11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

778 <strong>Improving</strong> <strong>Web</strong> <strong>Application</strong> <strong>Security</strong>: <strong>Threats</strong> <strong>and</strong> CountermeasuresWhat You Must KnowBefore you start to configure IPSec, you should be aware of the following.Identify Your Protocol <strong>and</strong> Port RequirementsBefore you create <strong>and</strong> apply IPSec policies to block ports <strong>and</strong> protocols, make sureyou know which communication you need to secure including the ports <strong>and</strong>protocols used by day-to-day operations. Consider the protocol <strong>and</strong> portrequirements for remote administration, application communication, <strong>and</strong>authentication.IPSec Does Not Secure All CommunicationSeveral types of IP traffic are exempt from filtering. For more information, seeMicrosoft Knowledge Base article 253169, “Traffic That Can <strong>and</strong> Cannot Be Securedby IPSec.”Firewalls <strong>and</strong> IPSecIf a firewall separates two hosts that use IPSec to secure the communication channel,the firewall must open the following ports:● TCP port 50 for IPSec Encapsulating <strong>Security</strong> Protocol (ESP) traffic●●TCP port 51 for IPSec Authentication Header (AH) trafficUDP port 500 for Internet Key Exchange (IKE) negotiation trafficFilters, Filter Actions, <strong>and</strong> RulesAn IPSec policy consists of a set of filters, filter actions, <strong>and</strong> rules.●FiltersA filter is used to match traffic. It consists of:●●●●A source IP address or range of addressesA destination IP address or range of addressesAn IP protocol, such as TCP, UDP, or “any”Source <strong>and</strong> destination ports (for TCP or UDP only)Note An IP filter list is used to group multiple filters together so that multiple IP addresses <strong>and</strong>protocols can be combined into a single filter.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!