11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

How To: Use IPSec for Filtering Ports <strong>and</strong> Authentication 779●●Filter ActionsA filter action specifies which actions to take when a given filter is invoked. It canbe one of the following:● Permit. The traffic is not secured; it is allowed to be sent <strong>and</strong> received withoutintervention.● Block. The traffic is not permitted.● Negotiate security. The endpoints must agree on <strong>and</strong> then use a secure methodto communicate. If they cannot agree on a method, the communication does nottake place. If negotiation fails, you can specify whether to allow unsecuredcommunication or to whether all communication should be blocked.RulesA rule associates a filter with a filter action <strong>and</strong> is defined by the IPSec policy.Restricting <strong>Web</strong> Server CommunicationThe following example shows you how to use IPSec to limit communicationwith a <strong>Web</strong> server to port 80 (for HTTP traffic) <strong>and</strong> port 443 (for HTTPS trafficthat uses SSL.) This is a common requirement for Internet-facing <strong>Web</strong> servers.Note After applying the steps below, communication will be limited to port 80 <strong>and</strong> 443. In a realworld environment, you will require additional communication such as that required for remoteadministration, database access <strong>and</strong> authentication. A complete IPSec policy, in a productionenvironment, will include all authorized communication. Create filter actions1. Start the Local <strong>Security</strong> Policy Microsoft Management Console (MMC) snap-in.2. Right-click IPSec <strong>Security</strong> Policies on Local Machine, <strong>and</strong> then click Manage IPfilter lists <strong>and</strong> filter actions.3. Click the Manage Filter Actions tab.4. Click Add to create a new filter action, <strong>and</strong> then click Next to move past theintroductory Wizard dialog box.5. Type MyPermit as the name for the new filter action. This filter action is used topermit traffic.6. Click Next.7. Select Permit, click Next, <strong>and</strong> then click Finish.8. Create a second filter action called “MyBlock” by repeating steps 4 to 8. This time,select Block when you are prompted by the Filter Action dialog box.9. Click Close to close the Manage IP filter lists <strong>and</strong> filter actions dialog box.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!