1 / 36

Installing and Maintaining ISA Server

Installing and Maintaining ISA Server. Planning an ISA Server Deployment. Understand the current network infrastructure Review company security policies Plan the required network infrastructure Plan for branch office installations Plan for availability and fault tolerance

yorick
Télécharger la présentation

Installing and Maintaining ISA Server

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Installing and Maintaining ISA Server

  2. Planning an ISA Server Deployment • Understand the current network infrastructure • Review company security policies • Plan the required network infrastructure • Plan for branch office installations • Plan for availability and fault tolerance • Plan for access to the Internet • Plan the ISA Server client implementation and deployment • Plan for server publishing • Plan for VPN deployment • Plan the implementation

  3. Network Infrastructure Requirements • DNS • Domain controllers • DHCP

  4. Domain Name System Requirements • To connect to resources on the Internet, client computers must be able to resolve theDNS names for servers on the Internet to IP addresses • To enable access to Internet resources, ensure that all client computers can resolveInternet DNS names • You can use: • Internal DNS Server • External DNS Server

  5. Domain Controller Requirements • restrict access to Internet resources based on user accounts • require authentication before users can access published servers • ISA Server provides several options for authenticating the users

  6. Dynamic Host Configuration Protocol Requirements • DHCP is not required to support an ISA Server infrastructure • it is highly recommendedto simplify network management. • The advantage of using DHCP is that it can provide the IPconfiguration for all the client computers on your network automatically. This can makeyour ISA Server deployment much more efficient.

  7. Operating System Requirements • System and Hardware Requirements for ISA Server 2006: • ISA Server can be installed on standard,Intel/AMD-based server hardware.

  8. Guidelines for Installing ISA Server, Standard Edition • To Configure the ISA Server Network Interfaces • The Internal Interface • Perimeter Network Interfaces

  9. Choosing an ISA Server Client • ISA Server Client Options • Firewall clients • SecureNAT clients • Web Proxy clients

  10. What Is a Firewall Client • The Firewall client computer uses the Firewall Client application when initiating connectionsto the ISA Server computer

  11. What Is a Firewall Client • The advantages of using Firewall clients: • Firewall clients enable user or group based access control and logging • When a Firewall client connects to ISA Server, the Firewall service automaticallyauthenticates the user. • the Firewall Client software can configure the Web Proxy browserautomatically.

  12. What Is a Firewall Client • Must install the Firewall Client software on the client computers • a large number of client computers in organization and have no means ofautomating the client installation, it will require a significant effort to deploy theclien • The Firewall client can only be installed on Windows computers

  13. What Is a SecureNAT Client • Do not have Firewall Client software. • The clients must be able to route requests for Internetresources through the ISA Server computer • configure thedefault gateway on the SecureNAT clients and configure network routing, so that alltraffic destined to the Internet is sent through the ISA Server computer.

  14. What Is a SecureNAT Client • When a SecureNAT client connects to the ISA Server computer, the request is directedfirst to the NAT driver, which substitutes the external IP address of the ISA Server computerfor the internal IP address of the SecureNAT client. • The client request is thendirected to the Firewall service to determine whether access is allowed. • Finally, therequest may be filtered by application filters and other extensions.

  15. What Is a SecureNAT Client • SecureNAT clients have other advantages: • SecureNAT clients also provide almost as much functionality as Firewall clients • Requests from SecureNAT clients can be passed to application filters, which canmodify the requests to enable handling of complex protocols. • SecureNAT can use the Web Proxy service for Web access filtering and caching • Any operating system that supports Transmission Control Protocol/Internet Protocol • (TCP/IP) can be configured as a SecureNAT client

  16. What Is a SecureNAT Client • SecureNAT clients have two primary limitations • You cannot control access to Internet resources based on users and groups • SecureNAT clients may not be able to use all protocols

  17. Example

  18. Example

  19. What Is a Web Proxy Client? • A Web Proxy client is a client computer that has an HTTP 1.1–compliant Web browserapplication and is configured to use the ISA Server computer as a Web Proxy server. • do not have to install any software toconfigure Web Proxy clients. • must configure the Web applications onthe client computers to use the ISA Server computer as a proxy server

  20. How to Configure ISA Server for Web Proxy Clients • The first step in enabling Web Proxy clients is to configure the ISA Server computer toallow connections from these clients.

  21. Configuring Web Proxy Clients Manually

  22. How to Configure Web Proxy Clients

  23. Guidelines for Choosing ISA Server Clients

  24. Configuring the SecureNAT and Web Proxy Clients • Configuring SecureNAT Clients to Route Internet Requests

  25. Installing and Configuring the Firewall Client • How to Install Firewall Client • Use folder client in ISA server. Run file setup.exe • To enable Automatic Discovery of the ISA • Server computer, select Automatically Detect The Appropriate ISA Server Computer.

  26. Installing and Configuring the Firewall Client can enable or disable the Firewall Client and configure it to detect the ISA Server computer automatically or configure the ISA Server computer manually.

  27. Installing and Configuring the Firewall Client • To deploy the Firewall Client to a large number of clients, choose to automatethe Firewall Client installation. • Using Active Directory Group Policy to Distribute the Firewall Client

  28. Securing ISA Server 2006 • defense-in-depth: • A defense-in-depth security strategy means that you use multiple levels ofdefense to secure your network

  29. Securing ISA Server 2006 • Policies, procedures, and awareness: • Physical security:Ensure that only authorized personnel can gain physical access to the resources. • Perimeter:connecting point between the Internet and theinternal network is as secure as possible, options for providing this securityinclude firewalls or multiple firewalls • Internal networks :Even if the perimeter is secure, you must still ensure thatthe internal networks are secure for cases in which the perimeter is compromisedor when the attacker is within the organization. • Operating systems • Applications • Data

  30. How to Secure the Network Interfaces • To secure ISA Server, begin by securing the network interfaces connected to the server. • Securing the External Network Interface • Securing the Internal Network Interface • Using Security Templates to Manage Services • Implementing Security Templates

  31. Maintaining ISA Server 2006 • How to Export and Import the ISA Server Configuration • Exporting the ISA Server Configuration:

  32. How to Export and Import the ISA Server Configuration • Cloning a server : export a configuration from one ISA Server computerand then import the settings on another computer • Saving a partial configuration: export and import any part of the ISAServer configuration :a single rule, an entire policy,or an entire configuration • Sending a configuration fotroubleshooting • Rolling back a configuration change

  33. Exporting the ISA Server Configuration • The entire ISA Server configuration • All the connectivity verifiers, or one selected connectivity verifier • All the networks, or one selected network • All the network sets, or one selected network set • All the network rules, or one selected network rule • All the Web chaining rules, or one selected Web chaining rule • Cache configuration • All the content-download jobs, or one or more selected content-download jobs • The entire firewall policy, or one selected rule

  34. Importing the ISA Server Configuration • Open ISA Server Management. • Select the object whose settings you want to import. You must select the correct • type of object for the configuration file that you are using. • On the Tasks tab, click the import task. The exact name for the task will vary, • depending on the type of object that you selected. • Select the exported .xml file and click Import. • Click Apply to apply the changes and click OK when the changes have been • applied.

  35. How to Back Up and Restore the ISA Server Configuration • Open ISA Server Management and click the server name. The option to back up • and restore the ISA Server configuration is available only when you select the • server name. • On the Tasks tab, click Backup This ISA Server Configuration. • Enter a file name for the backup file and click Backup. • You must provide a password for the ISA Server backup • To restore the backup, click the server name in ISA Server Management. Then • click Restore this ISA Server Configuration and select the appropriate ISA Server • backup file. • Click Apply to apply the changes and click OK when the changes have been • applied.

More Related