Title: Installing and Maintaining ISA Server
1Installing and Maintaining ISA Server
2Planning an ISA Server Deployment
- Understand the current network infrastructure
- Review company security policies
- Plan the required network infrastructure
- Plan for branch office installations
- Plan for availability and fault tolerance
- Plan for access to the Internet
- Plan the ISA Server client implementation and
deployment - Plan for server publishing
- Plan for VPN deployment
- Plan the implementation
3Network Infrastructure Requirements
- DNS
- Domain controllers
- DHCP
4Domain Name System Requirements
- To connect to resources on the Internet, client
computers must be able to resolve the DNS names
for servers on the Internet to IP addresses - To enable access to Internet resources, ensure
that all client computers can resolve Internet
DNS names - You can use
- Internal DNS Server
- External DNS Server
5Domain Controller Requirements
- restrict access to Internet resources based on
user accounts - require authentication before users can access
published servers - ISA Server provides several options for
authenticating the users
6Dynamic Host Configuration Protocol Requirements
- DHCP is not required to support an ISA Server
infrastructure - it is highly recommended to simplify network
management. - The advantage of using DHCP is that it can
provide the IPconfiguration for all the client
computers on your network automatically. This can
make your ISA Server deployment much more
efficient.
7 Operating System Requirements
- System and Hardware Requirements for ISA Server
2006 - ISA Server can be installed on standard,
Intel/AMD-based server hardware.
Component Requirement
OS Windows Server 2003 with SP1 or higher
Processor Single 733MHz Pentium III equivalent Memory 512MB of memory
Disk Space 150MB available (for installation of ISA software)
Network Cards / ISDN Adapter / Modem One OS-compatible card per connected network
8Guidelines for Installing ISA Server, Standard
Edition
- To Configure the ISA Server Network Interfaces
- The Internal Interface
- Perimeter Network Interfaces
9Choosing an ISA Server Client
- ISA Server Client Options
- Firewall clients
- SecureNAT clients
- Web Proxy clients
10What Is a Firewall Client
- The Firewall client computer uses the Firewall
Client application when initiating connections to
the ISA Server computer
11What Is a Firewall Client
- The advantages of using Firewall clients
- Firewall clients enable user or group based
access control and logging - When a Firewall client connects to ISA Server,
the Firewall service automatically authenticates
the user. - the Firewall Client software can configure the
Web Proxy browser automatically.
12What Is a Firewall Client
- Must install the Firewall Client software on the
client computers - a large number of client computers in
organization and have no means of automating the
client installation, it will require a
significant effort to deploy the clien - The Firewall client can only be installed on
Windows computers
13What Is a SecureNAT Client
- Do not have Firewall Client software.
- The clients must be able to route requests for
Internet resources through the ISA Server
computer - configure the default gateway on the SecureNAT
clients and configure network routing, so that
all traffic destined to the Internet is sent
through the ISA Server computer.
14What Is a SecureNAT Client
- When a SecureNAT client connects to the ISA
Server computer, the request is directed first to
the NAT driver, which substitutes the external IP
address of the ISA Server computerfor the
internal IP address of the SecureNAT client. - The client request is then directed to the
Firewall service to determine whether access is
allowed. - Finally, therequest may be filtered by
application filters and other extensions.
15What Is a SecureNAT Client
- SecureNAT clients have other advantages
- SecureNAT clients also provide almost as much
functionality as Firewall clients - Requests from SecureNAT clients can be passed to
application filters, which can modify the
requests to enable handling of complex protocols. - SecureNAT can use the Web Proxy service for Web
access filtering and caching - Any operating system that supports Transmission
Control Protocol/Internet Protocol - (TCP/IP) can be configured as a SecureNAT client
16What Is a SecureNAT Client
- SecureNAT clients have two primary limitations
- You cannot control access to Internet resources
based on users and groups - SecureNAT clients may not be able to use all
protocols
17Example
18Example
Located on the Branch Office Network The client computers must be configured with Router3 as the default gateway. Router3 must be configured with Router2 as the default gateway. Router2 must be configured to route Internet requests to Router1. Router1 must be configured to route Internet requests to the ISA Server computer
Located on Main Office Network2 or Main Office Network1 The client computers must be configured to route all Internet requests to Router1. Router1 must be configured to route Internet requests to the ISA Server computer.
19What Is a Web Proxy Client?
- A Web Proxy client is a client computer that has
an HTTP 1.1compliant Web browser application and
is configured to use the ISA Server computer as a
Web Proxy server. - do not have to install any software to configure
Web Proxy clients. - must configure the Web applications on the client
computers to use the ISA Server computer as a
proxy server
20How to Configure ISA Server for Web Proxy Clients
- The first step in enabling Web Proxy clients is
to configure the ISA Server computer to allow
connections from these clients.
21Configuring Web Proxy Clients Manually
22How to Configure Web Proxy Clients
23Guidelines for Choosing ISA Server Clients
If You Need To Then Use
Avoid deploying or configuring client software SecureNAT clients
Use ISA Server only for accessing Web resources using HTTP or HTTPS SecureNAT or Web Proxy clients
Allow access only for authenticated clients Firewall clients or Web Proxy clients
Publish servers that are located on your Internal network SecureNAT clients
Improve Web performance in an environment with non-Windows operating systems Web Proxy or SecureNAT clients
24Configuring the SecureNAT and Web Proxy Clients
- Configuring SecureNAT Clients to Route Internet
Requests
25Installing and Configuring the Firewall Client
- How to Install Firewall Client
- Use folder client in ISA server. Run file
setup.exe - To enable Automatic Discovery of the ISA
- Server computer, select Automatically Detect The
Appropriate ISA Server Computer.
26Installing and Configuring the Firewall Client
can enable or disable the Firewall Client and
configure it to detect the ISA Server computer
automatically or configure the ISA Server
computer manually.
27Installing and Configuring the Firewall Client
- To deploy the Firewall Client to a large number
of clients, choose to automate the Firewall
Client installation. - Using Active Directory Group Policy to Distribute
the Firewall Client
28Securing ISA Server 2006
- defense-in-depth
- A defense-in-depth security strategy means that
you use multiple levels of defense to secure your
network
29Securing ISA Server 2006
- Policies, procedures, and awareness
- Physical security Ensure that only authorized
personnel can gain physical access to the
resources. - Perimeterconnecting point between the Internet
and the internal network is as secure as
possible, options for providing this security
include firewalls or multiple firewalls - Internal networks Even if the perimeter is
secure, you must still ensure thatthe internal
networks are secure for cases in which the
perimeter is compromised or when the attacker is
within the organization. - Operating systems
- Applications
- Data
30How to Secure the Network Interfaces
- To secure ISA Server, begin by securing the
network interfaces connected to the server. - Securing the External Network Interface
- Securing the Internal Network Interface
- Using Security Templates to Manage Services
- Implementing Security Templates
31Maintaining ISA Server 2006
- How to Export and Import the ISA Server
Configuration - Exporting the ISA Server Configuration
32How to Export and Import the ISA Server
Configuration
- Cloning a server export a configuration from
one ISA Server computer and then import the
settings on another computer - Saving a partial configuration export and import
any part of the ISA Server configuration a
single rule, an entire policy, or an entire
configuration - Sending a configuration fo troubleshooting
- Rolling back a configuration change
33Exporting the ISA Server Configuration
- The entire ISA Server configuration
- All the connectivity verifiers, or one selected
connectivity verifier - All the networks, or one selected network
- All the network sets, or one selected network
set - All the network rules, or one selected network
rule - All the Web chaining rules, or one selected Web
chaining rule - Cache configuration
- All the content-download jobs, or one or more
selected content-download jobs - The entire firewall policy, or one selected rule
34Importing the ISA Server Configuration
- Open ISA Server Management.
- Select the object whose settings you want to
import. You must select the correct - type of object for the configuration file that
you are using. - On the Tasks tab, click the import task. The
exact name for the task will vary, - depending on the type of object that you
selected. - Select the exported .xml file and click Import.
- Click Apply to apply the changes and click OK
when the changes have been - applied.
35How to Back Up and Restore the ISA Server
Configuration
- Open ISA Server Management and click the server
name. The option to back up - and restore the ISA Server configuration is
available only when you select the - server name.
- On the Tasks tab, click Backup This ISA Server
Configuration. - Enter a file name for the backup file and click
Backup. - You must provide a password for the ISA Server
backup - To restore the backup, click the server name in
ISA Server Management. Then - click Restore this ISA Server Configuration and
select the appropriate ISA Server - backup file.
- Click Apply to apply the changes and click OK
when the changes have been - applied.
36(No Transcript)