Block Web Browsing with IPSec
How can I block a Windows 2000/XP/2003 computer from surfing on the Internet?
Windows 2000/XP/2003 machines have a built-in IP security mechanism called IPSec (IP Security). IPSec is a protocol that’s designed to protect individual TCP/IP packets traveling across your network by using public key encryption. In a nut shell, the source PC encapsulates the normal IP packet inside of an encrypted IPSec packet. This packet then remains encrypted until it arrives at the destination PC.
This is not the place for a more detailed intro to the IPSec features, but know that besides encryption, IPSec will also let you protect and configure your server/workstation with a firewall-like mechanism.
How can you block specific users from surfing the Internet with IPSec? Simply by creating a policy element that will tell the computer to block all the specific IP traffic that is configured by those rules. Internet traffic uses HTTP and HTTPS, which use TCP ports 80 and 443 respectively as their destination ports. By blocking this specific traffic you will be able to stop a specific computer from browsing the Internet.
BTW, you can also Block Web Browsing but Allow Intranet Traffic with IPSec if you want.
To block all Internet traffic to and from a computer you need to create an IPSec policy that will block all HTTP traffic. You can configure this policy specifically for one computer by manipulating that computers’ IPSec policy, or, even better, you can configure the policy as a Group Policy Object (GPO) on a specific Site, Domain or Organization Unit (OU). In order to configure a GPO you must have Active Directory in place.
Block a single computer from surfing on the Internet
To configure a single computer follow these steps:
Configuring IP Filter Lists and Filter actions
- Open an MMC window (Start > Run > MMC).
- Add the IP Security and Policy Management Snap-In.
- In the Select which computer this policy will manage window select the local computer (or any other policy depending upon your needs). Click Close then click Ok.
- Right-click IP Security Policies in the left pane of the MMC console. Select Manage IP Filter Lists and Filter Actions.
- In the Manage IP Filter Lists and Filter actions click Add.
- In the IP Filter List window type a descriptive name (such as HTTP, HTTPS) and click Add to add the new filters.
- In the Welcome window click Next.
- In the description box type a description if you want and click Next.
- In the IP Traffic Source window leave My IP Address selected and click Next.
- In the IP Traffic Destination window leave Any IP Address selected and click Next.
- In the IP Protocol Type scroll to TCP and press Next.
- In the IP Protocol Port type 80 (for HTTP) in the To This Post box, and click Next.
- In the IP Filter List window notice how a new IP Filter has been added. Now, if you want, add HTTPS (Any IP to Any IP, Protocol TCP, Destination Port 443) in the same manner.
- Now that you have both filters set up, click Ok.
Note: A quick reminder – You can also Block Web Browsing but Allow Intranet Traffic with IPSec.
- Back in the Manage IP Filter Lists and Filter actions review your filters and if all are set, click on the Manage Filter Actions tab. Now we need to add a filter action that will block our designated traffic, so click Add.
- In the Welcome screen click Next.
- In the Filter Action Name type Block and click Next.
- In the Filter Action General Options click Block then click on Next.
- Back in the Manage IP Filter Lists and Filter actions review your filters and if all are set, click on the Close button. You can add Filters and Filter Actions at any time.
Configuring the IPSec Policy
- In the same MMC console right-click IP Security Policies on Local Computer and select Create IP Security Policy.
- In the Welcome screen click Next
- In the IP Security Policy Name enter a descriptive name, such as "Block HTTP, HTTPS". Click Next.
- In the Request for Secure Communication window click to clear the Active the Default Response Rule check-box. Click Next.
- In the Completing IP Security Policy Wizard window, click Finish.
- We now need to add the various IP Filters and Filter Actions to the new IPSec Policy. In the new IPSec Policy window click Add to begin adding the IP Filters and Filter Actions.
- In the Welcome window click Next.
- In the Tunnel Endpoint make sure the default setting is selected and click Next.
- In the Network Type windows select All Network Connections and click Next.
- In the IP Filter List window select one of the previously configured IP Filters, for example "HTTP, HTTPS" (configured in step #6 at the beginning of this article). If, for some reason, you did not previously configure the right IP Filter, then you can press Add and begin adding it now. When done, click Next.
- In the Filter Action window select one of the previously configured Filter Actions, for example "Block" (configured in step #15 at the beginning of this article). Again, if you did not previously configure the right Filter Action, you can now press Add and begin adding it now. When done, click Next.
- Notice how the IP Filter has been added.
Again, you can add any combination of IP Filters and Filter Actions you like.
Notice that you cannot change their order like in other full-featured firewalls. Even so, this configuration works perfectly as you will soon discover.
The next phase is to assign the IPSec Policy.
Assigning the IPSec Policy
- In the same MMC console, right-click the new IPSec Policy and select Assign.
Blocking More than one Computer
Blocking of more than one computer can be done in 2 ways:
Either way, both methods can be used to prevent a number of computers from surfing the Internet (or for any other IPSec Policy).
You may find these related articles of interest to you:
More in Security
Microsoft Defender Vulnerability Management Now Supports Firmware Assessments
Nov 29, 2022 | Rabia Noureen
Microsoft Entra Workload Identities Service is Now Generally Available
Nov 29, 2022 | Rabia Noureen
Microsoft Authenticator to Enable Number Matching Security Feature by Default in February 2023
Nov 21, 2022 | Rabia Noureen
Microsoft Defender for Endpoint Adds Network Protection on iOS and Android
Nov 11, 2022 | Rabia Noureen
What is a Software-Defined Perimeter?￼
Nov 11, 2022 | Sukesh Mudrakola
Microsoft Defender for Business Adds Server Protections for SMBs
Nov 10, 2022 | Rabia Noureen
Most popular on petri