CHAPTER 15
SECURING INTERNET ACCESS
Your network design must include provisions to maintain network security when employees connect
to the Internet. An important part of this design is your organizations Internet acceptable use policy,
which defines how employees should and should not use the Internet.
Chapter Scenario: Wide World Importers
======================================================================
winsec15.html PAGE
2 2002/05/04
Lesson 1:
Designing an Internet Acceptable Use Policy
Before securing Internet access for private network users, your organization should consider
drafting an Internet acceptable use policy.
Determining Contents of the Policy:
Before securing Internet access for private network users, your organization should consider
drafting an Internet acceptable user policy. This policy will define what is acceptable employee
usage of the Internet.
Determining Contents of the Policy
An Internet acceptable use policy must contain the following elements to ensure that private
network users understand the rules when they access the Internet using corporate resources:
virus scanner is running at all times.
The policy must define unauthorized use of the Internet.
Users could be prevented from access the Internet with unauthorized protocols.
Users could be preventing from exposing sensitive company information to persons outside the
company.
Users cannot use e-mail inappropriately.
Users could not install unauthorized software on their local desk.
Users could be prevented from accessing the Internet for personal use.
The policy must define who has ownership of resources stored on the organization’s computers.
The policy must define the consequences of performing unauthorized access. They May include:
After defining the Internet acceptable use policy, create a document outlining the policy.
The document should include a contract that employees sign before gaining access to the Internet.
======================================================================
winsec15.html PAGE
3 2002/05/04
Applying the Decision
WWI’ Internet acceptable use policy is missing a key component. The document needs to
describe the consequences of violating the policy.
Lesson Summary:
A clear definition of authorized and unauthorized actions in an Internet acceptable use policy
will allow network administrators to design a security infrastructure that enforces acceptable
Internet usage.
Lesson 2:
Securing Access to the Internet by Private Network Users
When private network users access resources on the Internet, several risks are introduced to
your network’s overall security. If they’re not carefully managed, these risks can result in
reduced security for your network.
Introducing viruses. To prevent virus attacks, deploy a virus scanning solution for your network.
Installing unauthorized software. If you ensure that users are members of the Users group, you
can restrict users to writing data to their hard disk only in common shared areas and their personal
profile directory.
Exposing private network addressing. Outbound Internet traffic could expose the IP addressing
cheme used on the internal network. A network address translation (NAT) service at the firewall
or perimeter server will replace all outgoing address information with a common address configured
at the NAT server.
======================================================================
winsec15.html PAGE
4 2002/05/04
Users attempting to bypass the established security. Once restrictions are placed on Internet access,
employees might attempt to bypass the configured security mechanisms.
You can prevent modem usage by Group Policy to disable the Remote Access Connection Service.
*** See the chart on
page 617 for review ***
Applying the Decision
Install virus scanning software at multiple locations on the network. Install all antivirus plug-in at the
mail server that scans incoming and outgoing messages for virus-infected attachments.
Preconfigure Internet Explorer to ensure that security settings are set to restrict download of specific
content. Configure the external firewall for WWI with NAT service to ensure that he private network
addressing scheme isn’t exposed on the Internet.
Restricting Internet Access to Specific Computers
By assigning users to computers, you can limit Internet Access to users who are authorized to log
on to specific computers.
Some servers must initiate connections to the Internet. Servers that require access to the Internet
through an external firewall to initiate connections include the following:
DNS Servers. DNS is a distributed database of all hosts on the Internet.
Mail Servers. Your mail server must be able to determine which mail server to deliver
mail to for a specific recipient by querying a DNS server for the recipient’s domain Mail
Exchange (MX) resource record.
FTP Servers. Active FTP clients require data transfers from the FTP server to the
FTP client to be initiated by the FTP server.
Proxy Servers. Proxy clients forward all of their Internet-bound requests to their
configured proxy server and the Proxy Server sends the requests to the Internet.
NOTE: The mail server doesn’t require DNS access to the Internet because all DNS requests are
passed to the DNS server that’s also located in the DMZ.
======================================================================
winsec15.html PAGE
5 2002/05/04
Making Decision
You must make the following decisions when determining the design of your firewall’s packet filters
to allow Internet access.
computers located within your DMZ provide secure access from Public network users.
assigned IP address.
NOTE: You can even assign static IP addresses to remote access clients by configuring the user’s
dial-up properties to request a static IP address.
Determine which protocols the computers use when accessing the Internet.
NOTE: If NAT is performed at a firewall, you must establish the packet filters at that specific
firewall to limit protocols and destination IP addresses. Once the data passes through the NAT
service, other firewalls will be unable to identify the packet’s original source.
Restricting Internet Access to Specific Users
Although it’s possible to restrict Internet access to specific computers, sometimes it’s more
appropriate to restrict access based on user accounts.
Providing Proxy Services
To manage Internet access based on user accounts, you need a service capable of enforcing which
users or groups can access the Internet. This service must provide an authentication mechanism
that can identify users and evaluate group membership. Proxy 2.0 provides this functionality
through the following services:
Web Proxy Service. Allows users to connect to Internet resources by using NTTP, HTTPS,
Gopher, and FTP through a Conseil Europee bla bla bla.
======================================================================
winsec15.html PAGE
6 2002/05/04
Windows Sockets (WINSoc) Proxy Services. Allows applications to make use of Windows
sockets to connect to servers through the Proxy Server.
Socks Proxy Service. Allows the establishment of a SOCK 4.3 protocol data channel between
a client and server with the Socks Proxy acting as an intermediary.
When the user attempts to access an Internet resource through a proxy service the user’s SID
and group SIDs are compared to the Access Control List (ACL) configured for the protocol the
user is attempting to use. If the SID is allowed access, the Proxy Server completes the connection.
Authenticating Proxy Server Requests
Proxy Server 2.0 supports three methods of authenticating users: anonymous access, basic
authentication, and Windows Integrated Authentication.
Anonymous Access. Allows anyone to use the Proxy Server services. When anonymous
authentication is enabled, the Proxy Server doesn’t request user credentials.
Basic Authentication. Allows authentication with the Proxy Server using clear text. While
this is a security risk, it’s sometimes the only way authentication can take place if non-
Microsoft Web browsers are deployed.
Integrated Windows Authentication. The user’s access token is checked to obtain
the user’s SID and any group SIDs on the access token in a process that’s transparent
to the user.
**** See the making
decision chart on page 625 ***
NOTE: You should regularly audit the Internet groups to ensure that only authorized users are
members of these groups.
Restricting Internet Access to Specific Protocols
Once a user is authenticated, configure the proxy services available in Proxy Server 2.0 to allow
access only to specific protocols. For each available protocol, assign permissions to allow only
specific groups to use the protocol through the Proxy Server.
======================================================================
winsec15.html PAGE
7 2002/05/04
NOTE: Only the Web Proxy and the WINSock Proxy support permissions based on user
accounts. The Socks Proxy permissions are based on the connection attempt’s properties.
Much like a packet filter, Socks Proxy permissions define the source and destination IP
address and port information for identifying permitted connections.
Restricting Protocol Access in the Web Proxy
Once a user is authenticated, configure the proxy services available in Proxy Server 2.0 to allow
access only to specific protocols. For each available protocol, assign permissions to allow only
specific groups to use the protocol through the Proxy Server.
NOTE: Only the Web Proxy and the WinSock Proxy support permissions based on user
accounts. The Socks Proxy permissions are based on the connection attempt’s properties.
Much like a packet filter, Socks Proxy permissions define the source and destination IP) address
and port information for identifying permitted connections.
*** See the making
decision chart on page 629 ***
Lesson Summary:
that can access the Internet.
have it without exposing the network to additional risks.
Lesson 3:
Restricting Access to Content on the Internet
Some organizations restrict Internet access based not only on users and computers, but also
on the content of the Internet resources. Restrictions may be required for:
======================================================================
winsec15.html PAGE
8 2002/05/04
Preventing Access to Specific Web Sites
Once you’ve granted access to a specific protocol, you might wish to restrict access based
on the Web site’s host. For example, your organization’s Internet acceptable use policy
may not permit access to the Internet gaming site.
Making the Decision
When designing security for private network users accessing the Internet, you can prevent
access to specific Web sites by:
Identifying Web sites that will always be unauthorized for access. You generally do this by
identifying types of Web sites that aren’t authorized.
Including the domain names in the domain filter list. By including the domain in the domain filter
list, you prevent access to any Web site within the domain.
Using the Internet Explorer Administration Kit to
Preconfigure Settings
The Internet Explorer Administration Kit (IEAK) allows you to preconfigure Internet Explorer
settings before deploying Internet Explorer to the desktops in your organization and to update
deployments on an ongoing basis.
The IEAK consists of two applications: The Internet Explorer Customization Wizard and the
IEAK Profile Manager.
You can configure the following security related options within the IEAK Customization Wizard:
configuration settings to be downloaded from the .ins file created by the IEAK Profile Manager.
CAs) trusted by Internet Explorer.
which a Web site is located.
Making the Decision
======================================================================
winsec15.html PAGE
9 2002/05/04
You must consider the following items when planning consistent security configuration of
Internet Explorer within an organization:
and .ins file that’s automatically downloaded to Internet Explorer clients if the browser has the
automatically Detect Settings setting enabled.
connect to the property pages, they can’t modify the standard settings and weaken security.
Managing Content Downloads
Internet Explorer allows you to use security zones to manage what content can be downloaded
from Web sites.
classes and content in the Temporary Internet Files folder.
specific forms of content.
zones.
user but prompts before downloading signed Active X controls and prevents the downloading
of unsigned ActiveX controls.
before the content can be downloaded.
ability to download Java and Active X controls.
======================================================================
winsec15.html PAGE
10 2002/05/04
Preventing Access to Specific Types of Content
Many Web sites contain content that isn’t appropriate for business purposes. Content that falls
into this category can include nudity, sex, language and violence.
You can block access to Web sites that contain unauthorized content by using plug-ins that
allow content scanning at the Proxy Server. If any inappropriate content is discovered, the
Proxy Server won’t load the materials and instead inform the user that the content is blocked.
Making the Decision
Take the following actions when designing a strategy to block specific types of Internet content:
Lesson Summary:
to certain property pages. By removing the ability to modify configurations, you can ensure that
the desired default settings are maintained.
Lesson 4:
Auditing Internet Access
You can enable Proxy Server 2.0 auditing to track all Internet access performed by the Proxy
Server. If unauthorized access is performed, the logs provide evidence that allows the
administrator to implement restrictions to block further access.
======================================================================
winsec15.html PAGE
11 2002/05/04
Designing Proxy Server Auditing
Proxy Server 2.0 enables logging of actions performed by the Web Proxy, WinSock Proxy,
and Socks Proxy services. The log data allows an administrator to review all Internet access.
Unless logging is enabled, there’s no way to ensure that the Proxy Server is properly configured
and that employees are obeying Internet acceptable use policy. There are several log files:
Web Proxy Log (W3yymmdd.log). audits all access performed by the Web Proxy
service.
WinSock Proxy log (Wsyymmdd.log). Audits all access performed by the WinSock
Proxy Service.
Socks Proxy Log (Spyymmdd.log). Audits all access performed by the Socks Proxy
Service.
NOTE: Depending on the amount of logging, you can choose to create new log files every day,
week or month. The interval that you select will be based on the amount of data being logged
and the amount of disk space available for storing the log files.
Alternately, you can log the proxy services to an Open Database Connectivity (ODBC)
compliant database such as Microsoft SQL server.
NOTE: Proxy Server 2.0 includes SQL scripts for creating the SQL database tables required
to store the Proxy Server logs.
Lesson Summary:
connect to the Internet. You must perform regular auditing of Internet usage to ensure that
existing policies are being followed.