Title: Advanced Application and Web Filtering
1Advanced Application and Web Filtering
2Common security attacks
- Finding a way into the network
- Exploiting software bugs, buffer overflows
- Denial of Service
- TCP hijacking
- Packet sniffing
- Social problems
3Common security attacks
- Finding a way into the network
- Exploiting software bugs, buffer overflows
- Denial of Service
- TCP hijacking
- Packet sniffing
- Social problems
Firewalls
Intrusion Detection Systems
Ingress filtering, IDS
IPSec
Encryption (SSH, SSL, HTTPS)
Education
4Types of Firewalls
- Packet Filtering
- Stateful Inspection
- Application-Layer Inspection
5Application filter and Web Filter
- Application filters work with the firewall
service in ISA Server to intercept and process
network packets as they pass through ISA Server - Application filters examine the application-level
- Web filters are used to mediate HTTP, HTTPS, and
FTP tunneled
6Application Filters
- SMTP filter
- DNS filter
- POP Intrusion Detection filter
- SOCKS V4 filter
- FTP Access filter
- H.323 filter
- MMS filter
- PNM filter
- PPTP filter
- RPC filter
- RTSP filter
7The SMTP Filter
if a command that is sent over the SMTP channel
is not on this list, it is dropped
8The DNS Filter
- Three attacks
- DNS host name overflow
- DNS length overflow
- DNS zone transfer
9The SOCKS V4 Filter
10Web Filters
- HTTP Security filter
- ISA Server Link Translator
- Web Proxy filter
- SecurID filter
- OWA Forms-based Authentication filter
11The HTTP Security Filter (HTTP Filter)
- HTTP Security Filter Settings
- HTTP Security Filter Logging
- Disabling the HTTP Security Filter for Web
Requests - Exporting and Importing HTTP Security Filter
Settings - Investigating HTTP Headers for Potentially
Dangerous Applications - Example HTTP Security Filter Policies
- Commonly Blocked Application Signatures
- The Dangers of SSL Tunneling
12The HTTP Security Filter (HTTP Filter)
13Overview of HTTP Security Filter Settings
- General Tab can configure the following options
- Maximum header length
- Payload length
- Maximum URL length
- Verify normalization
- Block high bit characters
- Block responses containing Windows executable
content
14Overview of HTTP Security Filter Settings
- Methods tab control what HTTP methods are used
through an Access Rule or Web Publishing Rule - Three options
- Allow all methods
- Allow only specified methods
- Block specified methods (allow all others)
15Overview of HTTP Security Filter Settings
16Overview of HTTP Security Filter Settings
- The Extensions Tab control what file extensions
are allowed to be requested through the ISA
firewall - Option
- Allow all extensions
- Allow only specified extensions
- Block specified extensions (allow all others)
- Block requests containing ambiguous extensions
17Overview of HTTP Security Filter Settings
18Overview of HTTP Security Filter Settings
- An HTTP header contains HTTP communication
specific information that is included in HTTP
requests made from a Web client and HTTP
responses sent back to the Web client from a Web
server. - Option on Header Tab
- Allow all headers except the following
- Server header
- Via header
19Overview of HTTP Security Filter Settings
- Common HTTP headers
- Content-length
- Pragma
- User-Agent
- Accept-Encoding
20Overview of HTTP Security Filter Settings
21Overview of HTTP Security Filter Settings
- The Signatures tab allows you to control access
through the ISA firewall based on HTTP signatures
you create - These signatures are based on strings contained
components of an HTTP communication - Request UR L
- Request headers
- Request body
- Response headers
- Response body
22The ISA Server Link Translator
- Link Translation solves a number of issues that
may arise for external users connecting through
the ISA firewall to an internal Web site
Link Translation Tab in Web Publishing Rule
Properties
23The Web Proxy Filter
- The Web Proxy filter allows connections from
hosts not configured as Web Proxy clients to be
forwarded to the ISA firewalls Cache and Web
Proxy components
24The OWA Forms-Based Authentication Filter
- Used to mediate Forms-based authentication to OWA
Web sites that are made accessible via ISA
firewall Web Publishing Rules.
25IP Filtering and Intrusion Detection/IntrusionPre
vention
- Common Attacks Detection and Prevention
- DNS Attacks Detection and Prevention
- IP Options and IP Fragment Filtering
26Common Attacks Detection and Prevention
27DNS Attacks Detection and Prevention
- DNS host name overflow
- DNS length overflow
- DNS zone transfer
28IP Options and IP Fragment Filtering