Dr. Tom Shinderamp;#039;s Configuring ISA Server 1002004 [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Dr. Tom Shinderamp;#039;s Configuring ISA Server 1002004 [Electronic resources] - نسخه متنی

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
توضیحات
افزودن یادداشت جدید






ISA Firewall Access Rule Elements


You construct Access Rules using Policy Elements. One of the major improvements in the new ISA firewall over ISA Server 2000 is the ability to create all Policy Elements 'on the fly'. That is, you can create all Policy Elements from within the New Access Rule Wizard. This greatly improves on ISA Server 2000, where you have to plan out your Policy Elements in advance and then create Protocol Rules and Publishing Rules after you configure your Policy Elements.

The ISA firewall includes the following Policy Elements:



  • Protocols



  • User Sets



  • Content Types



  • Schedules



  • Network Objects




Protocols


The ISA firewall includes a number of built-in protocols that you can use right out of the box to create Access Rules, Web Publishing Rules and Server Publishing Rules.

In addition to the built-in protocols, you can create your own protocols by using the ISA firewall's New Protocol Wizard. The pre-built protocols cannot be modified or deleted. However, you can edit or delete protocols you create yourself. There are some protocols that are installed with application filters that cannot be modified, but they can be deleted. You do have the option to unbind application filters from protocols. For example, if you don't want Web requests for SecureNAT and Firewall clients to be forwarded to the Web Proxy filter, you can unbind the Web Proxy filter from the HTTP protocol. We'll examine this issue in more detail later in this chapter.

When you create a new Protocol Definition, you'll need to specify the following information:



  • Protocol Type. TCP, UDP, ICMP, or IP-level protocol. If you specify an ICMP protocol, then you'll need to include the ICMP type and code. Note that you cannot publish IP-level or ICMP protocols.



  • Direction. For UDP, this includes Send, Receive, Send Receive, or Receive Send. For TCP, this includes Inbound and Outbound. For ICMP and IP-level, this includes Send and Receive.



  • Port range. (for TCP and UDP protocols) This is a range of ports between 1 and 65535 that is used for the initial connection. IP-level and ICMP protocols do not use ports, as ports are part of the transport layer header.



  • Protocol number. (for IP-level protocols). This is the protocol number. For example, GRE uses IP protocol number 47.



  • ICMP properties. (for ICMP protocol). This is the ICMP code and type.



  • (Optional) Secondary connections. This is the range of ports, protocol types, and direction used for additional connections or packets that follow the initial connection. You can configure one or more secondary connections. Secondary connections can be inbound, outbound or both inbound and outbound.






    Note

    You cannot define secondary connections for IP-level primary protocols.





User Sets


In order to enable outbound access control, you can create Access Rules and apply them to specific Internet Protocol (IP) addresses or to specific users or groups of users. When Access Rules are applied to a user or group, the users will have to authenticate using the appropriate authentication protocol. The Firewall client always uses integrated authentication and always sends the user credentials transparently. The Web Proxy client can use a number of different authentication methods.

The ISA firewall allows you to group users and user groups together in User Sets or what we like to call 'firewall groups'. User sets include one or more users or groups from any authentication scheme supported by the ISA firewall. For example, a user set might include a Windows user, a user from a RADIUS namespace, and another user from the SecurID namespace. The Windows, RADIUS and SecurID namespaces all use different authentication schemes, but users from each of these can be included in a single User Set.

The ISA firewall comes preconfigured with the following user sets:



  • All Authenticated Users. This predefined user set represents all authenticated users, regardless of the method used to authenticate. An Access Rule using this set applies to authenticated users. When a rule applies to authenticated users, connections from SecureNAT clients will fail. An exception to this is when the SecureNAT client is also a VPN client. When a user creates a VPN connection to the ISA firewall, the VPN client automatically becomes a SecureNAT client. Although normally a SecureNAT client cannot send user credentials to the ISA firewall, when the SecureNAT client is also a VPN client, the VPN log on credentials can be used to authenticate the user.



  • All Users. This predefined User Set represents all users. A rule defined using this set will apply to all users, both authenticated and unauthenticated, and no credentials are required to access a rule configured to use this User Set. However, the Firewall client will always send credentials to the ISA firewall, even when authentication is not required. You'll see this in effect in the Microsoft Internet Security and Acceleration Server 2004 management console, in the Sessions tab when a user name has a question mark next to it.



  • System and Network Service. This pre-built User Set represents the Local System service and the Network service on the ISA firewall machine itself. This User Set is used in some System Policy Rules.




Content Types


Content types specify Multipurpose Internet Mail Extensions (MIME) types and file extensions. When you create an access rule that applies to the HTTP protocol, you can limit what Content Types the Access Rule applies to. Content Type control allows you to be very granular when configuring Access Policy because you can control access not only on a protocol and destination basis, but also by specific content.

Content Type control only works with HTTP and tunneled FTP traffic. Content Type control will not work with FTP traffic that isn't handled by the ISA firewall's Web Proxy filter.

When an FTP request is made by a host on an ISA firewall Protected Network, the ISA firewall will check the file extension in the request. The ISA firewall then determines if the rule applies to a Content Type that includes the requested file extension and processes the rule accordingly. If the Content Type doesn't match, then the rule is ignored and the next rule in the Access Policy is checked.

When a host on an ISA firewall Protected Network makes an outbound HTTP request, the ISA firewall sends the request to the Web server via the Web Proxy filter (by default). When the Web server returns the requested Web object, the ISA firewall checks the object's MIME type (which is found in the HTTP header information) or its file extension (depending on the header information returned by the Web server.) The ISA firewall determines if the rule applies to the specified Content Type including the requested file extension, and processes the rule accordingly.

The ISA firewall comes with a pre-built list of Content Types that you can use right out of the box. You can also create your own Content Types. When you create your own Content Types, you should specify both MIME type and file extension.

For example, to include all Director files in a content type, select the following file name extensions and MIME types:



  • .dir



  • .dxr



  • .dcr



  • application/x-director



You can use an asterisk (*) as a wildcard character when configuring a MIME type. For example, to include all application types, enter application/*.






Tip

The wildcard character can be used only with MIME types. You cannot use wildcards for file extensions. You can use the wildcard only once and that is at the end of the MIME type after the slash (/).


The ISA firewall comes with the following pre-built Content Types:



  • Application



  • Application data files



  • Audio,



  • Compressed files



  • Documents



  • HTML documents



  • Images



  • Macro documents



  • Text



  • Video



  • VRML.



Controlling access via MIME type can be challenging because different MIME types are associated with different file name extensions. The reason for this is that the Web server controls the MIME type associated with the Web object returned to the user. While there is general agreement on how MIME types are defined, a Web site administrator has complete control over the MIME type associated with any content hosted by his Web server. Because of this, you will sometimes see that content that you had thought you had blocked using Content Types is not blocked. You can determine the MIME type used by the Web server returning the response by doing a Network Monitor trace. The HTTP header will show the MIME type returned by the Web server for the Web content requested by the requesting client.

The following table lists the Internet Information Services (IIS) default associations. You can use these for general reference.








































































































































































































































































































































































































































































Table 7.1: Default IIS MIME Types for common file extensions

File name extension


MIME type


.hta


application/hta


.isp


application/x-internet-signup


.crd


application/x-mscardfile


.pmc


application/x-perfmon


.spc


application/x-pkcs7-certificates


.sv4crc


application/x-sv4crc


.bin


application/octet-stream


.clp


application/x-msclip


.mny


application/x-msmoney


.p7r


application/x-pkcs7-certreqresp


.evy


application/envoy


.p7s


application/pkcs7-signature


.eps


application/postscript


.setreg


application/set-registration-initiation


.xlm


application/vnd.ms-excel


.cpio


application/x-cpio


.dvi


application/x-dvi


.p7b


application/x-pkcs7-certificates


.doc


application/msword


.dot


application/msword


.p7c


application/pkcs7-mime


.ps


application/postscript


.wps


application/vnd.ms-works


.csh


application/x-csh


.iii


application/x-iphone


.pmw


application/x-perfmon


.man


application/x-troff-man


.hdf


application/x-hdf


.mvb


application/x-msmediaview


.texi


application/x-texinfo


.setpay


application/set-payment-initiation


.stl


application/vndms-pkistl


.mdb


application/x-msaccess


.oda


application/oda


.hlp


application/winhlp


.nc


application/x-netcdf


.sh


application/x-sh


.shar


application/x-shar


.tcl


application/x-tcl


.ms


application/x-troff-ms


.ods


application/oleobject


.axs


application/olescript


.xla


application/vnd.ms-excel


.mpp


application/vnd.ms-project


.dir


application/x-director


.sit


application/x-stuffit


.*


application/octet-stream


.crl


application/pkix-crl


.ai


application/postscript


.xls


application/vnd.ms-excel


.wks


application/vnd.ms-works


.ins


application/x-internet-signup


.pub


application/x-mspublisher


.wri


application/x-mswrite


.spl


application/futuresplash


.hqx


application/mac-binhex40


.p10


application/pkcs10


.xlc


application/vnd.ms-excel


.xlt


application/vnd.ms-excel


.dxr


application/x-director


.js


application/x-javascript


.m13


application/x-msmediaview


.trm


application/x-msterminal


.pml


application/x-perfmon


.me


application/x-troff-me


.wcm


application/vnd.ms-works


.latex


application/x-latex


.m14


application/x-msmediaview


.wmf


application/x-msmetafile


.cer


application/x-x509-ca-cert


.zip


application/x-zip-compressed


.p12


application/x-pkcs12


.pfx


application/x-pkcs12


.der


application/x-x509-ca-cert


.pdf


application/pdf


.xlw


application/vnd.ms-excel


.texinfo


application/x-texinfo


.p7m


application/pkcs7-mime


.pps


application/vnd.ms-powerpoint


.dcr


application/x-director


.gtar


application/x-gtar


.sct


text/scriptlet


.fif


application/fractals


.exe


application/octet-stream


.ppt


application/vnd.ms-powerpoint


.sst


application/vndms-pkicertstore


.pko


application/vndms-pkipko


.scd


application/x-msschedule


.tar


application/x-tar


.roff


application/x-troff


.t


application/x-troff


.prf


application/pics-rules


.rtf


application/rtf


.pot


application/vnd.ms-powerpoint


.wdb


application/vnd.ms-works


.bcpio


application/x-bcpio


.dll


application/x-msdownload


.pma


application/x-perfmon


.pmr


application/x-perfmon


.tr


application/x-troff


.src


application/x-wais-source


.acx


application/internet-property-stream


.cat


application/vndms-pkiseccat


.cdf


application/x-cdf


.tgz


application/x-compressed


.sv4cpio


application/x-sv4cpio


.tex


application/x-tex


.ustar


application/x-ustar


.crt


application/x-x509-ca-cert


.ra


audio/x-pn-realaudio


.mid


audio/mid


.au


audio/basic


.snd


audio/basic


.wav


audio/wav


.aifc


audio/aiff


.m3u


audio/x-mpegurl


.ram


audio/x-pn-realaudio


.aiff


audio/aiff


.rmi


audio/mid


.aif


audio/x-aiff


.mp3


audio/mpeg


.gz


application/x-gzip


.z


application/x-compress


.tsv


text/tab-separated-values


.xml


text/xml


.323


text/h323


.htt


text/webviewhtml


.stm


text/html


l


text/html


.xsl


text/xml



text/html


.cod


image/cis-cod


.ief


image/ief


.pbm


image/x-portable-bitmap


.tiff


image/tiff


.ppm


image/x-portable-pixmap


.rgb


image/x-rgb


.dib


image/bmp


.jpeg


image/jpeg


.cmx


image/x-cmx


.pnm


image/x-portable-anymap


.jpe


image/jpeg


.jfif


image/pjpeg


.tif


image/tiff


.jpg


image/jpeg


.xbm


image/x-xbitmap


.ras


image/x-cmu-raster


.gif


image/gif



Schedules


You can apply a Schedule to an Access Rule to control when the rule should be applied. There are three built-in schedules:



  • Work Hours Permits access between 09:00 (9:00 A.M.) and 17:00 (5:00 P.M.) on Monday through Friday (to this rule)



  • Weekends Permits access at all times on Saturday and Sunday (to this rule)



  • Always Permits access at all times (to this rule)



Note that rules can be allow or deny rules. The Schedules apply to all Access Rules, not just allow rules.






Warning

Schedules control only new connections that apply to an Access Rule. Connections that are already established are not affected by Schedules. For example, if you schedule access to a partner site during Work Hours, users will not be disconnected after 5PM. You will have to manually disconnect the users or script a restart of the firewall service.



Network Objects


Network Objects are used to control the source and destination of connections moving through the ISA firewall. We discussed the Network Objects Policy Elements in Chapter 4.

/ 145