Top Banner
1 Enabling Secure Internet Access with ISA Server
26
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: 1 Enabling Secure Internet Access with ISA Server.

1

Enabling Secure InternetAccess with ISA Server

Page 2: 1 Enabling Secure Internet Access with ISA Server.

2

What Is Secure Access to Internet Resources?

• Users can access the resources that they need.

• The connection to the Internet is secure.• The data that users transfer to and from the

Internet is secure.• Users cannot download malicious programs

from the Internet.

Page 3: 1 Enabling Secure Internet Access with ISA Server.

3

How ISA Server Enables Secure Access to Internet Resources

• Implementing ISA Server as a firewall• Implementing ISA Server as a proxy server.• Using ISA Server to implement the

organization’s Internet usage policy

Page 4: 1 Enabling Secure Internet Access with ISA Server.

4

What is a Proxy Server?

• A proxy server is a server that is situated between a client application

• All client requests are sent to the proxy server• A proxy server can provide enhanced security

and performance for Internet connections.

Page 5: 1 Enabling Secure Internet Access with ISA Server.

5

Configuring ISA Server as a Proxy Server

• User authentication• Filtering client requests• Content inspection• Logging user access• Hiding the internal network details

Page 6: 1 Enabling Secure Internet Access with ISA Server.

6

How Proxy Servers Work?• Proxy servers can be used to secure both

inbound and outbound Internet access.• Forward Proxy Server: a proxy server is used

to secure outbound Internet access• Reverse proxy server: a proxy server is used

to secure inbound Internet access

Reverse Proxy Server

Forward Proxy Server

Page 7: 1 Enabling Secure Internet Access with ISA Server.

7

How Does a Forward Proxy Server Work?

Web Server

Client makes a request for an object located

on Internet

Client makes a request for an object located

on Internet

The request is sent to the proxy server

Check the request

Check the request

Send the request to Internet

Web server response is sent back to the proxy server.

The object is returned to the client

Page 8: 1 Enabling Secure Internet Access with ISA Server.

8

How Does a Reverse Proxy Server Work?

send the request to the appropriate server on internal network

resolve to the IP

address

resolve to the IP

address

make a request for an object on Internal

The object is returned to the client

Web server response is sent back to the proxy server

DNS ServerDNS Server

sends the request for the object

Check the request

Check the request

ISA SERVERISA SERVER

Web ServerWeb ServerClientClient

Page 9: 1 Enabling Secure Internet Access with ISA Server.

9

Web Proxy Chaining

• Use to forward Web Proxy connections from one ISA firewall to another ISA firewall

Page 10: 1 Enabling Secure Internet Access with ISA Server.

10

Configuring Web Chaining Rule

Page 11: 1 Enabling Secure Internet Access with ISA Server.

11

ISA firewall’s Access Policy

• Web Publishing Rules• Server Publishing Rules• Access RulesWeb Publishing Rules and Server Publishing

Rules are used to allow inbound accessAccess Rules are used to control outbound

access.

Page 12: 1 Enabling Secure Internet Access with ISA Server.

12

Access Rule Elements

• Protocols• User Sets• Content Types• Schedules• Network Objects

Page 13: 1 Enabling Secure Internet Access with ISA Server.

13

Protocols

• Protocol Type• Direction• Port range• Protocol number• ICMP properties• (Optional) Secondary connections

Page 14: 1 Enabling Secure Internet Access with ISA Server.

14

User Sets

• All Authenticated Users• All Users• System and Network Service

Page 15: 1 Enabling Secure Internet Access with ISA Server.

15

Configuring ISA Server Authentication

• Basic authentication• Digest authentication• Integrated Windows authentication• Digital certificates authentication• Remote Authentication Dial-In User Service

Page 16: 1 Enabling Secure Internet Access with ISA Server.

16

Content Types• Application• Application data files• Audio• Compressed files• Documents• HTML documents• Images• Macro documents• Text• Video• VRML

Page 17: 1 Enabling Secure Internet Access with ISA Server.

17

Schedules and Network Objects

Schedules:• Work Hours• Weekends• AlwaysNetwork Objects: used to control the source

and destination of connections moving through the ISA firewall.

Page 18: 1 Enabling Secure Internet Access with ISA Server.

18

Configuring Access Rules for OutboundAccess

• By default, ISA Server denies all network traffic between networks connected to the ISA Server computer.

Page 19: 1 Enabling Secure Internet Access with ISA Server.

19

Configuring Access Rules for OutboundAccess

Page 20: 1 Enabling Secure Internet Access with ISA Server.

20

The Rule Action Page

• Allow• Deny

Page 21: 1 Enabling Secure Internet Access with ISA Server.

21

The Protocols Page

• All outbound traffic• Selected protocols• All outbound traffic except selected

Page 22: 1 Enabling Secure Internet Access with ISA Server.

22

The Access Rule Sources Page

Page 23: 1 Enabling Secure Internet Access with ISA Server.

23

The Access Rule Sources Page

Page 24: 1 Enabling Secure Internet Access with ISA Server.

24

The Access Rule Destinations Page

Page 25: 1 Enabling Secure Internet Access with ISA Server.

25

The User Sets Page

Page 26: 1 Enabling Secure Internet Access with ISA Server.

26

Access Rule Properties

• The General tab• The Action tab• The Protocols tab• The From tab• The Users tab• The Schedule tab• The Content Types tab