IT tutorials
 
Technology
 

Windows Small Business Server 2011 : Windows Firewall (part 1) - Firewall Rule Basics - Rule Definitions

10/28/2013 9:06:42 PM
- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019

The Windows Firewall in Windows Server 2008 R2 is the same basic firewall included in Windows 7 and adds many new features and capabilities compared to the Windows Firewall included in previous versions. These new features include outbound filtering; filtering based on SIDs; a better management UI; configuration for local, remote, local port, remote port, and protocol; and tight integration with IPsec. The other big change is location-specific policies. There are three separate firewall profiles: a domain profile, a private profile for computers that aren’t domain members but are on secured networks, and a public profile for computers that reside on publicly accessible networks. And, finally, per-user rules are now supported. Although these profiles aren’t terribly useful for the SBS server itself, which uses only the Domain Profile, the same profiles are used by Windows 7 and Windows Vista computers and can be enforced with Group Policy.

In SBS, the Windows Firewall is on by default. All of the wizards in SBS and Windows Server 2008 R2 that are used to add roles and features will automatically set the necessary Windows Firewall rule or rules to ensure proper functionality while still securing the server.

SBS 2003 R2 had a built-in firewall, but most of the wizards used to configure the server were not designed to configure the firewall, and most environments had the Windows Firewall disabled on servers, relying on an external firewall, or ISA 2004 on SBS Premium servers, to protect the network. In SBS 2011, the expectation is that the Windows Firewall remains enabled.

The Windows Server 2008 R2 Windows Firewall allows more granular control over the configuration and settings than previous versions. To open the Windows Firewall With Advanced Security console, shown in Figure 1, type wf.msc at the command prompt, click Windows Firewall With Advanced Security in the Administrative Tools folder, or open the Firewall Settings in the Security page of the Windows SBS Console.

Figure 1. The Windows Firewall With Advanced Security console



Warning:

IMPORTANT SBS configures the firewall automatically as part of the normal SBS wizards. You should only make changes directly with extreme caution. Know not only what problem you’re trying to solve, but why it isn’t automatically handled by the SBS wizards. And be sure you understand the security implications whenever you make a change.


Windows Firewall has three profiles: a Domain Profile, a Private Profile, and a Public Profile. Each profile can have different inbound and outbound rules as needed. To build a specific rule, click Inbound Rules or Outbound Rules and then click New Rule. Custom rules can be set for programs or for ports. The SBS server uses only the Domain Profile.

1. Setting Firewall Policies Using Group Policy

Use Group Policy to ensure a consistent application of Windows Firewall policies across the domain. Use the built-in Windows Management Instrumentation (WMI) filters of SBS Group Policy to set specific policies for different types of clients and servers.

2. Firewall Rule Basics

When building Windows Firewall rules, there are three possible actions for a connection that matches the rule:

  • Allow the connection.

  • Only allow a connection that is secured through the use of IPsec (authenticated bypass).

  • Explicitly block the connection.

The order of precedence for Windows Firewall rules is as follows:

  • Authenticated bypass

  • Block connection

  • Allow connection

  • Default profile behavior

This means that if you have a Block rule and an Allow rule, and your connection meets both criteria, the block rule will always win. By being as specific as possible with your rules, you have less likelihood of conflict and more direct control. Port rules are much more general than application rules and should be avoided whenever possible.

2.1. Rule Definitions

Building rule definitions is the process of building a combination of conditions and specific access types into a rule that either allows or disallows a connection.

Rules can be defined for

  • Programs Specific applications that are either allowed or disallowed by the rule

  • Ports General allow or disallow of a protocol through a port

  • Predefined Preconfigured and well-known services and programs

  • Custom Can combine programs, ports, and specific interfaces into a custom rule

Rules can allow or disallow traffic to or from programs, system services, computers, or users.

Rules can use protocol values of

  • Any

  • Internet Assigned Numbers Authority (IANA) IP protocol numbers

  • TCP

  • UDP

  • ICMPv4

  • ICMPv6

  • Others including IGMP, HOPOPT, GRE, IPv6-NoNxt, IPV6-Opts, VRRP, PGM, L2TP, IPv6-Route, IPv6-Frag

Rules for local ports (UDP or TCP) can include

  • All Ports

  • Specific Ports (comma-separated list)

  • Dynamic RPC

  • RPC Endpoint Mapper

  • Edge Traversal

Rules for Remote Ports (TCP and UDP) can include

  • All Ports

  • Specific Ports (comma-separated list)

Rules for ICMP traffic (ICMPv4 and ICMPv6) can be

  • All ICMP types

  • Specific types of ICMP traffic

Rules can be for a Local IP address scope of

  • Specific IPv4 or v6 address or list of addresses

  • Range of IPv4 or v6 addresses or list of ranges

  • Entire IPv4 or v6 subnet or list of subnets

Rules can be for a remote IP address scope of

  • Specific IPv4 or v6 address or list of addresses

  • Range of IPv4 or v6 addresses or list of ranges

  • Entire IPv4 or v6 subnet or list of subnets

  • Predefined set of computers (local subnet, default gateway, DNS servers, WINS servers, DNS servers or a list of such items)

Rules can specify an interface type of

  • All interface types

  • Local area network

  • Remote access

  • Wireless

Rules can include program types of

  • All programs

  • System (a special keyword that restricts traffic to the system process)

  • Specific path and .exe name to an executable

Rules for services can

  • Apply to all programs and services

  • Apply to services only

  • Apply to a specified service

There are three predefined special local ports

  • Dynamic RPC is used by applications and services that receive dynamic RPC traffic over TCP. (Does not include traffic over named pipes.)

  • RPC Endpoint Mapper is used only with the RPCSS service and allows traffic to the endpoint mapper.

  • Edge Traversal is used only with the iphlpsvc (Teredo) service and allows the traffic to be decapsulated by the Teredo service on a dynamic port.

Additional rules can be set to allow only secure connections. For secure connections you can specify that the connection

  • Require encryption

  • Allow connections only from specified computers in Active Directory

  • Allow connections only from specified users or security groups in Active Directory


Warning:

Whenever possible, resist the temptation to create specific Windows Firewall rules for specific computers or users. Although it is technically possible, it can quickly become a management and documentation nightmare. Use the SBS security groups and OUs to control firewalls. This is flexible and easy to maintain, and can be easily documented.

 
Others
 
- Windows Small Business Server 2011 : Managing Local Connectivity - Wireless Connectivity
- Microsoft Dynamic AX 2009 : .Performance (part 8) - Transaction Performance - Limiting Field Lists
- Microsoft Dynamic AX 2009 : .Performance (part 7) - Transaction Performance - Caching - The EntireTable Cache , The RecordViewCache Class
- Microsoft Dynamic AX 2009 : .Performance (part 6) - Transaction Performance - Caching - Record Caches
- Microsoft Dynamic AX 2009 : .Performance (part 6) - Transaction Performance - Set-Based Data Manipulation Operators - The RecordInsertList and RecordSortedList Classes
- Microsoft Dynamic AX 2009 : .Performance (part 5) - Transaction Performance - Set-Based Data Manipulation Operators - The RecordInsertList and RecordSortedList Classes
- Microsoft Dynamic AX 2009 : .Performance (part 4) - Transaction Performance - Set-Based Data Manipulation Operators - The delete_from Operator
- Microsoft Dynamic AX 2009 : .Performance (part 3) - Transaction Performance - Set-Based Data Manipulation Operators - The update_recordset Operator
- Microsoft Dynamic AX 2009 : .Performance (part 2) - Transaction Performance - Set-Based Data Manipulation Operators - The insert_recordset Operator
- Microsoft Dynamic AX 2009 : .Performance (part 1) - Reducing Round-Trips Between the Client and the Server
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
Technology FAQ
- Is possible to just to use a wireless router to extend wireless access to wireless access points?
- Ruby - Insert Struct to MySql
- how to find my Symantec pcAnywhere serial number
- About direct X / Open GL issue
- How to determine eclipse version?
- What SAN cert Exchange 2010 for UM, OA?
- How do I populate a SQL Express table from Excel file?
- code for express check out with Paypal.
- Problem with Templated User Control
- ShellExecute SW_HIDE
programming4us programming4us