Solved

Whitelisting Exchange 365 IP ranges

Posted on 2013-12-18
7
1,415 Views
Last Modified: 2014-01-02
For accessing exchange 365, there is a whole list of IPs that needs to be bypassed via firewall:

http://help.outlook.com/en-us/140/gg263350.aspx

But still microsoft maintains that the IPs are dynamic and subject to change and we need to subscribe to an RSS feed to keep track of these IP changes.

http://technet.microsoft.com/en-us/library/hh852522.aspx

Is there an easier way out to let our Firewall / proxy access office 365 un-hindred? microsoft suggests to configure firewall rules based on DNS rather than IP but Cisco's ASA series doesn't support that.

Also, any other security precautions we need to consider while opening up these access IPs/ ports to microsoft DCs?
0
Comment
Question by:fahim
  • 4
  • 3
7 Comments
 
LVL 23

Expert Comment

by:Mohammed Hamada
ID: 39728555
You can ask Microsoft directly to provide you with CIDR for their networks! and for further security you can setup an IDS or if you have it already on your ASA Firewall then you can configure it.

The IDS is very effective and secure but you may want to do some alterations to change some things in relatation with how restricted is the policy.
0
 

Author Comment

by:fahim
ID: 39735447
Microsoft has indeed provided the CIDRs. The issue is that there are IP ranges of /16, /24 ranges and that's about 15 of them. Moreover, Microsoft recommends to open outbound ports 80 as well as 443 to all of these hundreds of thousands of IPs ( http://onlinehelp.microsoft.com/en-in/office365-enterprises/hh373144.aspx ). With no IPS in the middle, how safe would be this outbound access? What are the threats?
0
 
LVL 23

Accepted Solution

by:
Mohammed Hamada earned 500 total points
ID: 39735546
For an outbound connection I don't think there would be threats if they were owned by Microsoft.

I mean you said those IPs are dynamic which means they'll change but probably in the scope of Microsoft's CIDR! right?

If so then I don't think there will be a risk for an outbound connection since you know the ranges that connection is going to! and as I said for more security you can setup your IDS to filter all packets.
0
6 Surprising Benefits of Threat Intelligence

All sorts of threat intelligence is available on the web. Intelligence you can learn from, and use to anticipate and prepare for future attacks.

 

Author Comment

by:fahim
ID: 39735765
If it's an https (443) connection, what would be the benefit of an IDS?
0
 
LVL 23

Expert Comment

by:Mohammed Hamada
ID: 39735870
The IDS will work for HTTP only, but for HTTPS If the CIDRs of Microsoft doesn't change then I don't think you will need to worry unless Microsoft's infrastructure gets infected.
0
 

Author Comment

by:fahim
ID: 39737983
Thanks..my related query was also that Microsoft suggests to configure firewall rules based on DNS rather than IP but Cisco's ASA series doesn't support that....

This becomes an administrative issue to keep track of RSS feeds and knowing which all IPs to poke holes for within the firewall. Any other better mechanism around?
0
 
LVL 23

Expert Comment

by:Mohammed Hamada
ID: 39738134
Then I'd suggest an open source firewall that would work and wouldn't cost you much at the same time.

I'm using Pfsense firewall, I have already set it up in multiple customers based infrastructure and it's doing a great job. it has been up for a really long time.

Check this question
http://forum.pfsense.org/index.php?topic=29037.0
0

Featured Post

How your wiki can always stay up-to-date

Quip doubles as a “living” wiki and a project management tool that evolves with your organization. As you finish projects in Quip, the work remains, easily accessible to all team members, new and old.
- Increase transparency
- Onboard new hires faster
- Access from mobile/offline

Join & Write a Comment

We are happy to announce a brand new addition to our line of acclaimed email signature management products – CodeTwo Email Signatures for Office 365.
Local Continuous Replication is a cost effective and quick way of backing up Exchange server data. The following article describes the steps required to configure Local Continuous Replication. Also, the article tells you how to restore from a backup…
This lesson covers basic error handling code in Microsoft Excel using VBA. This is the first lesson in a 3-part series that uses code to loop through an Excel spreadsheet in VBA and then fix errors, taking advantage of error handling code. This l…
To add imagery to an HTML email signature, you have two options available to you. You can either add a logo/image by embedding it directly into the signature or hosting it externally and linking to it. The vast majority of email clients display l…

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now