Firewall rules required for Active Directory Certificate Services

Implementing an Active Directory integrated certification authority often requires planning the firewall rules to be created on the network. The following is a list of the required firewall rules and any pitfalls.

Required firewall rules from clients to the certification authority

Go to Requesting certificates from clients via RPC/DCOM the following firewall rules are required:

Network protocolDestination portProtocol
TCP135RPC Endpoint Mapper
TCP49152-65535RPC dynamic ports

The firewall rules are automatically configured with the installation of the certification authority role. Thus, they usually do not need to be explicitly enabled.

Most articles point out that TCP port 445 to the certification authority must also be opened, and a corresponding local firewall rule is also generated.

However, for the application of certificates the rule is not required. It is only needed for administrative actions. More details about this in the further course of the article.

These firewall rules are also sufficient for the Querying the certification authority database from remote systems.

Required firewall rules from clients to the revocation status validation infrastructure

All systems that apply for or verify certificates need access to the revocation status infrastructure (CRL Distribution Point, CDP and Authority Information Access, AIA).

The ports to be opened depend on the configuration of the blocking state infrastructure. If CDP and AIA are mapped via web servers, the corresponding port for the Hypertext Transfer Protocol (HTTP) must be opened.

Network protocolPortProtocol
TCP80Hypertext Transfer Protocol (HTTP)

See also article "Required firewall rules for the online responder (OCSP)„.

If CDP and AIA are also or only provided via LDAP, the firewall ports for domain clients must be opened in the direction of the domain controllers of the forest. The firewall requirements correspond to those of a domain member.

This includes the following ports:

Network protocolDestination portProtocol
TCP and UDP53Domain Name System
TCP88Kerberos
UDP123NTP
TCP135RPC Endpoint Mapper
TCP and UDP389LDAP
TCP445Server Message Block
RPC Named Pipes
TCP636LDAP over SSL
TCP3268LDAP-GC
TCP3269LDAP-GC over SSL
TCP49152-65535RPC dynamic ports

Required firewall rules from administrative clients to the certification authority

If the certification authority is managed from a remote computer, TCP port 445 must also be allowed in the firewall. The role configuration of NDES performs an administrative action and also requires this access at least during the configuration process. However, there is the option, NDES also install manually, in this case it is not necessary to open the firewall for TCP port 445.

Network protocolDestination portProtocol
TCP135RPC Endpoint Mapper
TCP49152-65535RPC dynamic ports
TCP445RPC Named Pipes

More details on the need for TCP port 445 in conjunction with the individual ADCS roles later in the article.

Is TCP 445 required from clients to the certification authority?

In the context of hardening measures, the question may arise whether TCP port 445 from the clients to the certification authority is really necessary. The answer to this is:

It depends.

TCP port 445 is used not only for the commonly known Server Message Block (SMB) protocol, also known as Common Internet File System (CIFS), but also for RPC name pipes, as in the case of the certification authority. Some functions of the certification authority need this port to work.

Here is a list:

Use caseResult
(TCP 445 not opened)
Requesting certificates via RPC/DCOM
(manual and AutoEnrollment)
Works
Querying the certification authority databaseWorks
NDES Role configurationWorks not
Requesting certificates via NDESWorks
Requesting certificates via Certification Authority Web EnrollmentWorks
Certificate Enrollment of the Online Responders (OCSP, uses own enrollment code)Works
Administration of the certification authority via remote server management toolsWorks not

The TCP port 445 is therefore only used for the ICertAdmin interface is required. In general, it is therefore advisable not to make this port accessible to all clients.

Both the role configuration of NDES and the remote server management tools will fail with the error message "The RPC server is unavailable. 0x800706ba (WIN32: 1722 RPC_S_SERVER_UNAVAILABLE)".if TCP port 445 is not open for the corresponding system.

Here, however, either only temporary or fine-granular firewall rules should be used to keep the possible attack vectors as low as possible.

Required firewall rules from the certification authority to other hosts

Outbound, if it is an Active Directory-integrated certification authority, it only needs to communicate with the domain controllers of the forest. The firewall requirements correspond to those of a domain member.

This includes the following ports:

Network protocolDestination portProtocol
TCP and UDP53Domain Name System
TCP88Kerberos
UDP123NTP
TCP135RPC Endpoint Mapper
TCP and UDP389LDAP
TCP445Server Message Block
RPC Named Pipes
TCP636LDAP over SSL
TCP3268LDAP-GC
TCP3269LDAP-GC over SSL
TCP49152-65535RPC dynamic ports

Is TCP 445 required from the certification authority to the domain controllers?

In the context of hardening measures, the question may arise whether TCP port 445 from the certification authority to the domain controllers is really necessary. The answer to this is:

Clear yes!

The Kerberos Authentication certificate template preferred for domain controllers and certificate templates derived from it contain the flag CT_FLAG_SUBJECT_ALT_REQUIRE_DOMAIN_DNS.

This flag causes the certification authority to enter the fully qualified domain name (FQDN) and the NETBIOS name of the requestor in the Subject Alternative Name (SAN) extension of the certificate and requires that the certification authority can talk to the requesting domain controller via NTLM.

This communication takes place via TCP port 445, which must be released accordingly in the firewall configuration of the network.

If the port is not accessible on the domain controller, the certificate request will fail with the error message "The RPC server is unavailable. 0x800706ba (WIN32: 1722 RPC_SERVER_UNAVAILABLE)"..

Special case of Certification Authority Web Enrollment (CAWE)

What is special about the CAWE role is that the CA will attempt to open a connection to the CAWE server's dynamic RPC ports in response to a certificate request from CAWE. If this firewall rule is not set up, the application for certificates via CAWE takes a very long time or breaks off completely.

Network protocolDestination portProtocol
TCP135RPC Endpoint Mapper
TCP49152-65535RPC dynamic ports

See also article "Required firewall rules for Certification Authority Web Enrollment (CAWE)„.

Restore the default Windows Firewall rules on the certification authority

The default Windows Firewall rules on a certification authority can be re-enabled with the following Windows PowerShell command.

Enable-NetFirewallRule `
    -Name Microsoft-Windows-CertificateServices-CertSvc-DCOM-In
Enable-NetFirewallRule `
    -Name Microsoft-Windows-CertificateServices-CertSvc-RPC-EPMAP-In
Enable-NetFirewallRule `
    -Name Microsoft-Windows-CertificateServices-CertSvc-RPC-NP-In
Enable-NetFirewallRule `
    -Name Microsoft-Windows-CertificateServices-CertSvc-RPC-TCP-In
Enable-NetFirewallRule `
    -Name Microsoft-Windows-CertificateServices-CertSvc-TCP-Out

Related links:

21 thoughts on “Benötigte Firewallregeln für Active Directory Certificate Services”

Comments are closed.

en_USEnglish