Logo
Windows XP
Windows Vista
Windows 7
Windows Azure
Windows Server
Windows Phone
EPL Standings
 
 
Windows Server

Windows Server 2003 : Protecting Hosts with Windows Host Firewalls - Protocol Filters

5/3/2013 5:41:38 PM

1. Protocol Filters

The Windows Firewall and the RRAS Basic Firewall are not the only options available for restricting incoming traffic. Several options exist that can be used to permit and/or block traffic by setting protocol filters. TCP/IP Filters can be set directly on the network connection. Routing and Remote Access Policies provide an option to set remote access protocol filters. IPSec policies can be established that block or permit access to specific ports. Unlike the Windows Firewall, the RRAS Basic Firewall protocol filters are not stateful. Protocol filters can be set for incoming and outgoing traffic.

1.1. TCP/IP Filters

Basic protocol filters can be established on any TCP/IP interface. These packet filters are static filters and only operate to filter inbound TCP/IP communications based on port or protocol IP number. If TCP/IP filters are configured, all traffic is dropped except for what is sent to the ports and/or protocol IP numbers specified in the interface. In this way, filtering occurs by exception; either it is not used at all, or only those ports defined in the filter are listening for incoming traffic.

To create packet filters on an interface, begin by opening the interface Properties page. Click Start, then select and open Control Panel. Select and open "Network connections," then right-click on the desired network interface and click Properties. Click the Advanced button. Select the Options tab and click the Properties button. You will see the screen shown in Figure 1.

Select Enable TCP/IP Filtering (All Adapters). For each box (TCP Ports, UDP Ports, and IP Protocols), leave the default Permit All or select Permit Only. If Permit Only is

Figure 1. Simple protocol filters can be configured within the TCP/IP properties pages

selected, click the Add button and enter a port to allow and then click OK. Repeat the process until all required ports have been selected and appear in the boxes.

By default, TCP/IP filters will block all communications with the exception of those protocols you configure. Before enabling filtering, ensure that you understand what ports are required.


1.2. Routing and Remote Access Protocol Filters

In addition to providing a basic firewall service, protocol filters can be added to an RRAS routing interface, or to an RRAS remote access policy. To set remote access protocol filters, create a remote access policy or configure filters for an existing policy. The policy should establish parameters for connectivity. Adding inbound and outbound filters is an additional configuration item. Packet filters can be configured for inbound and outbound traffic, and can be set to pass all traffic except packets defined in filters, or to discard all traffic except packets allowed by filters.

To configure protocol filters on a routing interface, begin by opening the RRAS console and selecting the General node. In the detail pane, right-click the interface on which to add a filter and click Properties. Click the General tab and then click either Inbound Filters or Outbound Filters. Select the filter action. Click New to add a port to filter. On the "Add IP filter" page, select either Source Network or Destination Network. Enter the IP address and subnet mask. Use the drop-down Protocol box to select TCP, UDP, ICMP, Any, or Other. Enter the required source and destination port. Click OK twice to return to the General page. Repeat the process to add additional filters.

1.3. Filtering Using IPSec

The IPSec protocol is built into the network stack of Windows Server 2003. In addition to providing security for communications between hosts on a LAN, IPSec can also be configured to block or permit inbound and/or outbound communications. An IPSec policy is composed of one or more rules, each of which can contain multiple filters. Each IPSec filter defines a source and destination IP address, and source and destination port or protocol ID. Therefore, in addition to filtering based on port alone, IPSec can block communications based on port and IP address combinations. A filter action determines whether the specific packet is blocked or permitted. IPSec policies can be simple (such as one that "blocks all traffic to port 23"), be a combination of filters (such as "block all traffic except port 80 traffic from this specific range of IP addresses"), and be quite complex (with multiple inbound and outbound filters).

All IPSec filters are static filters. IPSec policies can be implemented locally, or applied via a Group Policy if the computer is joined in a domain.

2. Which Firewall Services Should You Use?

With so many options for creating host-based firewall services, which option should be used? Like most security decisions, the answer is, "It depends." Many factors are likely to influence this decision, but the most important deciding factors are your specific business and security requirements. Use Table 1 to select a firewall service that meets all of your requirements. If multiple services do so, in most cases the one that is simplest to implement will be the best choice.

Table 1. Firewall services decision points
AttributeTCP/IP protocol filteringWindows FirewallIPSecRRAS basic firewallRRAS protocol filters
Implementation difficultySimplestSimpleComplexSimple to complexSimple to complex
Direction of traffic that can be filteredInboundInboundInbound and outboundInbound and outboundInbound and outbound
Filters can be based on the IP address of the sourceNoYes (called exception scope)YesYesYes
Provides a DHCP allocatorNoThe Windows Firewall used with ICSNoYesYes
DHCP range is configurableN/ANoN/AYesYes
Designed to be combined with NAT on the same systemNoThe Windows Firewall used with ICSNoBasic firewall plus NATNo
Can be managed via Group PolicyNoYesYesNoNo
Provides options for central managementNoVia Group PolicyGroup PolicyIAS and remote access policiesIAS and remote access policies
Provides static filteringYesYesYesYesYes
Provides stateful filteringNoYesNoYesNo
Provides application layer filteringNoNoNoNoNo

Other -----------------
- Windows Server 2003 : Protecting Hosts with Windows Host Firewalls - Routing and Remote Access Basic Firewall
- System Center Configuration Manager 2007 : Customizing Configuration Manager Reports (part 3) - Reporting on Custom Data
- System Center Configuration Manager 2007 : Customizing Configuration Manager Reports (part 2) - Customizing Report Data Selection
- System Center Configuration Manager 2007 : Customizing Configuration Manager Reports (part 1) - Customizing Report Layout and Display
- System Center Configuration Manager 2007 : Reporting - Dashboards
- Client Access to Exchange Server 2007 : Getting the Most Out of the Microsoft Outlook Client - Deploying Outlook 2007
- Client Access to Exchange Server 2007 : Getting the Most Out of the Microsoft Outlook Client - Understanding RPC Over HTTPS in Outlook 2007
- SharePoint 2010 : Farm Governance - Configuring Resource Throttling
- SharePoint 2010 : Farm Governance - Creating a new policy for a web application
- Workflow in Dynamics AX 2009 : Windows Workflow Foundation, Automating Business Processes
- Workflow in Dynamics AX : Dynamics AX 2009 Workflow Infrastructure
- Microsoft Dynamics CRM 2011 : Using Advanced Find (part 5) - Using Edit Multiple Records and Assign Multiple Records from Advanced Find
- Microsoft Dynamics CRM 2011 : Using Advanced Find (part 4) - Using Advanced Filter Criteria
- Microsoft Dynamics CRM 2011 : Using Advanced Find (part 3) - Creating and Sharing a Saved View
- Microsoft Dynamics CRM 2011 : Using Advanced Find (part 2) - Organizing and Formatting Advanced Find Results
- Microsoft Dynamics CRM 2011 : Using Advanced Find (part 1) - Performing Advanced Find Queries
- System Center Configuration Manager 2007 : Available Reports and Use Cases (part 4) - Asset Intelligence, Reporting on Application Compatibility
- System Center Configuration Manager 2007 : Available Reports and Use Cases (part 3) - Client Status Reporting
- System Center Configuration Manager 2007 : Available Reports and Use Cases (part 2) - Reporting on Sites, Reporting on Configuration Manager Operations
- System Center Configuration Manager 2007 : Available Reports and Use Cases (part 1) - Reporting on Inventory and Discovery Data
 
 
Most view of day
- Troubleshooting Hardware, Driver, and Disk Issues : How to Use Built-In Diagnostics (part 4)
- Accessing and Using Your Network : Working with Offline Files and the Sync Center (part 2) - Synchronizing Offline Files, Handling Synchronization Conflicts
- Advanced Windows 7 Programming : Working in the Background - DEVELOPING TRIGGER-START SERVICES (part 3)
- Microsoft Exchange Server 2010 : Managing Transport and Journaling Rules - Setting Up Message Classifications (part 1)
- Microsoft Systems Management Server 2003 : Using the Distribute Software To Collection Wizard
- System Center Configuration Manager 2007 : Reporting Configuration (part 2) - Copying ConfigMgr Classic Reports to SQL Reporting Services, Report Categories
- Microsoft Visio 2010 : Formatting Individual Shapes (part 3) - Finding More Options, Formatting Groups
- Configuring Startup and Troubleshooting Startup Issues : The Process of Troubleshooting Startup (part 1) - Startup Troubleshooting Before the Starting Windows Logo Appears
- Microsoft Visio 2010 : Creating and Validating Process Diagrams - Understanding BPMN, Creating and Validating BPMN Diagrams
- Microsoft Visio 2010 : Organizing and Annotating Diagrams - Layers
Top 10
- Windows Server 2012 : DHCP,IPv6 and IPAM - Exploring DHCP (part 3) - Creating IPv4 DHCP Scopes
- Windows Server 2012 : DHCP,IPv6 and IPAM - Exploring DHCP (part 2) - Installing DHCP Server and Server Tools
- Windows Server 2012 : DHCP,IPv6 and IPAM - Exploring DHCP (part 1)
- Windows Server 2012 : DHCP,IPv6 and IPAM - Understanding the Components of an Enterprise Network
- Microsoft OneNote 2010 : Using the Research and Translate Tools (part 3) - Translating Text with the Mini Translator
- Microsoft OneNote 2010 : Using the Research and Translate Tools (part 2) - Translating a Word or Phrase with the Research Pane
- Microsoft OneNote 2010 : Using the Research and Translate Tools (part 1) - Setting Options for the Research Task Pane, Searching with the Research Task Pane
- Microsoft OneNote 2010 : Doing Research with Linked Notes (part 2) - Ending a Linked Notes Session, Viewing Linked Notes
- Microsoft OneNote 2010 : Doing Research with Linked Notes (part 1) - Beginning a Linked Notes Session
- Microsoft OneNote 2010 : Doing Research with Side Notes (part 3) - Moving Side Notes to Your Existing Notes
 
 
Windows XP
Windows Vista
Windows 7
Windows Azure
Windows Server
Windows Phone
2015 Camaro