is established, that connection can be used to respond to incoming traffic. For example, a DNS query can receive a DNS response on the same connection. This does not imply that lockdown mode allows an extension of existing firewall policy for outbound access from the local host network. Only existing rules allowing outbound access from the local host network are allowed.





  3. No new primary connections to the ISA firewall itself are allowed, unless a System Policy Rule that specifically allows the traffic is enabled. An exception is DHCP traffic, which is always allowed. DHCP requests (on UDP port 67) are allowed from the Local Host Network to all Networks, and DHCP replies (on UDP port 68) are allowed back in.





  4. Remote-access VPN clients will not be able to connect to the ISA firewall. Site-to-site VPN connections will also be denied.





  5. Any changes to the network configuration while in lockdown mode are applied only after the Firewall service restarts and the ISA firewall exits lockdown mode.





  6. The ISA Server will not trigger any Alerts.






Connection Limits



The ISA firewall puts a limit on the number of connections made to or through it at any point in time. Connection limits allow the ISA firewall to block connections through the firewall for clients that may be infected with worms that attempt to establish large numbers of connections through the ISA firewall. Examples of such worms are mass mailing worms and the Blaster worm.


For Web Publishing Rules, you can customize a total number of connections limit by specifying a maximum number of concurrent connections in the Properties of the Web listener. Any new client requests will be denied when the maximum number of connections configured to the Web listener is reached.


You can limit the total number of UDP, ICMP, and other Raw IP sessions allowed by a Server Publishing Rule or Access Rule on a per-second basis. These limitations do not apply to TCP connections. When the specified number of connections is surpassed, new connections will not be created. Existing connections will not be disconnected.


You should begin by configuring low connection-limit thresholds. This enables the ISA firewall to limit malicious hosts from consuming resources on the ISA Server computer.


By default, connection limits for non-TCP connections are configured to 1000 connections per second per rule and to 160 connections per client.


Connection limits for TCP connections begin at 160 connections per client. You should not change these limits unless you notice that legitimate hosts are being blocked because the limiting is too low. You can determine if a host is being blocked because it has exceeded its connection limit by an associated Alert. The Alert will provide the IP address of the host exceeding its allowed number of connections.


Perform the following steps to configure connection limits:





  1. Click Start, point to All Programs, point to Microsoft ISA Server, and click ISA Server Management.





  2. Expand the server name in the left pane of the Microsoft Internet Security and Acceleration Server 2004 management console, and expand the Configuration node. Click the General node.





  3. Click Define Connection Limits in the details pane.





  4. On the Connection Limit tab (Figure 6.32), check the Limit the number of connections checkbox. You can then configure the number of Connections created per second, per rule (non-TCP) and Connection limit per client (TCP and non-TCP). Some machines may need access in excess of these numbers, such as busy published servers. In that case, you can click Add and select a Computer Set to apply the Customer connection limit value.




    Figure 6.32: The Connection Limits Dialog Box





New connections will not be created after the specified number of connections is exceeded. However, existing connections will not be disconnected. Up to 1000 new connections are allowed per rule, per second by default. When this default limit is exceeded, an alert is triggered.


A log entry is recorded when the limit is exceeded:





  • Action is Connection Denied





  • Result code is FWX_E_RULE_QUOTA_EXCEEDED_DROPPED





You should limit the number of connections hosts can make to prevent flood attacks. Many requests are sent from spoofed source addresses when a UDP or IP flood attack occurs, and this can result in a denial of service.


Try the following when the limit is exceeded:





  • If the malicious traffic appears to originate from an ISA firewall Protected Network, this may indicate a host on the Protected Network has a virus or worm infection. Immediately disconnect the computer from the network.





  • Create a rule denying access to a computer set that includes the source IP addresses if the malicious traffic appears to originate from a small range of IP addresses on an external network.





  • Evaluate the overall status of your network if the traffic appears to originate from a large range of IP addresses. Consider setting a smaller connection limit so that ISA Server can better protect your network.





If the limit has been exceeded due to a heavy load, consider setting a higher per-rule connection limit based on your analysis of your network's requirements.


In firewall chaining, and in some back-to-back ISA firewall scenarios, make sure to configure customized connection limits for the IP addresses of the chained server or back-end ISA firewall. Also, if your system publishes more than one UDP-based or raw IP-based service to the External network, you should configure smaller limits to help keep your network secure from flood attacks.


You can limit the total number of UDP, ICMP, and other Raw IP connections allowed per client. You can specify custom limits to apply to specific IP addresses. This is useful when you want to allow specific servers to establish more connections than allowed to other clients.


For TCP connections, no new connections are allowed after the connection limit is exceeded. Make sure you set connection limits high enough for TCP-based services, such as SMTP, so that SMTP servers can send outbound mail and receive inbound mail. For other connections (Raw IP and UDP), older connections are terminated when the connection limit is exceeded so that new connections can be created.



DHCP Spoof Attack Prevention



Some of you may want to use DHCP on the external interface of the ISA firewall so that it can obtain IP addressing information from your cable or DSL company's DHCP server. You might encounter problems with obtaining an IP address on the external interface when that interface is configured to use DHCP to obtain IP addressing information. A common reason for this problem is the DHCP Spoof Attack prevention mechanism.


It's important to understand the DHCP attack prevention mechanism to solve this problem. For each adapter on which DHCP is enabled, the ISA firewall maintains the list of allowed addresses. There is an entry in the registry for each DHCP enabled adapter:


The registry key name is


HKLM\SYSTEM\CurrentControlSet\Services\Fweng\Parameters\DhcpAdapters 
<Adapter's MAC>/<Adapter's hardware type>


The values under the key are:





  1. The adapter's name





  2. The ISA network name of the adapter





  3. The adapter's MAC address





  4. ISA network addresses





  5. The adapter's hardware type





Figure 6.33 shows an example of the registry key:




Figure 6.33: Registry Key for DHCP Attack Prevention


When the ISA firewall's driver sees a DHCP Offer message, it validates the offer using the following logic:





  1. Using the DHCP 'Client Ethernet Address' field and the 'Hardware Type' field, the driver finds the corresponding registry key of the adapter.





  2. If there is no registry key, the packet is allowed (this will be the case during initial setup of the ISA firewall software).





  3. The driver verifies that 'Your IP Address' field in the DHCP Offer contains an IP address within the addresses of the adapter's network element (as written in the registry).





  4. If the verification fails, the packet is dropped, and an ISA alert is raised.





Figure 6.34 shows an example of a DHCP offer packet (the relevant fields are marked).




Figure 6.34: Network Monitor Capture of a DHCP Offer Packet


The invalid alert contains the following information (Figure 6.35):




Figure 6.35: An Invalid DHCP Offer Alert


In case the network adapter should receive the offered address, the administrator should use the 'Renew DHCP addresses' task that appears in the Task pane of the ISA firewall console. Figure 6.36 shows the warning dialog box you'll see when you click Renew DHCP Addresses in the Task pane .




Figure 6.36: The Renew DHCP Addresses Warning


After clicking Yes, all registry keys related to DHCP attack prevention are deleted, and an 'ipconfig /renew' is performed. This means that during this period, no offered address will be dropped by the driver (because there are no registry keys). Once the adapters receive their addresses, new registry keys are written with the new values, and the mechanism will be activated once again.


Dropped DHCP offers due to DHCP Attack Prevention may happen in the following scenarios:





  1. If you have two DHCP adapters and you switched them. For example, the one that was connected to the internal network is now connected to the external network, and vice versa.





  2. A DHCP adapter was moved to a different network. For example, ISA's external NIC was connected to a home network where another router made the connectivity to the ISP (and the Internet), and now you try replacing this router to use ISA's external NIC for connecting the ISP.





In such cases you need to use the Renew DHCP Addresses task, in order to allow the DHCP assignment. Note that once it's allowed, you will not need to allow it anymore. This procedure is needed only after changing the DHCP adapter in such a way that it becomes a member of a different ISA network element


/ 145