Solved

Inbound Access List Help

Posted on 2007-03-22
7
193 Views
Last Modified: 2010-04-08
My ISP gives me the ability to use a managed firewall on their router. I can use a web interface provided to manipulate it. However, my attempts to utilize it have ended up with some bad results. My end goal is to lock down all incoming traffic except for the few things I am using.


The basic look of the firewall interface I have access to is:

//These are the main headings.
ACTION            PROTOCOL       APPLICATION        PORTS             IP ADDRESSES

//These are the options for each heading

ACTION: (permit | deny)
PROTOCOL: (TCP | UDP | IP)

//The application, ports, and addresses or split into two parts: Source and destination
//For each part they have the following options

APPLICATION: (ANY | DNS | HTTP | etc...)
PORTS: Two Textboxes for range
IP ADDRESSES:
               ( ANY | HOST | NETWORK) //depending on what you select here, you input more shown below
               One Textbox for what I assume is an IP address if you specify "host" above
              Drop Down list  (ex: /24) I believe this is for subnet if you specify "network" above



My needs are as follows:
Web Server
VPN Server (IPsec)
Remote Desktop
Everything Else Blocked

The public IP Addresses of the Web and VPN servers are for example: 69.69.69.69 (mask 255.255.255.248)
The rest of the network are privately addressed for example: 10.0.1.3 (mask 255.255.255.0)

We use the VPN to connect to the network and then use remote desktop to connect directly to any given computer.


Any guidance would be helpful. I am also aware that the order of entry is kind of important.

There is also the following note on the interface. I'm not sure if it matters.
PLEASE NOTE: In order to prevent inadvertent restrictions to network access, each Access Control List ends with a statement which permits all traffic which does not have a specific rule associated with it. Please refer to the help documentation for information on how to override this rule.

0
Comment
Question by:pricerage
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 3
7 Comments
 
LVL 79

Expert Comment

by:lrmoore
ID: 18776867
WWW Server = 10.0.1.3
Remote desktiop directly to 10.0.1.4
IPSEC VPN server = 10.0.1.5
PPTP VPN server = 10.0.1.6
ACTION            PROTOCOL       APPLICATION        PORTS             IP ADDRESSES
Permit               TCP                  WWW                 80     80            10.0.1.3
Permit               TCP                  RDP                     3389 3389        10.0.1.4
Permit               UDP                 VPN-ISAKMP        500  500            10.0.1.5
Permit               UDP                 VPN                    4500 4500          10.0.1.5
Permit               TCP                 PPTPVPN             1723  1723         10.0.1.6
0
 

Author Comment

by:pricerage
ID: 18780130
Thanks. This all makes sense. However, on the interface, each entry looks similar to the setup below. You have to enter the source and destination. Is what I have here correct?

ACTION            PROTOCOL       APPLICATION        PORTS             IP ADDRESSES
                                                 Source:
                                                  WWW                 80     80            Any
Permit               TCP              
                                                 Destination:  
                                                  WWW                 80     80            10.0.1.3

0
 
LVL 79

Expert Comment

by:lrmoore
ID: 18780159
Source need to be any port >1024
Destination port = 80
0
Threat Trends for MSPs to Watch

See the findings.
Despite its humble beginnings, phishing has come a long way since those first crudely constructed emails. Today, phishing sites can appear and disappear in the length of a coffee break, and it takes more than a little know-how to keep your clients secure.

 

Author Comment

by:pricerage
ID: 18780352
"Source need to be any port >1024" Can you explain that?  How would a request made to port 80 be included in that? This is what I thought it would be:

ACTION            PROTOCOL       APPLICATION        PORTS             IP ADDRESSES
***********************************
                                                 Source:
                                                  WWW                 80     80            Any
Permit               TCP              
                                                 Destination:  
                                                  WWW                 80     80            10.0.1.3
**************************************
                                                 Source:
                                                  RDP                 3389    3389            Any
Permit               TCP              
                                                 Destination:  
                                                  RDP                 3389     3389            10.0.1.4



This is what it sounds like you are saying to do:

This is what I thought it would be:

ACTION            PROTOCOL       APPLICATION        PORTS             IP ADDRESSES
***********************************
                                                 Source:
                                                  WWW                 1024     (max port?)            Any
Permit               TCP              
                                                 Destination:  
                                                  WWW                 80     80            10.0.1.3
**************************************
                                                 Source:
                                                  RDP                 3389    3389            Any
Permit               TCP              
                                                 Destination:  
                                                  RDP                 3389     3389            10.0.1.4
0
 
LVL 79

Accepted Solution

by:
lrmoore earned 175 total points
ID: 18780445
Source ports are always ephemeral, meaning random between 1024 - 65535. only the destination port is static.
Permit source 1024 - 65535 any
Destination    80 - 80  - 10.0.1.3
 
0
 

Author Comment

by:pricerage
ID: 18936083
Thanks for the help.
0

Featured Post

Automating Your MSP Business

The road to profitability.
Delivering superior services is key to ensuring customer satisfaction and the consequent long-term relationships that enable MSPs to lock in predictable, recurring revenue. What's the best way to deliver superior service? One word: automation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Do you have a windows based Checkpoint SmartCenter for centralized Checkpoint management?  Have you ever backed up the firewall policy residing on the SmartCenter?  If you have then you know the hassles of connecting to the server, doing an upgrade_…
This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
Finds all prime numbers in a range requested and places them in a public primes() array. I've demostrated a template size of 30 (2 * 3 * 5) but larger templates can be built such 210  (2 * 3 * 5 * 7) or 2310  (2 * 3 * 5 * 7 * 11). The larger templa…
I've attached the XLSM Excel spreadsheet I used in the video and also text files containing the macros used below. https://filedb.experts-exchange.com/incoming/2017/03_w12/1151775/Permutations.txt https://filedb.experts-exchange.com/incoming/201…

710 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question