Windows Firewall with Advanced Security Deployment Guide
Letzte Aktualisierung: Januar 2010
Betrifft: Windows 7, Windows Essential Business Server, Windows SBS 2003, Windows SBS 2008, Windows Server 2000, Windows Server 2003, Windows Server 2003 R2, Windows Server 2003 with SP1, Windows Server 2003 with SP2, Windows Server 2008, Windows Server 2008 R2, Windows Vista
You can use the Windows-Firewall mit erweiterten Sicherheitseinstellungen MMC snap-in in Windows® 7, Windows Vista®, Windows Server® 2008, and Windows Server® 2008 R2 to help protect the computers and the data that they share across a network.
You can use Windows Firewall to control access to the computer from the network. You can create rules that allow or block network traffic in either direction based on your business requirements. You can also create IPsec connection security rules to help protect your data as it travels across the network from computer to computer.
About this guide
This guide is intended for use by system administrators and system engineers. It provides detailed guidance for deploying a Windows-Firewall mit erweiterten Sicherheitseinstellungen design that you or an infrastructure specialist or system architect in your organization has selected.
Begin by reviewing the information in Planning to Deploy Windows Firewall with Advanced Security.
If you have not yet selected a design, we recommend that you wait to follow the instructions in this guide until after you have reviewed the design options in the Windows Firewall with Advanced Security Design Guide and selected the one most appropriate for your organization.
After you select your design and gather the required information about the zones (isolation, boundary, and encryption), operating systems to support, and other details, you can then use this guide to deploy your Windows-Firewall mit erweiterten Sicherheitseinstellungen design in your production environment. This guide provides steps for deploying any of the following primary designs that are described in the Design Guide:
Basic Firewall Policy Design
Domain Isolation Policy Design
Server Isolation Policy Design
Certificate-based Isolation Policy Design
Use the checklists in Implementing Your Windows Firewall with Advanced Security Design Plan to determine how best to use the instructions in this guide to deploy your particular design.
We recommend that you use the techniques documented in this guide only for GPOs that must be deployed to the majority of the computers in your organization, and only when the OU hierarchy in your Active Directory domain does not match the deployment needs of these GPOs. These characteristics are typical of GPOs for server and domain isolation scenarios, but are not typical of most other GPOs. When the OU hierarchy supports it, deploy a GPO by linking it to the lowest level OU that contains all of the accounts to which the GPO applies.
In a large enterprise environment with hundreds or thousands of GPOs, using this technique with too many GPOs can result in user or computer accounts that are members of an excessive number of groups; this can result in network connectivity problems if network protocol limits are exceeded. For more information about the problems associated with excessive group membership, see the following articles in the Microsoft Knowledge Base:
What this guide does not provide
This guide does not provide:
Guidance for creating firewall rules for specific network applications. For this information, see Planning Settings for a Basic Firewall Policy in the Windows-Firewall mit erweiterten Sicherheitseinstellungen Design Guide.
Guidance for setting up Active Directory Domain Services (AD DS) to support Group Policy. For more information, see Active Directory Domain Services (http://go.microsoft.com/fwlink/?linkid=102573) and Group Policy (http://go.microsoft.com/fwlink/?linkid=93542).
Guidance for setting up certification authorities (CAs) to create certificates for certificate-based authentication. For this information, see Active Directory Certificate Services (http://go.microsoft.com/fwlink/?linkid=110820).
Overview of Windows Firewall with Advanced Security
Windows-Firewall mit erweiterten Sicherheitseinstellungen in Windows 7, Windows Vista, Windows Server 2008, and Windows Server 2008 R2 is a stateful host firewall that helps secure the computer by allowing you to create rules that determine which network traffic is permitted to enter the computer from the network and which network traffic the computer is allowed to send to the network. Windows-Firewall mit erweiterten Sicherheitseinstellungen also supports Internet Protocol security (IPsec), which you can use to require authentication from any computer that is attempting to communicate with your computer. When authentication is required, computers that cannot be authenticated as a trusted computer cannot communicate with your computer. You can also use IPsec to require that certain network traffic is encrypted to prevent it from being read by network packet analyzers that could be attached to the network by a malicious user.
The Windows-Firewall mit erweiterten Sicherheitseinstellungen MMC snap-in is more flexible and provides much more functionality than the consumer-friendly Windows Firewall interface found in the Control Panel. Both interfaces interact with the same underlying services, but provide different levels of control over those services. While the Windows Firewall Control Panel program can protect a single computer in a home environment, it does not provide enough centralized management or security features to help secure more complex network traffic found in a typical business enterprise environment.
For more information about Windows-Firewall mit erweiterten Sicherheitseinstellungen, see Windows-Firewall mit erweiterten Sicherheitseinstellungen in the Windows Server 2008 Technical Library (http://go.microsoft.com/fwlink/?linkid=96525).