MCSE Training Kit (Exam 70-220): Designing Microsoft Windows 2000 Network Security: Designing Microsoft(r) Windows(r) 2000 Network Security (IT-Training Kits)

Lab Objectives

This lab prepares you to design security for Internet-accessible resources in a DMZ by meeting the following objectives:

About This Lab

This lab looks at designing a DMZ for the Contoso Ltd. extranet to expose services to the Internet in a secure manner. Once you've established a DMZ configuration, you will design the internal and external firewalls packet filters to allow only authorized protocols to enter and exit the DMZ and private network.

Before You Begin

Make sure that you've completed reading the chapter material before starting the lab. Pay close attention to the sections where the design decisions were applied throughout the chapter for information on building your administrative structure.

Scenario: Contoso Ltd.

Contoso Ltd., an international magazine sales company, wants to design a DMZ to protect Internet-accessible resources by allowing only authorized protocols to enter and exit the DMZ.

Your DMZ design must meet the following business objectives:

Internet-Accessible IP Addresses

Contoso owns the contoso.tld domain on the Internet. While this is the same domain as the Active Directory forest root, the two namespaces are maintained separately to ensure that the private network IP addresses aren't exposed to the Internet. On the Internet the following DNS resource records are available to public network users:

@ IN SOA ns.contoso.tld. admin.contoso.tld. ( 6 ; serial number 900 ; refresh 600 ; retry 86400 ; expire 3600 ) ; minimum TTL @ NS ns.contoso.tld. @ MX 10 mail.contoso.tld. mail A 131.107.99.3 ns A 131.107.99.2 vpn A 131.107.100.3 www A 131.107.99.4

Server Roles

Each server in the DMZ plays a specific role in Contoso's extranet services. The following list defines each role:

Exercise 1: Planning the DMZ Configuration

An external consultant has proposed the DMZ configuration shown in Figure 14.23. In this exercise you will evaluate the DMZ configuration, and, if necessary, modify the DMZ configuration to meet Contoso's business needs. Answers to these questions can be found in the appendix.

Figure 14.23 Proposed DMZ configuration for Contoso Ltd.

  1. Are there any problems with the proposed DMZ configuration?

  2. If the IP address of the VPN server were changed to 172.29.100.206, would this meet Contoso's security requirements and validate the DMZ configuration?

  3. Given that Contoso has funds for only two firewalls, what modifications can you make to the DMZ to meet all security design objectives? What features must be supported by the external firewall to meet these objectives?

  4. Draw your proposed DMZ configuration.

Answers

Exercise 2: Designing Packet Filters for the DMZ

This exercise looks at the specific packet filters required at both the internal and external firewall to secure public network access and private network access to resources in the DMZ. You must design the packet filters based on the DMZ configuration shown in Figure 14.24.

Figure 14.24 Modified DMZ configuration for Contoso Ltd.

When you design the necessary packet filters, assume that both the internal and external firewalls support mirroring of packet filters.

Securing DNS Access

You must secure DNS so that only the traffic patterns shown in Figure 14.25 are allowed to enter and exit the DMZ.

Figure 14.25 Allowed access to and from the DNS servers in the private network and the DMZ

Answer the following questions based on this situation. Answers can be found in the appendix.

  1. In the following table, enter the packet filters that you must enter at the internal firewall to allow only the ns1.contoso.tld and ns2.contoso.tld DNS servers to forward DNS queries to the ns.contoso.tld DNS server in the DMZ.

    Protocol Source IP Source Port Target IP Target Port Transport Protocol Action
    DNS
    DNS
    DNS
    DNS
    DNS
    DNS

  2. In the following table, enter the packet filters that you must enter at the external firewall to allow the ns.contoso.tld DNS servers to query other DNS servers on the Internet and to allow public network users to query the ns.contoso.tld DNS server for contoso.tld resource records.

    Protocol Source IP Source Port Target IP Target Port Transport Protocol Action
    DNS
    DNS
    DNS
    DNS

  3. Can you perform any other configuration changes at the external DNS server to increase security?

Securing Web Access

You must configure the externally accessible Web NLBS cluster to allow only the traffic patterns shown in Figure 14.26 to pass through the internal and external firewalls.

Figure 14.26 Allowed access to and from the Web cluster

Answer the following questions based on this situation. Answers can be found in the appendix.

  1. In the following table, enter the packet filters that you must configure at the internal firewall to secure Web-related transmissions between the private network and the DMZ.

    Protocol Source IP Source Port Target IP Target Port Transport Protocol Action
    IKE
    ESP
    IKE
    ESP
    IKE
    ESP
    IKE
    ESP
    HTTP
    HTTPS

  2. Why must you create separate entries for the nodes in the NLBS cluster for IPSec connections from the Web administrator's computer?

  3. In the following table, enter the packet filters that you must configure at the external firewall to secure Web-related transmissions between the public network and the DMZ.

    Protocol Source IP Source Port Target IP Target Port Transport Protocol Action
    HTTP
    HTTPS

  4. What can you apply to the node servers in the NLBS cluster to ensure that maximum security is applied to the Web server?

  5. Complete the following table of static address mapping that you must configure at the external firewall.

    Host Name External IP Address Internal IP Address
       

Securing VPN Server Access

You must secure the VPN server located in the DMZ, as shown in Figure 14.27, so that only the following traffic patterns are allowed to interact with the DMZ and the private network:

Figure 14.27 Allowed access to and from the VPN server

Answer the following questions based on this situation. Answers can be found in the appendix.

  1. In the following table, enter the packet filters that you must configure at the internal firewall to allow VPN users to connect to any server in the private network.

    Protocol Source IP Source Port Target IP Target Port Transport Protocol Action
    RADIUS- Auth
    Any

  2. In the following table, enter the packet filters that you must configure at the external firewall to allow VPN users to connect to the tunnel server and to the mail server once they authenticate with the network.

    Protocol Source IP Source Port Target IP Target Port Transport Protocol Action
    PPTP
    GRE
    IKE
    ESP
    RADIUS- Accting
    Any

  3. Why do you have to establish rules at the external firewall for allowing access to resources on the private network?

Securing Mail Access

The mail server located in the DMZ is running Exchange Server 5.5. Figure 14.28 shows the traffic patterns that must be allowed to access the Exchange Server from the public network, the external DMZ, and the private network.

Figure 14.28 Allowed access to and from the mail server

Answer the following questions based on this situation. Answers can be found in the appendix.

  1. In the following table, enter the packet filters that you must configure at the internal firewall to allow private network users to access the mail server.

    Protocol Source IP Source Port Target IP Target Port Transport Protocol Action
    Any

  2. Do you need to create a separate packet filter to allow private network mail servers on the London network to connect to the mail server in the DMZ?

  3. In the following table, enter the packet filters that you must configure at the external firewall to allow VPN users to access the mail server and to allow Internet e-mail to be exchanged with the mail server in the DMZ.

    Protocol Source IP Source Port Target IP Target Port Transport Protocol Action
    SMTP
    SMTP
    Any

  4. If private network users were allowed to access the mail server using Outlook Web Access (OWA) by connecting to the URL https://mail.contoso.tld/exchange/, what additional packet filter would be required at the external firewall?

    Protocol Source IP Source Port Target IP Target Port Transport Protocol Action
               

Answers

Категории