I stepped through how the process of network access quarantine control (NAQC) works and offered detailed deployment instructions. In this second and final installment, I'll continue the procedure by finishing the deployment, then discuss how ISA Server 2004's entrance to the marketplace changes the field of NAQC and how quarantining is implemented within ISA Server itself. Let's start where we left off. Distributing the Profile to Remote UsersThe profile you created in the previous installment of this article is made into an executable file that can be distributed to your remote users and run on their systems automatically, creating a profile without any additional intervention. There are several options for getting that executable file to your users. You could transmit the executable file as an attachment to an e-mail message, or better yet, a link to the executable file hosted on a web server somewhere. In the e-mail message, you could include instructions to run the file and use that new connectoid for all future remote access. You could also have the executable run as part of a logon or logoff script, but to do that, you'd need to either have your users log on through a dial-up connection, or wait until the mobile users return to the home network and connect remotely to your corporate campus or network. Regardless of which method you choose to initially transmit the profile installer to your users, you should always place the latest version of the profile installer on a quarantined resource somewhere, so client computers that don't pass your baseline script's compliancy checks can still surf to the required web site and download the latest version without compromising the integrity of your network further. Configuring the Quarantine PolicyThe final step in the deployment process is to configure the actual quarantine policy within RRAS. In this section, I'll create a quarantine policy within RRAS that assumes you've posted the profile installer on a web server that is functioning as a quarantined resource. If RRAS is configured to use the Windows authentication provider, then RRAS uses Active Directory or an NT 4 domain (remember, the RRAS machine needs only to be running Windows Server 2003; it doesn't need to belong to an Active Directory-based domain) to authenticate users and look at their account properties. If RRAS is configured to use RADIUS, then the RADIUS server must be a Server 2003 machine running IAS. Incidentally, IAS also uses Active Directory or an NT domain to authenticate users and look at their account properties. Configuring RRAS
Configure attributes to be quarantinedNow, you need to actually configure the attributes that will be assigned to the quarantined session.
Creating Exceptions to the RuleWhile it is certainly advantageous to have all users connected through a quarantined session until their configurations can be verified, there may be logistical or political problems within your organization that mitigate this requirement. If so, this simplest way to excuse a user or group of users from participating in the quarantine is to create an exception security group with Active Directory. The members of this group should be the ones that need not participate in the quarantining procedure. Using that group, create another policy that applies to the exceptions group that's configured with the same settings as the quarantine remote access policy you created earlier. This time, though, don't add or configure either the MS-Quarantine-IPFilter or the MS-Quarantine-Session-Timeout attributes. Once the policy has been created, move the policy that applies to the exceptions group so that it is evaluated before the policy that quarantines everyone else. Extending Functionality with ISA Server 2004Quarantine Control for ISA Server 2004 works with the Routing and Remote Access service, as described earlier in this article. The main difference lies in the fact that with ISA Server, you can require that a client attempting to log in is assigned to the Quarantined VPN Clients network in ISA, with an associated firewall policy that is very stringent, until the Connection Manager running on the desktop passes a message to ISA indicating the client passed the integrity check. Like the plain vanilla NAQC technique, ISA quarantining does rely on Connection Manager profiles and requires a baseline script to be developed that is custom to your environment. Within ISA Server 2004, you have two options with regard to configuring quarantine functionality: you can enable quarantining using the Routing and Remote Access Service, which does require Windows Server 2003. Using this method, the quarantined clients go through the normal authentication and integrity check policies and ISA Server lets them join the regular VPN Clients network, as seen within the ISA Server interface, only when they've passed the check. You can also enable quarantining through ISA Server itself, and clients can make use of the integrated Quarantined VPN Clients network and any firewall policies associated therewith. The main strength of this method is that you can use quarantining on any ISA Server computer, not just those with Windows Server 2003 installed. ISA Server quarantining supports a more robust timeout feature, allowing clients to remain in the Quarantined VPN Clients network for a specific number of seconds before being disconnected, and it also supports an exception list, which allows you to identify users (via either Active Directory or a RADIUS server) that should not be quarantined no matter what. The listening components for quarantining have been upgraded specifically for ISA Server support and are available in the ISA Server 2004 Resource Kit, which can be obtained from the Microsoft site. To enable quarantining with ISA Server:
Once you have completed these steps, from the ISA Server 2004 Resource Kit find the ConfigureRQSforISA.vbs script and run it. This will automatically create an access rule within ISA that will allow traffic to pass on port 7250 from both the VPN Clients and the Quarantined VPN Clients networks to the Local Host network. This is crucial traffic, because notifications from client computers that they have passed the integrity checks and are eligible to move to the regular network are sent on this port. You might also consider establishing access rules for the Quarantined VPN Clients network that do the following:
ConclusionIn this article, I've discussed quarantining using services included in Windows Server 2003 and its associated resource kits and feature packs, and I've also touched on extended quarantine functionality within ISA Server. Your use of these techniques will help prevent or minimize the impact compromised remote hosts pose to your network when they attempt to connect. |
About the author Jonathan Hassell is an author and consultant specializing in Windows administration and security. He is the author of Managing Windows Server 2003 and RADIUS, both published by O'Reilly & Associates, and Hardening Windows, published by Apress. He also holds periodic public seminars; see www.hardeningwin.com for details. He has written for Windows & .NET Magazine and WindowsITSecurity.COM and is a contributor to PC Pro, a leading computer magazine in the United Kingdom. |
Deploying Network Access Quarantine Control, Part 2
627
Bạn nên đọc
0 Bình luận
Sắp xếp theo
Xóa Đăng nhập để Gửi
Cũ vẫn chất
-
Hướng dẫn toàn tập Word 2016 (Phần 1): Làm quen với giao diện Ribbon
Hôm qua -
Lời chúc Giáng sinh cho người yêu lãng mạn, chúc Noel người yêu ngọt ngào
Hôm qua -
Cách xem phim mới, phim hay trực tuyến
Hôm qua 1 -
Cách sửa lỗi Android Auto không hoạt động
Hôm qua -
Cách thu hồi email đã gửi trong Gmail
Hôm qua -
Cách tải, cài đặt và cập nhật driver microphone Win 10
Hôm qua -
Cách khắc phục lỗi PXE-E61: Media Test Failure, Check Cable
Hôm qua -
7 cách sửa lỗi "Compressed (Zipped) Folder Is Invalid" trên Windows
Hôm qua -
Hướng dẫn sửa lỗi WinRAR diagnostic messages, file nén tải về bị lỗi
Hôm qua 1 -
Cách di chuyển bảng trong Word
Hôm qua