Block web browser with IPSec

This tutorial will explain how to block browsing of certain computers to the Internet but still have access to sites on the intranet.

In this tutorial, I will show you how to block the browsing of a certain Windows 2000 / XP / 2003 computer to the Internet but still allow it to access sites in the internal network. the set.

Windows 2000 / XP / 2003 computers have a built-in IP security mechanism called IPSec (IP Security). IPSec is a protocol designed to protect TCP / IP data packets when they are transmitted in the network by using common key encryption. In essence, the source machine will package the standard IP address inside an encrypted IPSec. This packet will then be maintained in encrypted state until it reaches the destination machine.

In addition to the above feature, besides encryption, IPSec also allows you to protect and configure workstations and servers with a firewall-like mechanism.

However, you can block some users' Internet access but still allow them to use a web browser to surf sites in the intranet. Absolutely possible with IPSec.

You can do so simply by creating a policy to instruct the computer to block all IP traffic using HTTP and HTTPS, which are protocols using TCP ports 80 and 443 as are their destination ports. By blocking this specific traffic, you can block certain computers, not allowing them to browse the Internet.

However, blocking all HTTP and HTTPS traffic will prevent your users from accessing local sites.

One solution is to add a policy that allows HTTP and HTTPS traffic but only for a specific IP address, a DNS name of a specific computer or an entire subnet.

You can configure this policy by adjusting that computer's IPSec policy, or better yet, you can configure the policy as a Group Policy Object (GPO) on a Site, Domain, or Organization Unit (OU ) somehow. To configure a GPO, you must have the appropriate Active Directory.

To configure this action for a computer, you can follow these steps:

Configure filter list and filter actions

1. Open the MMC window ( Start> Run> MMC ).

2. Add IP Security and Policy Management Snap-In .

Picture 1 of Block web browser with IPSec
Picture 2 of Block web browser with IPSec

3. In the Select which computer this policy will manage window, select Local Computer (or whatever policies depend on your needs). Click Close and then click OK.

Picture 3 of Block web browser with IPSec

4. Right-click IP Security Policies in the left pane of the MMC console. Select Manage IP Filter Lists and Filter Actions.

Picture 4 of Block web browser with IPSec

5. In Manage IP Filter Lists and Filter actions , click Add .

Picture 5 of Block web browser with IPSec

6. In the IP Filter List window, type a descriptive name (such as HTTP, HTTPS) and click Add to add new filters.

Picture 6 of Block web browser with IPSec

7. In the welcome window, click Next .

8. In the description box, type the description information if you want, and then click Next .

Picture 7 of Block web browser with IPSec

9. In the IP Traffic Source window, leave the My IP Address option selected and click Next .

Picture 8 of Block web browser with IPSec

10. In the IP Traffic Destination window, to select Any IP Address option and click Next .

Picture 9 of Block web browser with IPSec

See page 2


11. In the IP Protocol Type , scroll down to TCP and click Next .

Picture 10 of Block web browser with IPSec

12. In IP Protocol Port , type 80 (for HTTP ) in the To This Post box and click Next .

Picture 11 of Block web browser with IPSec

13. In the IP Filter List window, note how an IP Filter has been added . Now if you want, you can add HTTPS (Any IP to Any IP, Protocol TCP, Destination Port 443) in the same manner as above.

Picture 12 of Block web browser with IPSec

14. Now that you have set up both filters, click OK .

Picture 13 of Block web browser with IPSec

15. Go back to Manage IP Filter Lists and Filter actions , re-evaluate the filters (you can add or remove filters later). Now we are going to add a new filter to define the internal network traffic (INTRANET). Next, click Add .

Picture 14 of Block web browser with IPSec

16. Set the appropriate name for the new filter - for example - Intranet , then proceed to configure the filter by clicking Add .

Picture 15 of Block web browser with IPSec

17. In the IP Traffic Source window, leave the My IP Address option checked and click Next .

18. In IP Traffic Destination , click the drop-down list and select the destination type. For example, if you only want to allow web traffic from a web server on the local network (such as SERVER200 ), then select A Specific DNS Name .

Picture 16 of Block web browser with IPSec

Then, in Host Name , type SERVER200 and click Next .

Picture 17 of Block web browser with IPSec

If you want to allow web traffic from a local network subnet, such as 192.168.0.0/24 , select A Specific IP Subnet , and type in the Network ID and Subnet Mask for the required subnet. Click Next .

Picture 18 of Block web browser with IPSec

19. Go back to the IP Filter list, add any other filters you want, and finally click OK .

Picture 19 of Block web browser with IPSec

20. Go back to Manage IP Filter Lists and Filter actions , evaluate your filters and if all is ok, click the Manage Filter Actions tab. Now we need to add a filter action to block certain traffic, so click Add .

Picture 20 of Block web browser with IPSec

21. In the Welcome screen, click Next .

22. In Filter Action Name type Block and click Next .

Picture 21 of Block web browser with IPSec

23. In Filter Action General Options , click Block and then click Next .

Picture 22 of Block web browser with IPSec

24. Go back to Manage IP Filter Lists and Filter actions , evaluate your filters, if all is ok, click the Close button. You can add Filters and Actions Filter anytime if you want.

Picture 23 of Block web browser with IPSec

The next step is to configure IPSec Policy and assign it.

See page 3


Configure IPSec Policy

1. In the MMC interface, right-click IP Security Policies on the Local Computer and select Create IP Security Policy

Picture 24 of Block web browser with IPSec

2. In the Welcome screen, click Next.

3. In the IP Security Policy Name , enter a descriptive name, such as " Block HTTP, HTTPS, allow Intranet ". Click Next .

Picture 25 of Block web browser with IPSec

4. In the Request for Secure Communication window, uncheck the Active the Default Response Rule check box. Click Next.

Picture 26 of Block web browser with IPSec

5. In the Completing IP Security Policy Wizard window, click Finish

Picture 27 of Block web browser with IPSec

6. Now we need to add IP Filters and other Filter Actions to the new IPSec Policy . In the new IPSec Policy window, click Add to add IP Filters and Filter Actions

Picture 28 of Block web browser with IPSec

7. In the welcome window, click Next.

8. In Tunnel Endpoint , make sure that the default settings are selected and click Next.

Picture 29 of Block web browser with IPSec

9. In the Network Type window, select All Network Connections and click Next.

Picture 30 of Block web browser with IPSec

10. In the IP Filter List window, select one of the pre-configured IP Filter, for example "HTTP, HTTPS" (configured in step 6 above the article). If for some reason, you did not properly configure the IP Filter beforehand, you can click Add and add it at this time. When done, click Next .

Picture 31 of Block web browser with IPSec

11. In the Filter Action window, select one of the previously configured Filter Actions, for example "Block" (configured in step 20 above). Next, if you haven't configured the right Filter Action before, you can click Add and add it now. When done, click Next

Picture 32 of Block web browser with IPSec

12. Back in the new IPSec Policy window, make sure that the new IP Filter is selected. Click Add to add additional IP Filters and Filter Actions just like you did above. In this example, we will add the "Intranet" IP Filter .

Picture 33 of Block web browser with IPSec

Follow steps 7 to 11.

13. Add "Intranet" IP Filter .

Picture 34 of Block web browser with IPSec

14. Configure it to use the Permit Filter Action .

Picture 35 of Block web browser with IPSec

15. Notice how the two IP Filters are added .

Picture 36 of Block web browser with IPSec

Note that you cannot change their order like in dedicated firewalls. However, this configuration works quite well.

The next stage is to assign the IPSec Policy.

Assign IPSec Policy

In the MMC interface, right-click on new IPSec Policy and select Assign.

Picture 37 of Block web browser with IPSec

When done, you can test the configuration by trying to surf to a blocked Windows and a website is not blocked.

Lock multiple computers

Locking multiple computers can be done in two ways:

Export and Import IPSec Policy

Configure IPSec Policy through GPO

Both of these methods are used to prevent some computers from using ICMP (for other IPSec Policies).

Update 26 May 2019
Category

System

Mac OS X

Hardware

Game

Tech info

Technology

Science

Life

Application

Electric

Program

Mobile