You are on page 1of 36

Installing and Maintaining ISA Server

Planning an ISA Server Deployment


Understand the current network infrastructure Review company security policies Plan the required network infrastructure Plan for branch office installations Plan for availability and fault tolerance Plan for access to the Internet Plan the ISA Server client implementation and deployment Plan for server publishing Plan for VPN deployment Plan the implementation

Network Infrastructure Requirements


DNS Domain controllers DHCP

Domain Name System Requirements


To connect to resources on the Internet, client computers must be able to resolve the DNS names for servers on the Internet to IP addresses To enable access to Internet resources, ensure that all client computers can resolve Internet DNS names You can use: Internal DNS Server External DNS Server

Domain Controller Requirements


restrict access to Internet resources based on user accounts require authentication before users can access published servers ISA Server provides several options for authenticating the users

Dynamic Host Configuration Protocol Requirements


DHCP is not required to support an ISA Server infrastructure it is highly recommended to simplify network management. The advantage of using DHCP is that it can provide the IPconfiguration for all the client computers on your network automatically. This can make your ISA Server deployment much more efficient.

Operating System Requirements


System and Hardware Requirements for ISA Server 2006: ISA Server can be installed on standard, Intel/AMDbased server hardware. Component Requirement
OS Processor Windows Server 2003 with SP1 or higher Single 733MHz Pentium III equivalent Memory 512MB of memory 150MB available (for installation of ISA software)

Disk Space

Network Cards / ISDN Adapter / Modem

One OS-compatible card per connected network

Guidelines for Installing ISA Server, Standard Edition


To Configure the ISA Server Network Interfaces
The Internal Interface Perimeter Network Interfaces

Choosing an ISA Server Client


ISA Server Client Options Firewall clients SecureNAT clients Web Proxy clients

What Is a Firewall Client


The Firewall client computer uses the Firewall Client application when initiating connections to the ISA Server computer

What Is a Firewall Client


The advantages of using Firewall clients: Firewall clients enable user or group based access control and logging When a Firewall client connects to ISA Server, the Firewall service automatically authenticates the user. the Firewall Client software can configure the Web Proxy browser automatically.

What Is a Firewall Client


Must install the Firewall Client software on the client computers a large number of client computers in organization and have no means of automating the client installation, it will require a significant effort to deploy the clien The Firewall client can only be installed on Windows computers

What Is a SecureNAT Client


Do not have Firewall Client software. The clients must be able to route requests for Internet resources through the ISA Server computer configure the default gateway on the SecureNAT clients and configure network routing, so that all traffic destined to the Internet is sent through the ISA Server computer.

What Is a SecureNAT Client


When a SecureNAT client connects to the ISA Server computer, the request is directed first to the NAT driver, which substitutes the external IP address of the ISA Server computerfor the internal IP address of the SecureNAT client. The client request is then directed to the Firewall service to determine whether access is allowed. Finally, therequest may be filtered by application filters and other extensions.

What Is a SecureNAT Client


SecureNAT clients have other advantages: SecureNAT clients also provide almost as much functionality as Firewall clients Requests from SecureNAT clients can be passed to application filters, which can modify the requests to enable handling of complex protocols. SecureNAT can use the Web Proxy service for Web access filtering and caching Any operating system that supports Transmission Control Protocol/Internet Protocol (TCP/IP) can be configured as a SecureNAT client

What Is a SecureNAT Client


SecureNAT clients have two primary limitations You cannot control access to Internet resources based on users and groups SecureNAT clients may not be able to use all protocols

Example

Example
Located on the Branch Office Network The client computers must be configured with Router3 as the default gateway. Router3 must be configured with Router2 as the default gateway. Router2 must be configured to route Internet requests to Router1. Router1 must be configured to route Internet requests to the ISA Server computer

Located on Main Office Network2 or Main Office Network1

The client computers must be configured to route all Internet requests to Router1. Router1 must be configured to route Internet requests to the ISA Server computer.

What Is a Web Proxy Client?


A Web Proxy client is a client computer that has an HTTP 1.1compliant Web browser application and is configured to use the ISA Server computer as a Web Proxy server. do not have to install any software to configure Web Proxy clients. must configure the Web applications on the client computers to use the ISA Server computer as a proxy server

How to Configure ISA Server for Web Proxy Clients


The first step in enabling Web Proxy clients is to configure the ISA Server computer to allow connections from these clients.

Configuring Web Proxy Clients Manually

How to Configure Web Proxy Clients

Guidelines for Choosing ISA Server Clients


If You Need To
Avoid deploying or configuring client software Use ISA Server only for accessing Web resources using HTTP or HTTPS Allow access only for authenticated clients Publish servers that are located on your Internal network Improve Web performance in an environment with non-Windows operating systems

Then Use
SecureNAT clients SecureNAT or Web Proxy clients Firewall clients or Web Proxy clients SecureNAT clients Web Proxy or SecureNAT clients

Configuring the SecureNAT and Web Proxy Clients


Configuring SecureNAT Clients to Route Internet Requests

Installing and Configuring the Firewall Client


How to Install Firewall Client Use folder client in ISA server. Run file setup.exe

To enable Automatic Discovery of the ISA Server computer, select Automatically Detect The Appropriate ISA Server Computer.

Installing and Configuring the Firewall Client


can enable or disable the Firewall Client and configure it to detect the ISA Server computer automatically or configure the ISA Server computer manually.

Installing and Configuring the Firewall Client


To deploy the Firewall Client to a large number of clients, choose to automate the Firewall Client installation. Using Active Directory Group Policy to Distribute the Firewall Client

Securing ISA Server 2006


defense-in-depth: A defense-in-depth security strategy means that you use multiple levels of defense to secure your network

Securing ISA Server 2006


Policies, procedures, and awareness: Physical security: Ensure that only authorized personnel can gain physical access to the resources. Perimeter:connecting point between the Internet and the internal network is as secure as possible, options for providing this security include firewalls or multiple firewalls Internal networks :Even if the perimeter is secure, you must still ensure thatthe internal networks are secure for cases in which the perimeter is compromised or when the attacker is within the organization. Operating systems Applications Data

How to Secure the Network Interfaces


To secure ISA Server, begin by securing the network interfaces connected to the server. Securing the External Network Interface Securing the Internal Network Interface Using Security Templates to Manage Services Implementing Security Templates

Maintaining ISA Server 2006


How to Export and Import the ISA Server Configuration Exporting the ISA Server Configuration:

How to Export and Import the ISA Server Configuration


Cloning a server : export a configuration from one ISA Server computer and then import the settings on another computer Saving a partial configuration: export and import any part of the ISA Server configuration :a single rule, an entire policy, or an entire configuration Sending a configuration fo troubleshooting Rolling back a configuration change

Exporting the ISA Server Configuration


The entire ISA Server configuration All the connectivity verifiers, or one selected connectivity verifier All the networks, or one selected network All the network sets, or one selected network set All the network rules, or one selected network rule All the Web chaining rules, or one selected Web chaining rule Cache configuration All the content-download jobs, or one or more selected content-download jobs The entire firewall policy, or one selected rule

Importing the ISA Server Configuration


Open ISA Server Management. Select the object whose settings you want to import. You must select the correct type of object for the configuration file that you are using. On the Tasks tab, click the import task. The exact name for the task will vary, depending on the type of object that you selected. Select the exported .xml file and click Import. Click Apply to apply the changes and click OK when the changes have been applied.

How to Back Up and Restore the ISA Server Configuration

Open ISA Server Management and click the server name. The option to back up and restore the ISA Server configuration is available only when you select the server name. On the Tasks tab, click Backup This ISA Server Configuration. Enter a file name for the backup file and click Backup. You must provide a password for the ISA Server backup To restore the backup, click the server name in ISA Server Management. Then click Restore this ISA Server Configuration and select the appropriate ISA Server backup file. Click Apply to apply the changes and click OK when the changes have been applied.

You might also like