Sichere Exchange Veröffentlichung mit ISA Server 2004

Die Assistenten innerhalb des Internet Security and Acceleration Server 2004 ermöglichen es relativ einfach Exchange Dienste zu veröffentlichen. Doch der ISA Server 2004 ist wesentlich leistungsfähiger. Er kann auf Applikationsebene Filtern, d.h. wirklich nur die benötigte Kommunikation zulassen. Mit Hilfe des HTTP Filter lassen sich damit also die entsprechenden Methoden aussperren. Doch welche sind das denn im einzelnen? Mit Hilfe von Netmon lässt sich das mehr oder weniger leicht feststellen. Es geht allerdings auch einfacher. Das gestern erschienene Whitepaper "Application Layer Firewall protection for Exchange Server 2003 with ISA Server 2004" dokumentiert dies ausführlich.

Setting and rule Outlook Web Access Outlook Mobile Access Exchange ActiveSync RPC over HTTP
General tab        

Maximum headers length

32768

32768

32768

32768

Maximum payload length

10485760

10485760

65536

Any

Maximum URL length

16384

319

1024

16384

Maximum query length

4096

13

512

4096

Verify normalization

Yes

Yes

Yes

Yes

Block high bit characters

No

Yes

Yes

Yes

Block responses containing Windows executable content

Yes (Note 1)

Yes

Yes

Yes

Methods tab        

Allow only specified methods

BCOPYBDELETEBMOVEBPROPPATCHDELETEGETMKCOLMOVEPOLLPOSTPROPFINDPROPPATCHSEARCHSUBSCRIBE

GETHEADPOST

OPTIONSPOST

RPC_IN_DATARPC_OUT_DATA

Extensions tab        

Action taken for file extensions

Block specified extensions (allow all others)

Allow only specified extensions

Allow only specified extensions

Allow only specified extensions

Extension list

.asax.ascs.bat.cmd.com.config.cs.csproj.dat.dll (Note 2).exe (Note 1).htr.htw.ida.idc.idq.ini.licx.log.pdb.pol.printer.resources.resx.shtm.shtml.stm.vb.vbproj.vsdisco.webinfo.xsd.xsx

. (dot).aspx

. (dot)

.dll

Block requests containing ambiguous extensions

No

Yes

Yes

Yes

Headers Tab        

Blocked headers

None

None

None

None

Signatures Tab        

Blocked signatures:Request URL

./\.. (Note 3)% (Note 3)& (Note 3)

./\..%&:

./\..%:

./\..%&

Note 1
Blocking .exe file extensions and enabling Block responses containing Windows executable content for Outlook Web Access will block access to the S/MIME control. If the S/MIME control is required for Outlook Web Access on Exchange Server 2003, do not include .exe in the blocked extensions list or enable Block responses containing Windows executable content.

Note 2
Blocking .dll file extensions for Outlook Web Access will block access to the online spelling checker that is built into Outlook Web Access.

Note 3
Including the strings "..", "%", and "&" can prevent certain types of potential attacks but it will also reduce access to certain e-mail messages. An e-mail message subject line forms part of the URL to access the message and thus any e-mail message containing one of these characters will be blocked. A balance must be found between extra security and functionality. Do not include the ":" character in this list because this will block access to the majority of e-mail messages. Many message subject lines contains RE: and FW: if they are replies or forwards.
 

Oder einfach die entsprechenden Regeln herunterladen und die SSL Listener sowie die Servernamen entsprechend anpassen. Kai Wilke (ISA Server 2004 MVP) hat diese freundlicherweise zur Verfügung gestellt. Danke Kai!

cu
//.<