cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
352
Views
0
Helpful
2
Replies

AD Authenication through PIX

dohogue
Level 1
Level 1

I currently have servers in DMZ3 that allow SSL VPN connection to them. The SSL authenication is to the DMZ only.

I want to allow AD authenication from DMZ3 to AD directory domain that is located in the inside network.

What ports need to be open to allow this to happen? I have read that this type of authenication is a security nightmare because of the number of ports that must be open for this to work correctly. There is no domain controller on DMZ3 so the AD authenication traffic must pass to the inside network.

Another complication is that there are over 100 domain controllers that could answer the authenication request located on several different networks.

Any ideas?

Thanks

2 Replies 2

Marwan ALshawi
VIP Alumni
VIP Alumni

if it is comlex like this

allow the communication from the dmz servers to the AD subnet in the inside

"allow the communication from the dmz servers to the AD subnet in the inside"

That is really POOR advice. If servers in the

DMZ are compromised, then hackers will be able

to access everything on the AD subnet in the

inside network.

The objective is to get this thing working

while minimizing the security risks. This

can be done by limiting the dynamic DCOM

ports that AD uses. It will involve modifying

windows registries. If you're familiar

with Passive FTP, you get the idea.

That way you will minimize the security risks

to your Corporate network if DMZ Servers are

somehow compromised, your "inside" network

is still protected.

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community:

Review Cisco Networking products for a $25 gift card