Securing the Perimeter – Exchange and VPN Access with ISA Server 2004 Jamie Sharp CISSP Security Advisor Amit Pawar National Technology Specialist Microsoft.

Slides:



Advertisements
Similar presentations
Enabling Secure Internet Access with ISA Server
Advertisements

Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
Module 10: Troubleshooting Network Access. Overview Troubleshooting Network Access Resources Troubleshooting LAN Authentication Troubleshooting Remote.
Module 5: Configuring Access to Internal Resources.
Module 5: Configuring Access for Remote Clients and Networks.
Network Isolation Using Group Policy and IPSec Paula Kiernan Senior Consultant Ward Solutions.
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Introduction to ISA 2004 Dana Epp Microsoft Security MVP.
Module 10: Configuring Virtual Private Network Access for Remote Clients and Networks.
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 14: Troubleshooting Remote Connections.
Hands-On Microsoft Windows Server 2003 Administration Chapter 11 Administering Remote Access Services.
70-270, MCSE/MCSA Guide to Installing and Managing Microsoft Windows XP Professional and Windows Server 2003 Chapter Twelve Implementing Terminal.
Installing and Maintaining ISA Server. Planning an ISA Server Deployment Understand the current network infrastructure Review company security policies.
1 Integrating ISA Server and Exchange Server. 2 How works.
Virtual Private Network (VPN) © N. Ganesan, Ph.D..
1 Enabling Secure Internet Access with ISA Server.
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 14 Remote Access.
1 Advanced Application and Web Filtering. 2 Common security attacks Finding a way into the network Exploiting software bugs, buffer overflows Denial of.
Chapter 6 Configuring, Monitoring & Troubleshooting IPsec
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Securing Exchange Server Session Goals: Introduce you to the concepts and mechanisms for securing Exchange Examine the techniques and tools.
Network Services Lesson 6. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Setting up common networking services Understanding.
Managing Client Access
Module 4 Managing Client Access. Module Overview Configuring the Client Access Server Role Configuring Client Access Services for Outlook Clients Configuring.
Course 201 – Administration, Content Inspection and SSL VPN
Working with Applications Lesson 7. Objectives Administer Internet Explorer Secure Internet Explorer Configure Application Compatibility Configure Application.
Configuring a Web Server. Overview Overview of IIS Preparing for an IIS Installation Installing IIS Configuring a Web Site Administering IIS Troubleshooting.
Module 8: Managing Client Configuration and Connectivity.
Module 8: Configuring Virtual Private Network Access for Remote Clients and Networks.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
Securing Microsoft® Exchange Server 2010
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
1 Overview of Microsoft ISA Server Introducing ISA Server Protects resourcesProtects resources Connects directly to the Internet and your private.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
Module 9: Configuring IPsec. Module Overview Overview of IPsec Configuring Connection Security Rules Configuring IPsec NAP Enforcement.
Module 4: Configuring ISA Server as a Firewall. Overview Using ISA Server as a Firewall Examining Perimeter Networks and Templates Configuring System.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Module 11: Remote Access Fundamentals
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
Module 4 Planning and Deploying Client Access Services in Microsoft® Exchange Server 2010 Presentation: 120 minutes Lab: 90 minutes After completing.
Module 11: Implementing ISA Server 2004 Enterprise Edition.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Overview of Microsoft ISA Server. Introducing ISA Server New Product—Proxy Server In 1996, Netscape had begun to sell a web proxy product, which optimized.
Module 6: Integrating ISA Server 2004 and Microsoft Exchange Server.
Module 6: Managing Client Access. Overview Implementing Client Access Servers Implementing Client Access Features Implementing Outlook Web Access Introduction.
Extending ISA/IAG beyond the limit. AGAT Security suite - introduction AGAT Security suite is a set of unique components that allow extending ISA / IAG.
TNT ISA Server 2004 Technical Overview What we will cover:  Improvements over ISA Server 2000  Exploring the new user interface  Configuring.
Security fundamentals Topic 10 Securing the network perimeter.
Module 10: Windows Firewall and Caching Fundamentals.
SEC304 Enhancing Exchange, OWA and IIS Security with ISA Server Feature Pack 1 Steve Riley Microsoft Corporation
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
Securing the Network Perimeter with ISA Server 2004 Ravi Sankar IT Professional Evangelist Microsoft.
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
Group Policy in Windows Vista. Group Policy Administration Group Policy with Windows Vista QoS Policies What Will We Cover?
Securing Access to Data Using IPsec Josh Jones Cosc352.
VIRTUAL SERVERS Chapter 7. 2 OVERVIEW Exchange Server 2003 virtual servers Virtual servers in a clustering environment Creating additional virtual servers.
Virtual Private Network Access for Remote Networks
Module 3: Enabling Access to Internet Resources
Enabling Secure Internet Access with TMG
Securing the Network Perimeter with ISA 2004
Configuring and Troubleshooting Routing and Remote Access
Implementing TMG Server Publishing
Configuring TMG as a Firewall
Server-to-Client Remote Access and DirectAccess
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

Securing the Perimeter – Exchange and VPN Access with ISA Server 2004 Jamie Sharp CISSP Security Advisor Amit Pawar National Technology Specialist Microsoft Australia

Session Overview  Introduction to ISA Server 2004  Securing Access to Internal Servers  Implementing Application and Web Filtering  Securing Access to Exchange Server  Virtual Private Networking with ISA Server 2004

Introduction to ISA Server 2004  Introduction to ISA Server 2004  Securing Access to Internal Servers  Implementing Application and Web Filtering  Securing Access to Exchange Server  Virtual Private Networking with ISA Server 2004

Securing the Network Perimeter: What Are the Challenges? Internet Main office Remote user Business partner Branch office Wireless Challenges Include: Determining proper firewall design Access to resources for remote users Effective monitoring and reporting Need for enhanced packet inspection Security standards compliance Challenges Include: Determining proper firewall design Access to resources for remote users Effective monitoring and reporting Need for enhanced packet inspection Security standards compliance

Securing the Network Perimeter: What Are the Design Options? Back-to-back configuration Bastion host Three-legged configuration Web server Internal network Perimeter network Internet Internal network Perimeter network

Configuring ISA Server to Secure the Network Perimeter Use ISA Server to:  Provide firewall functionality  Publish internal resources such as Web or Exchange servers  Implement multilayer packet inspection and filtering  Provide VPN access for remote users and sites  Provide proxy and caching services LAN Server User Remote User VPN Internet Exchange Server Web Server ISA Server Web Server

ISA Server 2004 Default Configuration The ISA Server default configuration blocks all network traffic between networks connected to ISA Server No servers are published Access rules include system policy rules and the default access rule Only members of the local Administrators group have administrative permissions Default networks are created Caching is disabled The Firewall Client Installation Share is accessible if installed

Configuring Access Rules Types of access rule elements used to create access rules are: Protocols User sets Content types Schedules Network objects Types of access rule elements used to create access rules are: Protocols User sets Content types Schedules Network objects Allow Deny Allow Deny User Destination network Destination IP Destination site Destination network Destination IP Destination site Protocol IP port/type Protocol IP port/type Source network Source IP Source network Source IP Schedule Content type Schedule Content type an action on traffic from user from source to destination with conditions Access rules always define:

Implementing Network Templates to Configure ISA Server 2004 Deploy the Single Network Adapter template for Web proxy and caching only Back-to-back configuration Bastion host Three-legged configuration Web server Internal network Perimeter network Deploy the Edge Firewall template Deploy the Front End or Back End template Deploy the Front End or Back End template Deploy the 3-Leg Perimeter template Deploy the 3-Leg Perimeter template Internet

Demonstration: Applying a Network Template  Use a network template to configure ISA Server 2004 as an edge firewall

Deploying ISA Server 2004: Best Practices To deploy ISA Server to provide Internet access: Plan for DNS name resolution Create the required access rule elements and configure the access rules Plan the access rule order Implement the appropriate authentication mechanisms Test access rules before deployment Deploy the Firewall Client for maximum security and functionality Use ISA Server logging to troubleshoot Internet connectivity issues Plan for DNS name resolution Create the required access rule elements and configure the access rules Plan the access rule order Implement the appropriate authentication mechanisms Test access rules before deployment Deploy the Firewall Client for maximum security and functionality Use ISA Server logging to troubleshoot Internet connectivity issues

Securing Access to Internal Servers  Introduction to ISA Server 2004  Securing Access to Internal Servers  Implementing Application and Web Filtering  Securing Access to Exchange Server  Virtual Private Networking with ISA Server 2004

What Is ISA Server Publishing? ISA Server enables three types of publishing rules: 1. Web publishing rules for publishing Web sites using HTTP 2. Secure Web publishing rules for publishing Web sites that require SSL for encryption 3. Server publishing rules for publishing servers that do not use HTTP or HTTPS 1. Web publishing rules for publishing Web sites using HTTP 2. Secure Web publishing rules for publishing Web sites that require SSL for encryption 3. Server publishing rules for publishing servers that do not use HTTP or HTTPS

Implementing ISA Server Web Publishing Rules To create a Web publishing rule, configure: Action Name or IP address Users Traffic source Public name Action Name or IP address Users Traffic source Public name Web listener Path mappings Bridging Link translation Web listener Path mappings Bridging Link translation

Implementing ISA Server Secure Web Publishing Rules To create a secure Web publishing rule: Choose an SSL bridging mode or SSL tunneling Install a digital certificate on ISA Server, on a Web server, or on both Configure a Web listener for SSL Configure a secure Web publishing rule Choose an SSL bridging mode or SSL tunneling Install a digital certificate on ISA Server, on a Web server, or on both Configure a Web listener for SSL Configure a secure Web publishing rule

Demonstration: Configuring a Secure Web Publishing Rule  Configure a secure Web publishing rule to an internal Web server

Implementing Server Publishing Rules To create a server publishing rule, configure: Action Traffic Traffic source Traffic destination Networks Action Traffic Traffic source Traffic destination Networks To enable secure server publishing, configure ISA Server to publish a secure protocol, and then install a server certificate on the published server

Implementing Application and Web Filtering  Introduction to ISA Server 2004  Securing Access to Internal Servers  Implementing Application and Web Filtering  Securing Access to Exchange Server  Virtual Private Networking with ISA Server 2004

Firewall Requirements: Multiple-Layer Filtering Packet filtering: Filters packets based on information in the network and transport layer headers Enables fast packet inspection, but cannot detect higher-level attacks Filters packets based on information in the network and transport layer headers Enables fast packet inspection, but cannot detect higher-level attacks Stateful filtering: Filters packets based on the TCP session information Ensures that only packets that are part of a valid session are accepted, but cannot inspect application data Filters packets based on the TCP session information Ensures that only packets that are part of a valid session are accepted, but cannot inspect application data Application filtering: Filters packets based on the application payload in network packets Can prevent malicious attacks and enforce user policies Filters packets based on the application payload in network packets Can prevent malicious attacks and enforce user policies

Use HTTP Web filtering to: Filter traffic from internal clients to other networks Filter traffic from Internet clients to internal Web servers Filter traffic from internal clients to other networks Filter traffic from Internet clients to internal Web servers Implementing HTTP Web Filtering in ISA Server 2004 HTTP Web filtering can block HTTP packets based on: Length of request headers and payload Length of URL HTTP request method HTTP request file name extension HTTP request or response header Signature or pattern in the response header or body Length of request headers and payload Length of URL HTTP request method HTTP request file name extension HTTP request or response header Signature or pattern in the response header or body HTTP Web filtering is rule-specific—you can configure different filters for each access or publishing rule

Demonstration: Application Filtering in ISA Server 2004  Edit the default application filtering that is performed by ISA Server 2004

Securing Access to Exchange Server  Introduction to ISA Server 2004  Securing Access to Internal Servers  Implementing Application and Web Filtering  Securing Access to Exchange Server  Virtual Private Networking with ISA Server 2004

Secure Client Access to Exchange Server Challenges Outlook Mobile Access XHTML, cHTML, HTML ActiveSync-Enabled mobile devices Wireless network Wireless network ISA server Outlook Web Access Outlook using RPC Outlook using RPC over HTTP Outlook express using IMAP4 or POP3 Outlook Web Access Outlook using RPC Outlook using RPC over HTTP Outlook express using IMAP4 or POP3 Exchange front-end server Exchange front-end server Exchange back-end servers Exchange back-end servers

Configuring RPC over HTTP Client Access RPC over HTTP requires: Exchange Server 2003 running on Windows Server 2003 and Windows Server 2003 global catalog servers Outlook 2003 running on Windows XP Windows Server 2003 server running RPC proxy server Modifying the Outlook profile to use RPC over HTTP to connect to the Exchange server To enable RPC over HTTP connections through ISA Server, use the Secure Web Publishing Wizard to publish the /rpc/*virtual directory

Configuring ISA Server for Outlook Web Access To configure ISA Server to enable OWA access: Use the Mail Server Publishing Wizard to publish the OWA server 1 1 Configure a bridging mode. For best security, secure the connection from client to ISA Server and from ISA Server to OWA server 2 2 Configure a Web listener for OWA publishing. Choose forms-based authentication for the Web listener 3 3 Forms-based authentication ensures that user credentials are not stored on the client computer; can be used to block access to attachments

Demonstration: Configuring Outlook Web Access  Configure an OWA publishing rule

Securing Access to Exchange Server: Best Practices Enable Outlook RPC connections for pre–Exchange Server 2003 and Outlook 2003 environments Use forms-based authentication on ISA Server for OWA Implement RPC over HTTPS with SSL Explore the use of additional ISA Server features to protect computers running Exchange Server Consider third-party add-ons for ISA Server to protect computers running Exchange Server

Virtual Private Networking with ISA Server 2004  Introduction to ISA Server 2004  Securing Access to Internal Servers  Implementing Application and Web Filtering  Securing Access to Exchange Server  Virtual Private Networking with ISA Server 2004

Virtual Private Networking: What Are the Challenges? VPNs provide a secure option for communicating across a public network VPNS are used in two primary scenarios: VPNs provide a secure option for communicating across a public network VPNS are used in two primary scenarios: Network access for remote clients Network access between sites Network access for remote clients Network access between sites VPN quarantine control provides an additional level of security by providing the ability to check the configuration of the VPN client machines before allowing them access to the organization’s network

Enabling Virtual Private Networking with ISA Server ISA Server enables VPN access: By including remote-client VPN access for individual clients and site-to-site VPN access to connect multiple sites By enabling VPN-specific networks, including:  VPN Clients network  Quarantined VPN Clients network  Remote-site network By using network and access rules to limit network traffic between the VPN networks and the other networks with servers running ISA Server By extending RRAS functionality By including remote-client VPN access for individual clients and site-to-site VPN access to connect multiple sites By enabling VPN-specific networks, including:  VPN Clients network  Quarantined VPN Clients network  Remote-site network By using network and access rules to limit network traffic between the VPN networks and the other networks with servers running ISA Server By extending RRAS functionality

Enabling VPN Client Connections To enable VPN client connections: Choose a tunneling protocol Choose an authentication protocol Use MS-CHAP v2 or EAP if possible Enable VPN client access in ISA Server Management Configure user accounts for remote access Configure remote-access settings Configure firewall access rules for the VPN Clients network Choose a tunneling protocol Choose an authentication protocol Use MS-CHAP v2 or EAP if possible Enable VPN client access in ISA Server Management Configure user accounts for remote access Configure remote-access settings Configure firewall access rules for the VPN Clients network

Implementing Site-to-Site VPN Connections To enable site-to-site VPN connections: Choose a tunneling protocol Configure the remote-site network Configure network rules and access rules to enable: open communications between networks, or controlled communications between networks Configure the remote-site VPN gateway Choose a tunneling protocol Configure the remote-site network Configure network rules and access rules to enable: open communications between networks, or controlled communications between networks Configure the remote-site VPN gateway

How Does Network Quarantine Work? ISA Server DNS Server Web Server Domain Controller File Server Quarantine script VPN Quarantine Clients Network VPN Clients Network RQC.exe Quarantine remote access policy ISA server DNS server Web server Domain controller File server Quarantine script Quarantined VPN Clients Network VPN clients network Rqc.exe Quarantine remote access policy

Implementing Network Quarantine To implement quarantine control on ISA Server: Enable quarantine control on ISA Server Create and install a listener component Configure network rules and access rules for the Quarantined VPN Clients network Use CMAK to create a CM profile for remote-access clients Create a client-side script that validates client configuration

Configuring VPN Access Using ISA Server: Best Practices Use strongest possible authentication protocols Enforce the use of strong passwords when using PPTP Avoid the use of pre-shared keys for L2TP/IPSec Configure access rules to control access for VPN clients and site-to-site VPN connections Use access rules to provide quarantined VPN clients with the means to meet the security requirements

Session Summary ISA Server 2004 is secure by default because it blocks all traffic—configure access rules to provide the fewest possible access rights Many applications now use HTTP as a tunneling protocol—use HTTP filtering to block the applications Implement ISA Server publishing rules to make internal resources accessible from the Internet Implementing Outlook RPC publishing and RPC over HTTP publishing means that users can use Outlook from anywhere Use access rules to limit access for VPN remote-access clients, site-to-site VPN clients, and network quarantine clients

ISA Server 2004 Resources  ISAServer.org –  FREE! TechNet Virtual Lab: ISA Server  ert/virtuallab/isa.mspx ert/virtuallab/isa.mspx ert/virtuallab/isa.mspx  How to use the ISA Server 2004 migration tool to migrate from ISA Server 2000 to ISA Server 2004  ISA Server 2000 settings and features that are not supported when you migrate to ISA Server 2004

For More Information…  The official ISA Server site:   A useful site with a wealth of information: 

What is TechNet?  Put the right answers at your fingertips  The comprehensive collection of resources to help IT pros plan, deploy and manage Microsoft products successfully  Comprehensive set of resources delivered reliably every month on CD or DVD –The trusted resource for guidance, tools and software to efficiently evaluate, deploy and support Microsoft technologies. TechNet Subscription  Accessible at  Online resources and community  Subscriber-only Online Services TechNet Web Site  Biweekly e-newsletter  Security updates, new resources, and special offers TechNet Flash  Briefings on the latest Microsoft products and technologies  Hands-on, “how to” information TechNet Events and Webcasts  User Groups  Managed Newsgroups TechNet Communities

Connect with TechNet  Free Technical Briefings:  TechNet Webcasts:  TechNet Flash Newsletter:  TechNet Online:  Security Notification Service Sign-Up:  TechNet Subscription*: * Microsoft TechNet Subscription Giveaway Complete the webcast survey to be entered to win a one year TechNet Plus subscription. See the official rules for details. Microsoft’s TechNet programs provide IT professionals with high- quality, how-to information and resources to efficiently evaluate, deploy, maintain and support their Microsoft technology. To learn more, subscribe, or attend a free briefing, please visit:

Questions and Answers  Submit text questions using the “Ask a Question” button  Don’t forget to fill out the survey  For upcoming and recordings of previous webcasts:  Have webcast content ideas? Send us at:

/WelcomePage.aspx?EventID=...  [Live Meeting Web Page. Use Live Meeting > Edit Slide Properties... to edit.]