> Can ya provide some insight here Dave....I took a look at the 
> IP Security Policy GUI and honestly didn't know what I was 
> looking at.  If it helps our setup is simple (and yes the 
> network is small...dev web server....file server...6 
> workstations.  We are using DSL with a D-Link router.
> 
> I'm just not sure what I should block/allow?  I assume I do 
> it by adding my own policies?

Well, the first step is to figure out what traffic you want to allow. As
Jochem said, you'll want to deny everything, then specifically allow that
traffic. So, what services do you host on that machine? What machines does
that machine need to talk to, and why?

Let's say, for example, that you have a web/application server. You probably
need access to some or all of the filesystem, although you may be able to
limit that access to machines on your internal network. Your filesystem
access might be through FTP, or CIFS (Windows Networking). Your web/app
server, in turn, might need to access a SQL Server database server on your
local network, and you might want to be able to download patches directly
from MS to that server.

So, that gives us a working list of services, from which we can determine a
list of allowed ports, inbound and outbound.

Inbound:
Web server - TCP/80, TCP/443 from everywhere
File server - appropriate NetBIOS over IP ports, or DirectHost port, from
internal network

Outbound:
SQL Server - TCP/1433 to database server
Windows Update - TCP/80, TCP/443 to MS update servers

Now, of course, it's very important to determine exactly what services your
machine will provide, and what services it will need to use. For example, in
the above case, your server wouldn't be able to find out the names of the
database server, or the MS update servers, because we haven't included
access to DNS. This might be intentional, in which case you'd have to figure
out the appropriate IP addresses and put them directly on the server where
needed. Also, your server won't be able to ping any other machines, nor will
it be pingable itself. Again, this might be intentional, but you need to be
aware of it.

Here's a tutorial on how to use the GUI:
http://homepages.wmich.edu/~mchugha/w2kfirewall.htm

As Jochem mentioned, you can also do this with the netsh command-line tool,
but I don't have a link handy for that.

Dave Watts, CTO, Fig Leaf Software
http://www.figleaf.com/

Fig Leaf Software provides the highest caliber vendor-authorized
instruction at our training centers in Washington DC, Atlanta,
Chicago, Baltimore, Northern Virginia, or on-site at your location.
Visit http://training.figleaf.com/ for more information!


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~|
Message: http://www.houseoffusion.com/lists.cfm/link=i:4:243346
Archives: http://www.houseoffusion.com/cf_lists/threads.cfm/4
Subscription: http://www.houseoffusion.com/lists.cfm/link=s:4
Unsubscribe: http://www.houseoffusion.com/cf_lists/unsubscribe.cfm?user=89.70.4
Donations & Support: http://www.houseoffusion.com/tiny.cfm/54

Reply via email to