Overview of Windows Server 2008 Firewall with advanced security features (continued part 3)

In this article, I will show you how to create an IPsec isolation domain policy in a simple network, create a quarantine domain rule for servers and clients that require security (authentication), Configure the server to use ping connections sent to them to check the newly created rule.

Overview of Windows Server 2008 Firewall with advanced security features - Part 1
Overview of Windows Server 2008 Firewall with advanced security features - Part 2
Overview of Windows Server 2008 Firewall with advanced security features - Part 3

Thomas Shinder

In Part 3, how to create a logical domain policy using the IPsec and Windows Firewall with Advanced Security console built into the Windows Server 2008 Group Policy Editor, we showed you how to configure it. The default IPsec policy to use ESP encryption on IPsec-protected connections, then introduce how to create IPsec policy rules for domain controllers.

In this article, I will show you how to create an IPsec isolation domain policy in a simple network, create a quarantine domain rule for servers and clients that require security (authentication), Configure the server to use ping connections sent to them to check the newly created rule. Finally, this section examines the rule to confirm that IPsec is used for connections and that the connection is encrypted using ESP.

Create a quarantine domain rule for servers and clients

The next rule we will create is to isolate the domain for the server and the client. This rule will not require the same security as the previous rules that we created for connections with domain controllers. It only requires authentication and security when domain members connect with each other. Request authentication for inbound connections, security for outbound connections.

When you request security for inbound connections, it is required that computers that want to connect to a domain member verify the permissions for that domain member with Kerberos. If the computer does not authenticate, it means that the connection will fail. If the computer can authenticate, the connection will be allowed. This rule allows members to establish secure connections with each other while allowing domain members to connect to non-domain members (members cannot authenticate).

Navigate to the Connection Security Rules button in the left pane of the Group Policy Editor as you did when creating the previous rule.

Right-click Connection Security Rules , and then click New Rule .

Overview of Windows Server 2008 Firewall with advanced security features (continued part 3) Picture 1Overview of Windows Server 2008 Firewall with advanced security features (continued part 3) Picture 1
Figure 1

On the Rule Type page, select the Isolation option and click Next .

Overview of Windows Server 2008 Firewall with advanced security features (continued part 3) Picture 2Overview of Windows Server 2008 Firewall with advanced security features (continued part 3) Picture 2
Figure 2

On the Authentication Method page, select Default and click Next .

Overview of Windows Server 2008 Firewall with advanced security features (continued part 3) Picture 3Overview of Windows Server 2008 Firewall with advanced security features (continued part 3) Picture 3
Figure 3

On the Name page, name the rule. In this example we set the Client / Server Domain Isolation and entered that instruction Encrypts and secure connections between all machines that are not DCs or infrastructure servers (DNS, DHCP, Default Gateway, WINS) .

Click Next .

Overview of Windows Server 2008 Firewall with advanced security features (continued part 3) Picture 4Overview of Windows Server 2008 Firewall with advanced security features (continued part 3) Picture 4
Figure 4

Notice the rule in the list of connection security rules. You might wonder if we will encounter any problems here, because Client / Server Domain Isolation rule has all IP addresses, including the domain controller's IP addresses.

However, this does not matter because the rules are evaluated from the most specific to the least specific. Therefore, a more specific rule will be evaluated before a less specific rule. In the case of the two rules we have here, DC Request Security rule is more specific because Endpoint 2 is a specific IP address, while Client / Server Domain Isolation rule is Endpoint 2 any IP address.

Overview of Windows Server 2008 Firewall with advanced security features (continued part 3) Picture 5Overview of Windows Server 2008 Firewall with advanced security features (continued part 3) Picture 5
Figure 5

Note that in a production environment we need to create some exception rules for certain devices that are exempt from authentication. DHCP, DNS, WINS and default gateway addresses need to be used by machines that are not domain members and thus cannot authenticate using Kerberos.

Create Firewall Rule to allow incoming Ping

To check the configuration, you can use the ping command to ping the server from a particular Vista client. To do this, it is necessary to allow ICMP pings to send requests to the test server. Create a rule that allows Vista clients to ping the server using Windows Firewall with Advanced Security MMC.

On the server, open Windows Firewall with Advanced Security from the Administrative Tools menu.

To the left of the console pane of Windows Firewall with Advanced Security, right-click the Inbound Rules button in the left pane and click New Rule .

Overview of Windows Server 2008 Firewall with advanced security features (continued part 3) Picture 6Overview of Windows Server 2008 Firewall with advanced security features (continued part 3) Picture 6
Figure 6

On the Rule Type page, select the Custom option and click Next .

Overview of Windows Server 2008 Firewall with advanced security features (continued part 3) Picture 7Overview of Windows Server 2008 Firewall with advanced security features (continued part 3) Picture 7
Figure 7

On the Program page, select the All Programs option and click Next .

Overview of Windows Server 2008 Firewall with advanced security features (continued part 3) Picture 8Overview of Windows Server 2008 Firewall with advanced security features (continued part 3) Picture 8
Figure 8

On the Protocol and Ports page, click the down arrow in the Protocol Type list and select the ICMPv4 option .

Click the Customize button. In the Customize ICMP Settings dialog box , select the Specific ICMP types option . Then check the Echo Request checkbox. Click OK .

Overview of Windows Server 2008 Firewall with advanced security features (continued part 3) Picture 9Overview of Windows Server 2008 Firewall with advanced security features (continued part 3) Picture 9
Figure 9

Click Next on the Protocol and Ports page .

Overview of Windows Server 2008 Firewall with advanced security features (continued part 3) Picture 10Overview of Windows Server 2008 Firewall with advanced security features (continued part 3) Picture 10
Figure 10

In the Scope dialog box, use the default settings for local and remote IP addresses , Any IP address. Click Next .

Overview of Windows Server 2008 Firewall with advanced security features (continued part 3) Picture 11Overview of Windows Server 2008 Firewall with advanced security features (continued part 3) Picture 11
Figure 11

On the Action page, select the Allow the connection option and click Next .

Overview of Windows Server 2008 Firewall with advanced security features (continued part 3) Picture 12Overview of Windows Server 2008 Firewall with advanced security features (continued part 3) Picture 12
Figure 12

On the Profile page, remove the check marks from the Private and Public boxes and click Next .

Overview of Windows Server 2008 Firewall with advanced security features (continued part 3) Picture 13Overview of Windows Server 2008 Firewall with advanced security features (continued part 3) Picture 13
Figure 13

On the Name page, name the rule. In this example we name it Allow ICMP Request . Then click Finish .

Overview of Windows Server 2008 Firewall with advanced security features (continued part 3) Picture 14Overview of Windows Server 2008 Firewall with advanced security features (continued part 3) Picture 14
Figure 14

You can see Allow ICMP Request rule in the list of incoming rules.

Overview of Windows Server 2008 Firewall with advanced security features (continued part 3) Picture 15Overview of Windows Server 2008 Firewall with advanced security features (continued part 3) Picture 15
Figure 15

Observe the action of connection security

OK, now we're ready to see if things work! Go to the server and open the Windows Firewall with Advanced Security console, click the Connection Security Rules button in the left pane of the interface. You need to see the rules you created in Group Policy. If you do not see these rules, follow these instructions:

  1. At the domain controller, open a command prompt and type gpupdate / force , and then press ENTER to update Group Policy on the domain controller.
  2. After updating Group Policy on the domain controller, update Group Policy on the server by opening a command prompt and typing gpupdate / force , press ENTER to update Group Policy for the server.
  3. If still not working, try restarting the server and login again.

Then refresh the entire view of Connection Security Rules on the server to see an updated list of these rules. This is a similar list that you see in Group Policy Editor.

Overview of Windows Server 2008 Firewall with advanced security features (continued part 3) Picture 16Overview of Windows Server 2008 Firewall with advanced security features (continued part 3) Picture 16
Figure 16

Click the Main Mode button in the left pane of the console. You must see that the server has established secure connections for both domain controllers and Vista clients. If you don't see secure connections to the Vista client, follow these instructions:

  1. Run gpupdate / force trene Vista client
  2. The Connection Security Rules configuration has been applied on Vista clients by checking them in the Windows Firewall with the Advanced Security MMC snap-in on this client.
  3. If you don't see the work, restart the client
  4. Ping to the Vista client from the server

After performing these steps, you need to see secure IPsec connections between the server and domain controller and the Vista client.

Overview of Windows Server 2008 Firewall with advanced security features (continued part 3) Picture 17Overview of Windows Server 2008 Firewall with advanced security features (continued part 3) Picture 17
Figure 17

When you double click on one of the entries in the details pane of the Main Mode button, you can see the details of the secure connection.

Overview of Windows Server 2008 Firewall with advanced security features (continued part 3) Picture 18Overview of Windows Server 2008 Firewall with advanced security features (continued part 3) Picture 18
Figure 18

Click the Quick Mode button in the left panel of the console. You need to see secure connections for both domain controllers and Vista clients.

Overview of Windows Server 2008 Firewall with advanced security features (continued part 3) Picture 19Overview of Windows Server 2008 Firewall with advanced security features (continued part 3) Picture 19
Figure 19

If you double click on one of the entries in the details pane of the Quick Mode button, you will see the details of the connection. Notice that ESP confidentiality is used and is using AES-128 bit encryption. This means that this connection is completely secure on the network and cannot be stolen by intruders.

Overview of Windows Server 2008 Firewall with advanced security features (continued part 3) Picture 20Overview of Windows Server 2008 Firewall with advanced security features (continued part 3) Picture 20
Figure 20

Conclude

In this article, I have shown you how to configure quarantine domain rules for servers and clients, and then configure the firewall on the server to allow incoming ping requests. Also in this article we checked to see if everything worked as expected by using the test features included in the Windows Firewall with Advanced Security console. This section also focuses on creating a simple quarantine domain policy to demonstrate how to configure isolated domain policies with the new tools available in Windows Server 2008 and Vista. More importantly, we demonstrate to you how to use Group Policy to focus on configuring domain isolation policy as a centralized management solution.

In the next part of this series we will demonstrate how to isolate the server. How useful is it when computers are not domain members? In that case we will show you how to use authentication methods to protect connections between computers that are not domain members.

4.3 ★ | 4 Vote