Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

Inbound Access List Help

Posted on 2007-03-22
7
Medium Priority
?
195 Views
Last Modified: 2010-04-08
My ISP gives me the ability to use a managed firewall on their router. I can use a web interface provided to manipulate it. However, my attempts to utilize it have ended up with some bad results. My end goal is to lock down all incoming traffic except for the few things I am using.


The basic look of the firewall interface I have access to is:

//These are the main headings.
ACTION            PROTOCOL       APPLICATION        PORTS             IP ADDRESSES

//These are the options for each heading

ACTION: (permit | deny)
PROTOCOL: (TCP | UDP | IP)

//The application, ports, and addresses or split into two parts: Source and destination
//For each part they have the following options

APPLICATION: (ANY | DNS | HTTP | etc...)
PORTS: Two Textboxes for range
IP ADDRESSES:
               ( ANY | HOST | NETWORK) //depending on what you select here, you input more shown below
               One Textbox for what I assume is an IP address if you specify "host" above
              Drop Down list  (ex: /24) I believe this is for subnet if you specify "network" above



My needs are as follows:
Web Server
VPN Server (IPsec)
Remote Desktop
Everything Else Blocked

The public IP Addresses of the Web and VPN servers are for example: 69.69.69.69 (mask 255.255.255.248)
The rest of the network are privately addressed for example: 10.0.1.3 (mask 255.255.255.0)

We use the VPN to connect to the network and then use remote desktop to connect directly to any given computer.


Any guidance would be helpful. I am also aware that the order of entry is kind of important.

There is also the following note on the interface. I'm not sure if it matters.
PLEASE NOTE: In order to prevent inadvertent restrictions to network access, each Access Control List ends with a statement which permits all traffic which does not have a specific rule associated with it. Please refer to the help documentation for information on how to override this rule.

0
Comment
Question by:pricerage
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 3
7 Comments
 
LVL 79

Expert Comment

by:lrmoore
ID: 18776867
WWW Server = 10.0.1.3
Remote desktiop directly to 10.0.1.4
IPSEC VPN server = 10.0.1.5
PPTP VPN server = 10.0.1.6
ACTION            PROTOCOL       APPLICATION        PORTS             IP ADDRESSES
Permit               TCP                  WWW                 80     80            10.0.1.3
Permit               TCP                  RDP                     3389 3389        10.0.1.4
Permit               UDP                 VPN-ISAKMP        500  500            10.0.1.5
Permit               UDP                 VPN                    4500 4500          10.0.1.5
Permit               TCP                 PPTPVPN             1723  1723         10.0.1.6
0
 

Author Comment

by:pricerage
ID: 18780130
Thanks. This all makes sense. However, on the interface, each entry looks similar to the setup below. You have to enter the source and destination. Is what I have here correct?

ACTION            PROTOCOL       APPLICATION        PORTS             IP ADDRESSES
                                                 Source:
                                                  WWW                 80     80            Any
Permit               TCP              
                                                 Destination:  
                                                  WWW                 80     80            10.0.1.3

0
 
LVL 79

Expert Comment

by:lrmoore
ID: 18780159
Source need to be any port >1024
Destination port = 80
0
Introducing the WatchGuard 420 Access Point

WatchGuard's newest access point includes an 802.11ac Wave 2 chipset, providing the fastest speeds for VoIP, video and music streaming, and large data file transfers. Additionally, enjoy the benefits of strong security as the 3rd radio delivers dedicated WIPS protection!

 

Author Comment

by:pricerage
ID: 18780352
"Source need to be any port >1024" Can you explain that?  How would a request made to port 80 be included in that? This is what I thought it would be:

ACTION            PROTOCOL       APPLICATION        PORTS             IP ADDRESSES
***********************************
                                                 Source:
                                                  WWW                 80     80            Any
Permit               TCP              
                                                 Destination:  
                                                  WWW                 80     80            10.0.1.3
**************************************
                                                 Source:
                                                  RDP                 3389    3389            Any
Permit               TCP              
                                                 Destination:  
                                                  RDP                 3389     3389            10.0.1.4



This is what it sounds like you are saying to do:

This is what I thought it would be:

ACTION            PROTOCOL       APPLICATION        PORTS             IP ADDRESSES
***********************************
                                                 Source:
                                                  WWW                 1024     (max port?)            Any
Permit               TCP              
                                                 Destination:  
                                                  WWW                 80     80            10.0.1.3
**************************************
                                                 Source:
                                                  RDP                 3389    3389            Any
Permit               TCP              
                                                 Destination:  
                                                  RDP                 3389     3389            10.0.1.4
0
 
LVL 79

Accepted Solution

by:
lrmoore earned 700 total points
ID: 18780445
Source ports are always ephemeral, meaning random between 1024 - 65535. only the destination port is static.
Permit source 1024 - 65535 any
Destination    80 - 80  - 10.0.1.3
 
0
 

Author Comment

by:pricerage
ID: 18936083
Thanks for the help.
0

Featured Post

Enroll in September's Course of the Month

This month’s featured course covers 16 hours of training in installation, management, and deployment of VMware vSphere virtualization environments. It's free for Premium Members, Team Accounts, and Qualified Experts!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Wikipedia defines 'Script Kiddies' in this informal way: "In hacker culture, a script kiddie, occasionally script bunny, skiddie, script kitty, script-running juvenile (SRJ), or similar, is a derogatory term used to describe those who use scripts or…
This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Do you want to know how to make a graph with Microsoft Access? First, create a query with the data for the chart. Then make a blank form and add a chart control. This video also shows how to change what data is displayed on the graph as well as form…
Suggested Courses

715 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question