Solved

Inbound Access List Help

Posted on 2007-03-22
7
189 Views
Last Modified: 2010-04-08
My ISP gives me the ability to use a managed firewall on their router. I can use a web interface provided to manipulate it. However, my attempts to utilize it have ended up with some bad results. My end goal is to lock down all incoming traffic except for the few things I am using.


The basic look of the firewall interface I have access to is:

//These are the main headings.
ACTION            PROTOCOL       APPLICATION        PORTS             IP ADDRESSES

//These are the options for each heading

ACTION: (permit | deny)
PROTOCOL: (TCP | UDP | IP)

//The application, ports, and addresses or split into two parts: Source and destination
//For each part they have the following options

APPLICATION: (ANY | DNS | HTTP | etc...)
PORTS: Two Textboxes for range
IP ADDRESSES:
               ( ANY | HOST | NETWORK) //depending on what you select here, you input more shown below
               One Textbox for what I assume is an IP address if you specify "host" above
              Drop Down list  (ex: /24) I believe this is for subnet if you specify "network" above



My needs are as follows:
Web Server
VPN Server (IPsec)
Remote Desktop
Everything Else Blocked

The public IP Addresses of the Web and VPN servers are for example: 69.69.69.69 (mask 255.255.255.248)
The rest of the network are privately addressed for example: 10.0.1.3 (mask 255.255.255.0)

We use the VPN to connect to the network and then use remote desktop to connect directly to any given computer.


Any guidance would be helpful. I am also aware that the order of entry is kind of important.

There is also the following note on the interface. I'm not sure if it matters.
PLEASE NOTE: In order to prevent inadvertent restrictions to network access, each Access Control List ends with a statement which permits all traffic which does not have a specific rule associated with it. Please refer to the help documentation for information on how to override this rule.

0
Comment
Question by:pricerage
  • 3
  • 3
7 Comments
 
LVL 79

Expert Comment

by:lrmoore
ID: 18776867
WWW Server = 10.0.1.3
Remote desktiop directly to 10.0.1.4
IPSEC VPN server = 10.0.1.5
PPTP VPN server = 10.0.1.6
ACTION            PROTOCOL       APPLICATION        PORTS             IP ADDRESSES
Permit               TCP                  WWW                 80     80            10.0.1.3
Permit               TCP                  RDP                     3389 3389        10.0.1.4
Permit               UDP                 VPN-ISAKMP        500  500            10.0.1.5
Permit               UDP                 VPN                    4500 4500          10.0.1.5
Permit               TCP                 PPTPVPN             1723  1723         10.0.1.6
0
 

Author Comment

by:pricerage
ID: 18780130
Thanks. This all makes sense. However, on the interface, each entry looks similar to the setup below. You have to enter the source and destination. Is what I have here correct?

ACTION            PROTOCOL       APPLICATION        PORTS             IP ADDRESSES
                                                 Source:
                                                  WWW                 80     80            Any
Permit               TCP              
                                                 Destination:  
                                                  WWW                 80     80            10.0.1.3

0
 
LVL 79

Expert Comment

by:lrmoore
ID: 18780159
Source need to be any port >1024
Destination port = 80
0
PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

 

Author Comment

by:pricerage
ID: 18780352
"Source need to be any port >1024" Can you explain that?  How would a request made to port 80 be included in that? This is what I thought it would be:

ACTION            PROTOCOL       APPLICATION        PORTS             IP ADDRESSES
***********************************
                                                 Source:
                                                  WWW                 80     80            Any
Permit               TCP              
                                                 Destination:  
                                                  WWW                 80     80            10.0.1.3
**************************************
                                                 Source:
                                                  RDP                 3389    3389            Any
Permit               TCP              
                                                 Destination:  
                                                  RDP                 3389     3389            10.0.1.4



This is what it sounds like you are saying to do:

This is what I thought it would be:

ACTION            PROTOCOL       APPLICATION        PORTS             IP ADDRESSES
***********************************
                                                 Source:
                                                  WWW                 1024     (max port?)            Any
Permit               TCP              
                                                 Destination:  
                                                  WWW                 80     80            10.0.1.3
**************************************
                                                 Source:
                                                  RDP                 3389    3389            Any
Permit               TCP              
                                                 Destination:  
                                                  RDP                 3389     3389            10.0.1.4
0
 
LVL 79

Accepted Solution

by:
lrmoore earned 175 total points
ID: 18780445
Source ports are always ephemeral, meaning random between 1024 - 65535. only the destination port is static.
Permit source 1024 - 65535 any
Destination    80 - 80  - 10.0.1.3
 
0
 

Author Comment

by:pricerage
ID: 18936083
Thanks for the help.
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you are like regular user of computer nowadays, a good bet that your home computer is on right now, all exposed to world of Internet to be exploited by somebody you do not know and you never will. Internet security issues has been getting worse d…
Do you have a windows based Checkpoint SmartCenter for centralized Checkpoint management?  Have you ever backed up the firewall policy residing on the SmartCenter?  If you have then you know the hassles of connecting to the server, doing an upgrade_…
This Micro Tutorial will give you a basic overview how to record your screen with Microsoft Expression Encoder. This program is still free and open for the public to download. This will be demonstrated using Microsoft Expression Encoder 4.
Both in life and business – not all partnerships are created equal. As the demand for cloud services increases, so do the number of self-proclaimed cloud partners. Asking the right questions up front in the partnership, will enable both parties …

910 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now