Client Access – Published applications

23
Client Access – Published applications Control through TEMPLATE.ICA Use SSL Authentication level Remove: EncRc5-0 EncRc5-40 EncRc5-56

description

Client Access – Published applications. Control through TEMPLATE.ICA Use SSL Authentication level Remove: EncRc5-0 EncRc5-40 EncRc5-56. Remote Access. 80211X, 802.11G, 802.11b, 802.11a 11 Mbps – 55 Mbps Wireless WAN 40-120 Kbit Public network CDPD, 1xRTT, other High Speed access - PowerPoint PPT Presentation

Transcript of Client Access – Published applications

Page 1: Client Access – Published applications

Client Access – Published applications

Control through TEMPLATE.ICA

• Use SSL• Authentication level

– Remove:• EncRc5-0• EncRc5-40• EncRc5-56

Page 2: Client Access – Published applications

• 80211X, 802.11G, 802.11b, 802.11a– 11 Mbps – 55 Mbps

• Wireless WAN– 40-120 Kbit– Public network– CDPD, 1xRTT, other

• High Speed access– Cable modem – xDSL (ADSL, IDSL, SDSL)

Remote Access

Page 3: Client Access – Published applications

Wireless LAN or WAN • Secure WLAN or WWAN with Secure Gateway

– Internal Firewall• Port filtering at access device• Firewall behind access device (ie. Extended access list)

WLANClient STA MetaFrame

XP FarmWAP

1494

80

80443

ExternalClient

Web Interface

Secure Gateway

443

443

Page 4: Client Access – Published applications

Connections

Page 5: Client Access – Published applications

Packet filtering (port based)• Prevent data from reaching unintended services• Restrict data flow based on destination ports• Control services that respond to requests

– TCP port– UDP port– IP protocol number

1494 (TCP)

443 (TCP)

1604 (UDP)

External1494 (TCP)

443 (TCP)

1604 (UDP)

Internal

Page 6: Client Access – Published applications

Many links to consider….

Internet

Secure Gateway

Logon Agent

AuthorizationService +

STA

3rd Party Auth

MetaFrameSecure Access

Manager

MetaFrameXP Server

Farm

HTTP(S)ICA/Secure ICA

InternalWeb

Servers

InternetExplorerand ICAClient

GatewayClient

Secure GatewayProxy

Page 7: Client Access – Published applications

Web Interface• First things First!• Mandate authentication occurs over SSL• IIS Example: (IISAdmin)

Page 8: Client Access – Published applications

HTTPS

HTTPWeb Interface / Secure Access Manager

Page 9: Client Access – Published applications

• Web server hardening – IIS lockdown tool– Must enable ASP (advanced)

• Remove sample directories from web server• Move webroot from default location

– CTX102001• Enforce password policies

– Expire passwords– Alphanumeric combinations

• Remove IIS Anonymous user account– Create account to replace

• Disable Pass-through authentication

Web Interface / Secure Access Manager

Page 10: Client Access – Published applications

• Disable unused services• Remove unnecessary components • Apply latest service packs

– Free tool: HFNETCHK to review installed Hotfixes• Disable default admin shares (C$, Admin$, etc.)• Unbind NetBIOS from all adapters

– Disable NetBIOS over TCP/IP• Use Port Filtering!

– 80 or 443 for the STA– 443 for Secure Gateway/Web Interface or Logon Agent– 1494, 80 and/or 443 for MetaFrame XP Presentation servers– Use extended access lists where possible

Web Interface / Secure Access Manager

Page 11: Client Access – Published applications

Secure Gateway

Page 12: Client Access – Published applications
Page 13: Client Access – Published applications

SSL/TLS Support

• SSL V3.0 and TLS V1.0 secure protocols supported

• SSL-Secured connections may now include:– Client browser to Web Interface server– Web Interface to MetaFrame XML Service– Web Interface to Secure Ticket Authority– Secure Gateway to Secure Gateway Proxy– Secure Gateway to Authentication Service– Secure Gateway to Secure Ticket Authority – Secure Gateway to Logon Agent– Logon Agent to Authentication Service

Page 14: Client Access – Published applications

Web Interface

Page 15: Client Access – Published applications

Issued to Internet FQDN, not necessarily the server name*

Dates are valid

Corresponding private key

SSL Certificate

Page 16: Client Access – Published applications

Certificate Placement

Server Certificate

Root Certificate Server Certificate

Page 17: Client Access – Published applications

Internet

Secure GatewayService

AuthenticationService +

STA

Optional 3rd Party Auth

MetaFrameSecure Access

Manager

MetaFrameXP Presentation Server

Farm

HTTP(S)ICA

InternalWeb

Servers

InternetExplorerand ICAClient

GatewayClient

Logon Agent

WebInterface

Single DMZ

Page 18: Client Access – Published applications

Internet

Secure Gateway

Logon Agent

AuthenticationService + STA

3rd Party Auth

MetaFrameSecure Access

Manager

MetaFrameXP Server

Farm

InternalWeb

Servers

InternetExplorerand ICAClient

GatewayClient

Secure GatewayProxy

DMZ 2DMZ 1

WebInterface

HTTP(S)ICA

Dual Stage DMZ

Page 19: Client Access – Published applications

MMC Management Tools

Page 20: Client Access – Published applications

MMC Management Tools Continued….• Secure access to all of your content

– Files– Internal web content– Published applications

• Management console– Log connections– Real time counters

Page 21: Client Access – Published applications

MMC Management Tools Continued….

• Real time…– User name– Domain– Server connected– Bytes transferred– Connection time– Connection date

Page 22: Client Access – Published applications

MMC Management Tools Continued….

Permon Statistics• Total failed….

– Ticket validations– Validations– Connections– ACL rejected

…and more…

Page 23: Client Access – Published applications

Securing connections continued….• Best Practices for Securing a Secure

Gateway Deployment– CTX19376