Using ISA Server 2006 to Protect Active Directory One-Way Forest Trusts
From http://blog.msfirewall.org.uk/2008/06/using-isa-server-2006-to-protect-active.html
An area that I get involved with my 'day job' quite a lot is protecting Microsoft Office SharePoint Server (MOSS) 2007 and Windows SharePoint Services (WSS) extranets with ISA Server. Depeding on the customer needs, and security policy, this often results in an architecture design that includes a one-way Microsoft Active Directory forest trust. The key concept of this model is to solve two things; namely functionality and security.
So, lets look at functionality first - this is the 'forest trust' bit:
By using a forest trust we have a way for both internal and external users to share extranet resources. By its very nature, a forest trust is often popular because it ensures that internal users will be able to access extranet information transparently. By this we mean that users will be able to use their normal Windows credendials (that they are normally logged in with) to access extranet resources without the user even realising that this is occuring.
Next, lets look at security next - this is the 'one-way' bit:
Placing external users into an internal Active Directory environement, the 'Intranet forest', is never really a good idea, as the forest is the only real security boundary in Active Directory. Subsequently, a common solution is to create an 'Extranet forest' that is used to host external user credentials and create an isoltation point or segmented boundary from internal users. This makes the security people happy, and by way of a forest trust, this makes the users happy because it 'just works'. However, to make the security people even happier and to protect against account compomise in the Extranet forest, we ensure that the trust relationship between these two 'zones' is configured such that the Externet forest trusts the Intranet forest, but the Intranet forest DOES NOT trust the Extranet forest; hence the term 'one-way'. In this scenario, the Intranet forest would be termed 'Trusted' and the Extranet forest termed 'Trusting'.
So, what does this have to do with ISA then? Well, in addition to creating logical separation with forest boundaries, the model also normally includes some form of physical segmentation. This often results in the Extranet forest being placed into a perimeter network away from the internal network. In order to create this boundary and define the perimeter network, ISA Server is an ideal choice as the border firewall between these two security zones.
When you consider the communications that are required in order to support a forest trust, you will soon realise that you need a good application-layer firewall, ideally one that is able to inspect and control RPC traffic as this protocol is notoriously difficult to secure with most firewalls. If you combine this with the level of protection ISA Server can provide specifically for MOSS/WSS, it is not difficult to understand why ISA Server is often a key component in the overall security landscape for MOSS/WSS extranet solutions.
Obviously, I have over simplified things quite a bit and there are lots of other potential models (like the External Collaboration Toolkit for SharePoint for example) which could be used. However, a one-way forest trust model architetcure doesn't have to be just for extranets, they can pop up all over the place! You can also find a similar model in our old friend the Windows Server System Reference Architecture document set.
An overview of the architecture and concept being discussed is provided below:
A lot of the communications or protocols defined in this blog entry are based upon the following whitepaper and KB article. However, I found that these articles weren't clear enough in places and needed 'improving' based upon real-world findings from using ISA Server as part of the solution with customers.
So, based upon the above, we can summarise the necessary firewall policies as follows:
- AD Forest Trust: Allow Access for Forest Trust Creation/Validation
- AD Forest Trust: Allow Access for Conditional DNS Forwarding
- AD Forest Trust: Allow Access for Kerberos Client Authentication
- AD Forest Trust: Allow Access for NTLM Client Authentication
- AD Forest Trust: Allow Access for Object Picker (Extranet Web Servers)
- AD Forest Trust: Allow Access for Object Picker (Extranet Domain Controllers)
- AD Forest Trust: Allow Access for Object Picker (Extranet ISA Servers)
An overview of each rule is provided below:
AD Forest Trust: Allow Access for Forest Trust Creation/Validation
AD Forest Trust: Allow Access for Conditional DNS Forwarding
AD Forest Trust: Allow Access for Kerberos Client Authentication
AD Forest Trust: Allow Access for NTLM Client Authentication
AD Forest Trust: Allow Access for Object Picker (Extranet Web Servers)
AD Forest Trust: Allow Access for Object Picker (Extranet Domain Controllers)
AD Forest Trust: Allow Access for Object Picker (Extranet ISA Servers)
Extranet-DC1 => Computer object for the First Domain Controller in the Extranet forest.
Extranet-DC2 => Computer object for the Second Domain Controller in the Extranet forest
Intranet-DC1 => Computer object for the First Domain Controller in the Intranet forest.
Intranet-DC2 => Computer object for the Second Domain Controller in the Intranet forest.
Extranet Domain Controllers => Computer set for the Extranet Domain Controller computers.
Extranet Web Servers => Computer set for the Extranet Web server computers.
Intranet Domain Controllers => Computer set for the Intranet Domain Controller computers.
AD Forest Trust: Allow Access for Forest Trust Creation/Validation
AD Forest Trust: Allow Access for Conditional DNS Forwarding
AD Forest Trust: Allow Access for Object Picker (Extranet Web Servers)
AD Forest Trust: Allow Access for Object Picker (Extranet Domain Controllers)
AD Forest Trust: Allow Access for Object Picker (Extranet ISA Servers)
No comments:
Post a Comment