Block web browser with IPSec

This tutorial will explain how to block browsing of certain computers to the Internet but still have access to sites on the intranet.

In this tutorial, I will show you how to block the browsing of a certain Windows 2000 / XP / 2003 computer to the Internet but still allow it to access sites in the internal network. the set.

Windows 2000 / XP / 2003 computers have a built-in IP security mechanism called IPSec (IP Security). IPSec is a protocol designed to protect TCP / IP data packets when they are transmitted in the network by using common key encryption. In essence, the source machine will package the standard IP address inside an encrypted IPSec. This packet will then be maintained in encrypted state until it reaches the destination machine.

In addition to the above feature, besides encryption, IPSec also allows you to protect and configure workstations and servers with a firewall-like mechanism.

However, you can block some users' Internet access but still allow them to use a web browser to surf sites in the intranet. Absolutely possible with IPSec.

You can do so simply by creating a policy to instruct the computer to block all IP traffic using HTTP and HTTPS, which are protocols using TCP ports 80 and 443 as are their destination ports. By blocking this specific traffic, you can block certain computers, not allowing them to browse the Internet.

However, blocking all HTTP and HTTPS traffic will prevent your users from accessing local sites.

One solution is to add a policy that allows HTTP and HTTPS traffic but only for a specific IP address, a DNS name of a specific computer or an entire subnet.

You can configure this policy by adjusting that computer's IPSec policy, or better yet, you can configure the policy as a Group Policy Object (GPO) on a Site, Domain, or Organization Unit (OU ) somehow. To configure a GPO, you must have the appropriate Active Directory.

To configure this action for a computer, you can follow these steps:

Configure filter list and filter actions

1. Open the MMC window ( Start> Run> MMC ).

2. Add IP Security and Policy Management Snap-In .

Block web browser with IPSec Picture 1Block web browser with IPSec Picture 1 Block web browser with IPSec Picture 2Block web browser with IPSec Picture 2

3. In the Select which computer this policy will manage window, select Local Computer (or whatever policies depend on your needs). Click Close and then click OK.

Block web browser with IPSec Picture 3Block web browser with IPSec Picture 3

4. Right-click IP Security Policies in the left pane of the MMC console. Select Manage IP Filter Lists and Filter Actions.

Block web browser with IPSec Picture 4Block web browser with IPSec Picture 4

5. In Manage IP Filter Lists and Filter actions , click Add .

Block web browser with IPSec Picture 5Block web browser with IPSec Picture 5

6. In the IP Filter List window, type a descriptive name (such as HTTP, HTTPS) and click Add to add new filters.

Block web browser with IPSec Picture 6Block web browser with IPSec Picture 6

7. In the welcome window, click Next .

8. In the description box, type the description information if you want, and then click Next .

Block web browser with IPSec Picture 7Block web browser with IPSec Picture 7

9. In the IP Traffic Source window, leave the My IP Address option selected and click Next .

Block web browser with IPSec Picture 8Block web browser with IPSec Picture 8

10. In the IP Traffic Destination window, to select Any IP Address option and click Next .

Block web browser with IPSec Picture 9Block web browser with IPSec Picture 9

See page 2


11. In the IP Protocol Type , scroll down to TCP and click Next .

Block web browser with IPSec Picture 10Block web browser with IPSec Picture 10

12. In IP Protocol Port , type 80 (for HTTP ) in the To This Post box and click Next .

Block web browser with IPSec Picture 11Block web browser with IPSec Picture 11

13. In the IP Filter List window, note how an IP Filter has been added . Now if you want, you can add HTTPS (Any IP to Any IP, Protocol TCP, Destination Port 443) in the same manner as above.

Block web browser with IPSec Picture 12Block web browser with IPSec Picture 12

14. Now that you have set up both filters, click OK .

Block web browser with IPSec Picture 13Block web browser with IPSec Picture 13

15. Go back to Manage IP Filter Lists and Filter actions , re-evaluate the filters (you can add or remove filters later). Now we are going to add a new filter to define the internal network traffic (INTRANET). Next, click Add .

Block web browser with IPSec Picture 14Block web browser with IPSec Picture 14

16. Set the appropriate name for the new filter - for example - Intranet , then proceed to configure the filter by clicking Add .

Block web browser with IPSec Picture 15Block web browser with IPSec Picture 15

17. In the IP Traffic Source window, leave the My IP Address option checked and click Next .

18. In IP Traffic Destination , click the drop-down list and select the destination type. For example, if you only want to allow web traffic from a web server on the local network (such as SERVER200 ), then select A Specific DNS Name .

Block web browser with IPSec Picture 16Block web browser with IPSec Picture 16

Then, in Host Name , type SERVER200 and click Next .

Block web browser with IPSec Picture 17Block web browser with IPSec Picture 17

If you want to allow web traffic from a local network subnet, such as 192.168.0.0/24 , select A Specific IP Subnet , and type in the Network ID and Subnet Mask for the required subnet. Click Next .

Block web browser with IPSec Picture 18Block web browser with IPSec Picture 18

19. Go back to the IP Filter list, add any other filters you want, and finally click OK .

Block web browser with IPSec Picture 19Block web browser with IPSec Picture 19

20. Go back to Manage IP Filter Lists and Filter actions , evaluate your filters and if all is ok, click the Manage Filter Actions tab. Now we need to add a filter action to block certain traffic, so click Add .

Block web browser with IPSec Picture 20Block web browser with IPSec Picture 20

21. In the Welcome screen, click Next .

22. In Filter Action Name type Block and click Next .

Block web browser with IPSec Picture 21Block web browser with IPSec Picture 21

23. In Filter Action General Options , click Block and then click Next .

Block web browser with IPSec Picture 22Block web browser with IPSec Picture 22

24. Go back to Manage IP Filter Lists and Filter actions , evaluate your filters, if all is ok, click the Close button. You can add Filters and Actions Filter anytime if you want.

Block web browser with IPSec Picture 23Block web browser with IPSec Picture 23

The next step is to configure IPSec Policy and assign it.

See page 3


Configure IPSec Policy

1. In the MMC interface, right-click IP Security Policies on the Local Computer and select Create IP Security Policy

Block web browser with IPSec Picture 24Block web browser with IPSec Picture 24

2. In the Welcome screen, click Next.

3. In the IP Security Policy Name , enter a descriptive name, such as " Block HTTP, HTTPS, allow Intranet ". Click Next .

Block web browser with IPSec Picture 25Block web browser with IPSec Picture 25

4. In the Request for Secure Communication window, uncheck the Active the Default Response Rule check box. Click Next.

Block web browser with IPSec Picture 26Block web browser with IPSec Picture 26

5. In the Completing IP Security Policy Wizard window, click Finish

Block web browser with IPSec Picture 27Block web browser with IPSec Picture 27

6. Now we need to add IP Filters and other Filter Actions to the new IPSec Policy . In the new IPSec Policy window, click Add to add IP Filters and Filter Actions

Block web browser with IPSec Picture 28Block web browser with IPSec Picture 28

7. In the welcome window, click Next.

8. In Tunnel Endpoint , make sure that the default settings are selected and click Next.

Block web browser with IPSec Picture 29Block web browser with IPSec Picture 29

9. In the Network Type window, select All Network Connections and click Next.

Block web browser with IPSec Picture 30Block web browser with IPSec Picture 30

10. In the IP Filter List window, select one of the pre-configured IP Filter, for example "HTTP, HTTPS" (configured in step 6 above the article). If for some reason, you did not properly configure the IP Filter beforehand, you can click Add and add it at this time. When done, click Next .

Block web browser with IPSec Picture 31Block web browser with IPSec Picture 31

11. In the Filter Action window, select one of the previously configured Filter Actions, for example "Block" (configured in step 20 above). Next, if you haven't configured the right Filter Action before, you can click Add and add it now. When done, click Next

Block web browser with IPSec Picture 32Block web browser with IPSec Picture 32

12. Back in the new IPSec Policy window, make sure that the new IP Filter is selected. Click Add to add additional IP Filters and Filter Actions just like you did above. In this example, we will add the "Intranet" IP Filter .

Block web browser with IPSec Picture 33Block web browser with IPSec Picture 33

Follow steps 7 to 11.

13. Add "Intranet" IP Filter .

Block web browser with IPSec Picture 34Block web browser with IPSec Picture 34

14. Configure it to use the Permit Filter Action .

Block web browser with IPSec Picture 35Block web browser with IPSec Picture 35

15. Notice how the two IP Filters are added .

Block web browser with IPSec Picture 36Block web browser with IPSec Picture 36

Note that you cannot change their order like in dedicated firewalls. However, this configuration works quite well.

The next stage is to assign the IPSec Policy.

Assign IPSec Policy

In the MMC interface, right-click on new IPSec Policy and select Assign.

Block web browser with IPSec Picture 37Block web browser with IPSec Picture 37

When done, you can test the configuration by trying to surf to a blocked Windows and a website is not blocked.

Lock multiple computers

Locking multiple computers can be done in two ways:

Export and Import IPSec Policy

Configure IPSec Policy through GPO

Both of these methods are used to prevent some computers from using ICMP (for other IPSec Policies).

4 ★ | 7 Vote