Inbound Access List Help

My ISP gives me the ability to use a managed firewall on their router. I can use a web interface provided to manipulate it. However, my attempts to utilize it have ended up with some bad results. My end goal is to lock down all incoming traffic except for the few things I am using.


The basic look of the firewall interface I have access to is:

//These are the main headings.
ACTION            PROTOCOL       APPLICATION        PORTS             IP ADDRESSES

//These are the options for each heading

ACTION: (permit | deny)
PROTOCOL: (TCP | UDP | IP)

//The application, ports, and addresses or split into two parts: Source and destination
//For each part they have the following options

APPLICATION: (ANY | DNS | HTTP | etc...)
PORTS: Two Textboxes for range
IP ADDRESSES:
               ( ANY | HOST | NETWORK) //depending on what you select here, you input more shown below
               One Textbox for what I assume is an IP address if you specify "host" above
              Drop Down list  (ex: /24) I believe this is for subnet if you specify "network" above



My needs are as follows:
Web Server
VPN Server (IPsec)
Remote Desktop
Everything Else Blocked

The public IP Addresses of the Web and VPN servers are for example: 69.69.69.69 (mask 255.255.255.248)
The rest of the network are privately addressed for example: 10.0.1.3 (mask 255.255.255.0)

We use the VPN to connect to the network and then use remote desktop to connect directly to any given computer.


Any guidance would be helpful. I am also aware that the order of entry is kind of important.

There is also the following note on the interface. I'm not sure if it matters.
PLEASE NOTE: In order to prevent inadvertent restrictions to network access, each Access Control List ends with a statement which permits all traffic which does not have a specific rule associated with it. Please refer to the help documentation for information on how to override this rule.

pricerageAsked:
Who is Participating?
I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

lrmooreCommented:
WWW Server = 10.0.1.3
Remote desktiop directly to 10.0.1.4
IPSEC VPN server = 10.0.1.5
PPTP VPN server = 10.0.1.6
ACTION            PROTOCOL       APPLICATION        PORTS             IP ADDRESSES
Permit               TCP                  WWW                 80     80            10.0.1.3
Permit               TCP                  RDP                     3389 3389        10.0.1.4
Permit               UDP                 VPN-ISAKMP        500  500            10.0.1.5
Permit               UDP                 VPN                    4500 4500          10.0.1.5
Permit               TCP                 PPTPVPN             1723  1723         10.0.1.6
0
pricerageAuthor Commented:
Thanks. This all makes sense. However, on the interface, each entry looks similar to the setup below. You have to enter the source and destination. Is what I have here correct?

ACTION            PROTOCOL       APPLICATION        PORTS             IP ADDRESSES
                                                 Source:
                                                  WWW                 80     80            Any
Permit               TCP              
                                                 Destination:  
                                                  WWW                 80     80            10.0.1.3

0
lrmooreCommented:
Source need to be any port >1024
Destination port = 80
0
Redefine Your Security with AI & Machine Learning

The implications of AI and machine learning in cyber security are massive and constantly growing, creating both efficiencies and new challenges across the board. Check out our on-demand webinar to learn more about how AI can help your organization!

pricerageAuthor Commented:
"Source need to be any port >1024" Can you explain that?  How would a request made to port 80 be included in that? This is what I thought it would be:

ACTION            PROTOCOL       APPLICATION        PORTS             IP ADDRESSES
***********************************
                                                 Source:
                                                  WWW                 80     80            Any
Permit               TCP              
                                                 Destination:  
                                                  WWW                 80     80            10.0.1.3
**************************************
                                                 Source:
                                                  RDP                 3389    3389            Any
Permit               TCP              
                                                 Destination:  
                                                  RDP                 3389     3389            10.0.1.4



This is what it sounds like you are saying to do:

This is what I thought it would be:

ACTION            PROTOCOL       APPLICATION        PORTS             IP ADDRESSES
***********************************
                                                 Source:
                                                  WWW                 1024     (max port?)            Any
Permit               TCP              
                                                 Destination:  
                                                  WWW                 80     80            10.0.1.3
**************************************
                                                 Source:
                                                  RDP                 3389    3389            Any
Permit               TCP              
                                                 Destination:  
                                                  RDP                 3389     3389            10.0.1.4
0
lrmooreCommented:
Source ports are always ephemeral, meaning random between 1024 - 65535. only the destination port is static.
Permit source 1024 - 65535 any
Destination    80 - 80  - 10.0.1.3
 
0

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
pricerageAuthor Commented:
Thanks for the help.
0
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today
Software Firewalls

From novice to tech pro — start learning today.