If you don't like having
to open this many ports, you could use IPSec to tunnel the traffic across the
firewall. You could use ESP with encryption disabled, so the packets would
still be cryptographically signed and tunneled, but your intrusion
detection systems (IDS) would still have visibility into the traffic.
Jason Fossen, who
teaches the Securing Windows class at SANS,
shared with us additional insights regarding the use of IPSec:
Because IPSec
connections can be limited to those users and computers in specified global
groups, is tightly integrated into the host-based Windows Firewall (which would
be configured on all DMZ servers and participating controllers), and can
optionally be tied into a Network Access Protection (NAP) infrastructure, the
use of IPSec can provide benefits the perhaps outweigh the IDS/IPS hassles.
The Use of AD in the DMZ
or a Screened Subnet
Jason Fossen also shared
his thoughts on architecting AD in environments where some Windows servers
reside close to the network's perimeter, such as in the DMZ or a screened
subnet. He recommending implementing a separate forest for DMZ
servers that need to be domain members (perhaps with a one-way cross-forest
trust to the internal forest), rather than joining DMZ servers to the internal
forest directly. Jason continued:
The DMZ controller(s) will be located in a new perimeter network
attached to a firewalling device. When implementing a cross-forest trust,
after configuring groups and permissions on the DMZ servers (which requires
LDAP traffic), the only traffic that must be allowed through the firewall is
Kerberos. If the DMZ servers must be joined to the internal forest, then
it’s better to place Read-Only Domain Controllers (RODC) in another perimeter
network of the firewall for the sake of the DMZ servers.
Also, with the use of PKI, RADIUS, reverse proxy servers, etc., it
has become less necessary to either join DMZ servers to the internal forest or
to establish a one-way cross-forest trust from the DMZ forest to the internal
one, even when users must authenticate with the internal forest credentials.
No comments:
Post a Comment