Chapter 1 Evolution of a Firewall: From Proxy 1.0 to ISA 2004 |
|
1 | (78) |
|
The Book: What it Covers and Who It's For |
|
|
2 | (13) |
|
It's in the Book: What We Cover |
|
|
3 | (10) |
|
Two Parts for Two Purposes |
|
|
3 | (1) |
|
Chapter-by-Chapter Game Card |
|
|
4 | (9) |
|
This Book's For You: Our Target Audience |
|
|
13 | (2) |
|
Security: The New Star of the Show |
|
|
15 | (22) |
|
Security: What's Microsoft Got to Do with It? |
|
|
16 | (9) |
|
A Brief History of the Rise of Windows |
|
|
16 | (1) |
|
A New Emphasis on Security |
|
|
16 | (1) |
|
The Trustworthy Computing Initiative |
|
|
17 | (1) |
|
The Role of ISA Server 2004 in Microsoft's Security Initiative |
|
|
18 | (1) |
|
ISA Server Firewall Fallacies |
|
|
19 | (6) |
|
Security: A Policy-Based Approach |
|
|
25 | (10) |
|
What is a Security Policy? |
|
|
26 | (1) |
|
Security Standards and Specifications |
|
|
26 | (1) |
|
Evaluating Security Needs |
|
|
26 | (1) |
|
Defining Areas of Responsibility |
|
|
27 | (6) |
|
|
33 | (1) |
|
Assessing Security Solutions |
|
|
34 | (1) |
|
Security: A Multilayered Approach |
|
|
35 | (2) |
|
The Importance of Multilayered Security |
|
|
36 | (1) |
|
|
36 | (1) |
|
Firewalls: The Guardians at the Gateway |
|
|
37 | (17) |
|
Firewalls: History and Philosophy |
|
|
38 | (1) |
|
Firewalls: Understanding the Architecture |
|
|
39 | (4) |
|
Hardware vs. Software Model |
|
|
39 | (2) |
|
Host-based vs. Network-based Model |
|
|
41 | (2) |
|
Firewalls: Features and Functionality |
|
|
43 | (10) |
|
|
44 | (3) |
|
|
47 | (1) |
|
Intrusion Detection and Prevention |
|
|
48 | (1) |
|
|
49 | (4) |
|
Firewalls: Role and Placement on the Network |
|
|
53 | (1) |
|
ISA: From Proxy Server to Full-Featured Firewall |
|
|
54 | (22) |
|
ISA: A Glint in MS Proxy Server's Eye |
|
|
54 | (11) |
|
In the Beginning: MS Proxy Server |
|
|
55 | (1) |
|
Microsoft's First Real Firewall: ISA Server 2000 |
|
|
56 | (1) |
|
New and Improved: ISA Server 2004 |
|
|
57 | (8) |
|
ISA: A Personal Philosophy |
|
|
65 | (15) |
|
|
66 | (10) |
|
|
76 | (3) |
Chapter 2 Examining the ISA Server 2004 Feature Set |
|
79 | (64) |
|
The New GUI: More Than Just a Pretty Interface |
|
|
80 | (18) |
|
Examining the Graphical Interface |
|
|
80 | (3) |
|
Examining The Management Nodes |
|
|
83 | (15) |
|
ISA Server (Name) Top Node |
|
|
84 | (3) |
|
|
87 | (6) |
|
|
93 | (1) |
|
Virtual Private Networks (VPN) Node |
|
|
94 | (1) |
|
Configuration Node: Networks Subnode |
|
|
95 | (1) |
|
Configuration Node: Cache Subnode |
|
|
96 | (1) |
|
Configuration Node: Add-ins Subnode |
|
|
97 | (1) |
|
Configuration Node: General Subnode |
|
|
97 | (1) |
|
Teaching Old Features New Tricks |
|
|
98 | (25) |
|
Enhanced and Improved Remote Management |
|
|
99 | (7) |
|
Remote Management via the ISA Server 2004 Management Console |
|
|
99 | (4) |
|
Remote Management via Terminal Services/Remote Desktop |
|
|
103 | (2) |
|
Third-Party Remote Management Web GUI |
|
|
105 | (1) |
|
Enhanced and Improved Firewall Features |
|
|
106 | (7) |
|
|
106 | (1) |
|
|
107 | (1) |
|
Easier Access for Popular Services such as OWA and FTP |
|
|
108 | (1) |
|
Expanded Ability to Define Network Objects |
|
|
109 | (1) |
|
Improvements to Firewall Rules Functionality |
|
|
110 | (1) |
|
Improvements to Server Publishing and Web Publishing |
|
|
111 | (2) |
|
Enhanced and Improved Virtual Private Networking and Remote Access |
|
|
113 | (1) |
|
More Flexibility for Site-to-Site VPN Links |
|
|
113 | (1) |
|
Better Control Over VPN Clients |
|
|
113 | (1) |
|
|
114 | (1) |
|
Forced Encryption for Secure Exchange RPC Connections |
|
|
114 | (1) |
|
Enhanced and Improved Web Cache and Web Proxy |
|
|
114 | (4) |
|
Improvements to the Cache Rule Wizard |
|
|
115 | (1) |
|
More Flexibility in Caching of SSL Content |
|
|
116 | (1) |
|
Path Mapping for Web Publishing Rules |
|
|
117 | (1) |
|
Enhancements to Scheduled Content Download |
|
|
117 | (1) |
|
Enhanced and Improved Monitoring and Reporting |
|
|
118 | (5) |
|
Real-time Monitoring of Log Entries |
|
|
118 | (1) |
|
Real-time Monitoring and Filtering of Firewall Sessions |
|
|
119 | (1) |
|
A Built-in Log-Querying Mechanism |
|
|
120 | (1) |
|
|
121 | (1) |
|
Better Customization of Reports |
|
|
121 | (1) |
|
Ability to Publish Reports |
|
|
121 | (1) |
|
E-mail Notification for Report Jobs |
|
|
121 | (1) |
|
Ability to Configure Time of Log Summary |
|
|
121 | (1) |
|
|
122 | (1) |
|
Ability to Log to an MSDE Database |
|
|
122 | (1) |
|
New Features on the Block |
|
|
123 | (7) |
|
|
123 | (1) |
|
|
123 | (1) |
|
|
124 | (1) |
|
|
124 | (1) |
|
New Application Layer Filtering (ALF) Features |
|
|
124 | (4) |
|
|
125 | (1) |
|
Ability to Block Access to All Executables |
|
|
125 | (1) |
|
Ability to Control HTTP Downloads by File Extension |
|
|
125 | (1) |
|
Application of HTTP Filtering to All Client Connections |
|
|
126 | (1) |
|
Control of HTTP Access Based on Signatures |
|
|
126 | (1) |
|
Control Over Allowed HTTP Methods |
|
|
126 | (1) |
|
Ability to Force Secure Exchange RPC Connections |
|
|
127 | (1) |
|
Policy-based Control Over FTP |
|
|
127 | (1) |
|
|
128 | (1) |
|
|
128 | (2) |
|
Benefits of ISA Server 2004 VPN Quarantine Control |
|
|
128 | (1) |
|
Options for Using VPN Quarantine Control |
|
|
128 | (1) |
|
Requirements for Enabling VPN Quarantine Control |
|
|
129 | (1) |
|
Missing in Action: Gone but Not Forgotten |
|
|
130 | (3) |
|
Live Media Stream Splitting |
|
|
130 | (1) |
|
|
130 | (1) |
|
|
131 | (1) |
|
|
131 | (2) |
|
|
133 | (1) |
|
|
134 | (4) |
|
Frequently Asked Questions |
|
|
138 | (5) |
Chapter 3 Stalking the Competition: How ISA 2004 Stacks Up |
|
143 | (92) |
|
Firewall Comparative Issues |
|
|
144 | (15) |
|
The Cost of Firewall Operations |
|
|
147 | (5) |
|
|
147 | (1) |
|
Add-on Modules and Enhancements |
|
|
147 | (1) |
|
|
148 | (1) |
|
|
149 | (1) |
|
|
150 | (1) |
|
|
151 | (1) |
|
Specifications and Features |
|
|
152 | (7) |
|
|
152 | (2) |
|
Firewall and Related Features |
|
|
154 | (2) |
|
|
156 | (1) |
|
|
157 | (1) |
|
|
158 | (1) |
|
Comparing ISA 2004 to Other Firewall Products |
|
|
159 | (61) |
|
ISA Server 2004 Comparative Points |
|
|
159 | (19) |
|
Key Features and General Specifications |
|
|
160 | (3) |
|
Compatibility/Interop erability |
|
|
163 | (3) |
|
|
166 | (4) |
|
Firewall and Related Features |
|
|
170 | (3) |
|
|
173 | (3) |
|
|
176 | (2) |
|
Comparing ISA 2004 to Check Point |
|
|
178 | (4) |
|
Check Point: General Specifications |
|
|
178 | (1) |
|
Check Point: Platform Support and System Requirements |
|
|
179 | (1) |
|
Check Point: Application Layer Filtering Capabilities |
|
|
180 | (1) |
|
|
181 | (1) |
|
|
182 | (1) |
|
Comparing ISA 2004 to Cisco PIX |
|
|
182 | (5) |
|
Cisco PIX: General Specifications |
|
|
183 | (1) |
|
Cisco PIX: Platform Support and System Requirements |
|
|
184 | (1) |
|
Cisco PIX: Application Layer Filtering Capabilities |
|
|
185 | (1) |
|
|
186 | (1) |
|
|
186 | (1) |
|
Comparing ISA 2004 to NetScreen |
|
|
187 | (5) |
|
NetScreen: General Specifications |
|
|
187 | (3) |
|
NetScreen: Platform Support and System Requirements |
|
|
190 | (1) |
|
NetScreen: Application Layer Filtering Capabilities |
|
|
190 | (1) |
|
|
191 | (1) |
|
|
192 | (1) |
|
Comparing ISA 2004 to SonicWall |
|
|
192 | (8) |
|
SonicWall: General Specifications |
|
|
192 | (4) |
|
SonicWall: Platform Support and System Requirements |
|
|
196 | (1) |
|
SonicWall: Application Layer Filtering Capabilities |
|
|
197 | (2) |
|
|
199 | (1) |
|
|
200 | (1) |
|
Comparing ISA 2004 to WatchGuard |
|
|
200 | (7) |
|
Watchguard: General Specifications |
|
|
201 | (2) |
|
WatchGuard: Platform Support and System Requirements |
|
|
203 | (1) |
|
WatchGuard: Application Layer Filtering Capabilities |
|
|
203 | (2) |
|
|
205 | (2) |
|
|
207 | (1) |
|
Comparing ISA 2004 to Symantec Enterprise Firewall |
|
|
207 | (7) |
|
Symantec: General Specifications |
|
|
208 | (3) |
|
Symantec: Platform Support and System Requirements |
|
|
211 | (1) |
|
Symantec: Application Layer Filtering Capabilities |
|
|
212 | (1) |
|
|
212 | (1) |
|
|
213 | (1) |
|
Comparing ISA 2004 to Blue Coat SG |
|
|
214 | (4) |
|
Blue Coat: General Specifications |
|
|
214 | (1) |
|
Blue Coat: Platform Support and System Requirements |
|
|
215 | (1) |
|
Blue Coat: Application Layer Filtering Capabilities |
|
|
216 | (1) |
|
|
216 | (1) |
|
|
217 | (1) |
|
Comparing ISA 2004 to Open Source Firewalls |
|
|
218 | (18) |
|
|
218 | (1) |
|
|
219 | (1) |
|
|
219 | (1) |
|
|
220 | (5) |
|
|
225 | (6) |
|
Frequently Asked Questions |
|
|
231 | (4) |
Chapter 4 ISA 2004 Network Concepts and Preparing the Network Infrastructure |
|
235 | (124) |
|
Our Approach to ISA Firewall Network Design and Defense Tactics |
|
|
236 | (19) |
|
|
237 | (10) |
|
|
247 | (1) |
|
Software Firewalls are Inherently Weak |
|
|
248 | (1) |
|
You Can't Trust Any Service Running on the Windows Operating System to be Secure |
|
|
249 | (1) |
|
ISA Firewalls Make Good Proxy Servers, but I Need a "Real Firewall" to Protect My Network |
|
|
250 | (2) |
|
ISA Firewalls Run on an Intel Hardware Platform, and Firewalls Should Have "No Moving Parts" |
|
|
252 | (1) |
|
"I Have a Firewall and an ISA Server" |
|
|
252 | (1) |
|
Why ISA Belongs in Front of Critical Assets |
|
|
253 | (1) |
|
A Better Network and Firewall Topology |
|
|
254 | (1) |
|
Tom and Deb Shinder's Configuring ISA 2004 Network Layout |
|
|
255 | (18) |
|
Creating the ISALOCAL Virtual Machine |
|
|
260 | (13) |
|
How ISA Firewall's Define Networks and Network Relationships |
|
|
273 | (69) |
|
|
276 | (3) |
|
The ISA Firewall's Default Networks |
|
|
279 | (12) |
|
|
279 | (2) |
|
|
281 | (9) |
|
External Network (default) |
|
|
290 | (1) |
|
|
290 | (1) |
|
Quarantined VPN Clients Network |
|
|
291 | (1) |
|
|
291 | (4) |
|
Controlling Routing Behavior with Network Rules |
|
|
295 | (2) |
|
The ISA 2004 Network Objects |
|
|
297 | (13) |
|
|
298 | (1) |
|
|
298 | (2) |
|
|
300 | (1) |
|
|
301 | (1) |
|
|
302 | (1) |
|
|
303 | (2) |
|
|
305 | (2) |
|
|
307 | (2) |
|
|
309 | (1) |
|
ISA Firewall Network Templates |
|
|
310 | (19) |
|
|
310 | (4) |
|
Trihomed (3-Leg) or DMZ Template |
|
|
314 | (4) |
|
|
318 | (4) |
|
|
322 | (5) |
|
Single Network Adapter or Unihomed Network Template |
|
|
327 | (2) |
|
Dynamic Address Assignment on the ISA Firewall's External Interface |
|
|
329 | (1) |
|
Dial-up Connection Support for ISA firewalls, Including VPN Connections to the ISP |
|
|
330 | (5) |
|
"Network Behind a Network" Scenarios (Advanced ISA Firewall Configuration) |
|
|
335 | (7) |
|
Web Proxy Chaining as a Form of Network Routing |
|
|
342 | (7) |
|
Firewall Chaining as a Form of Network Routing |
|
|
349 | (1) |
|
Configuring the ISA Firewall as a DHCP Server |
|
|
349 | (3) |
|
|
352 | (1) |
|
|
352 | (4) |
|
Frequently Asked Questions |
|
|
356 | (3) |
Chapter 5 ISA 2004 Client Types and Automating Client Provisioning |
|
359 | (98) |
|
Understanding ISA 2004 Client Types |
|
|
360 | (57) |
|
Understanding the ISA 2004 SecureNAT Client |
|
|
363 | (8) |
|
SecureNAT Client Limitations |
|
|
365 | (4) |
|
SecureNAT Client Advantages |
|
|
369 | (2) |
|
Name Resolution for SecureNAT Clients |
|
|
371 | (6) |
|
Understanding the ISA 2004 Firewall Client |
|
|
377 | (25) |
|
Allows Strong User/Group-Based Authentication for All Winsock Applications Using TCP and UDP Protocols |
|
|
377 | (1) |
|
Allows User and Application Information to be Recorded in the ISA 2004 Firewall's Log Files |
|
|
378 | (1) |
|
Provides Enhanced Support for Network Applications, Including Complex Protocols Requiring Secondary Connections |
|
|
378 | (1) |
|
Provides "Proxy" DNS Support for Firewall Client Machines |
|
|
379 | (1) |
|
The Network Routing Infrastructure Is Transparent to the Firewall Client |
|
|
380 | (3) |
|
How the Firewall Client Works |
|
|
383 | (2) |
|
Installing the Firewall Client Share |
|
|
385 | (1) |
|
Installing the Firewall Client |
|
|
386 | (2) |
|
Firewall Client Configuration |
|
|
388 | (5) |
|
Client Side Firewall Client Settings |
|
|
393 | (3) |
|
Firewall Client Configuration Files |
|
|
396 | (5) |
|
Firewall Client Configuration at the ISA 2004 Firewall |
|
|
401 | (1) |
|
ISA 2004 Web Proxy Client |
|
|
402 | (12) |
|
Improved Performance for the Firewall Client and SecureNAT Client Configuration for Web Access |
|
|
403 | (1) |
|
Ability to Use the Autoconfiguration Script to Bypass Sites (Direct Access) |
|
|
403 | (1) |
|
Allows You to Provide Web Access (HTTP/HTTPS/FTP Download) Without Enabling Users Access to Other Protocols |
|
|
404 | (1) |
|
Allows You to Enforce User/Group-based Access Controls Over Web Access |
|
|
405 | (6) |
|
Allows you to Limit the Number of Outbound Web Proxy Client Connections |
|
|
411 | (1) |
|
Supports Web Proxy Chaining, Which Can Further Speed Up Internet Access |
|
|
412 | (2) |
|
ISA 2004 Multiple Client Type Configuration |
|
|
414 | (1) |
|
Deciding on an ISA 2004 Client Type |
|
|
415 | (2) |
|
Automating ISA 2004 Client Provisioning |
|
|
417 | (21) |
|
Configuring DHCP Servers to Support Web Proxy and Firewall Client Autodiscovery |
|
|
419 | (10) |
|
|
420 | (1) |
|
|
420 | (3) |
|
Create the DHCP 252 Scope Option and Add It to the Scope |
|
|
423 | (3) |
|
Configure the Client as a DHCP Client |
|
|
426 | (1) |
|
Configure the Client Browser to Use DCHP for Autodiscovery |
|
|
426 | (1) |
|
Configure the ISA 2004 Firewall to Publish Autodiscovery Information |
|
|
427 | (1) |
|
|
428 | (1) |
|
Configuring DNS Servers to Support Web Proxy and Firewall Client Autodiscovery |
|
|
429 | (7) |
|
Creating the wpad Entry in DNS |
|
|
430 | (3) |
|
Configure the Client to Use the Fully-Qualified wpad Alias |
|
|
433 | (2) |
|
Configure the client browser to use autodiscovery |
|
|
435 | (1) |
|
Special Considerations for VPN Clients |
|
|
436 | (2) |
|
Configure the ISA 2004 Firewall to Publish Autodiscovery Information |
|
|
436 | (1) |
|
Making the Connection Using DNS for Autodiscovery |
|
|
437 | (1) |
|
Automating Installation of the Firewall Client |
|
|
438 | (11) |
|
Configuring Firewall Client and Web Proxy Client Configuration in the ISA Management Console |
|
|
439 | (4) |
|
Group Policy Software Installation |
|
|
443 | (3) |
|
Silent Installation Script |
|
|
446 | (1) |
|
Systems Management Server (SMS) |
|
|
447 | (2) |
|
|
449 | (4) |
|
Frequently Asked Questions |
|
|
453 | (4) |
Chapter 6 Installing and Configuring the ISA Firewall Software |
|
457 | (86) |
|
Pre-installation Tasks and Considerations |
|
|
458 | (13) |
|
|
458 | (2) |
|
Configuring the Routing Table |
|
|
460 | (2) |
|
|
462 | (2) |
|
Configuring the ISA Firewall's Network Interfaces |
|
|
464 | (4) |
|
|
468 | (2) |
|
Installation via a Terminal Services Administration Mode Session |
|
|
470 | (1) |
|
Performing a Clean Installation on a Multihomed Machine |
|
|
471 | (6) |
|
Default Post-installation ISA Firewall Configuration |
|
|
477 | (2) |
|
The Post-installation System Policy |
|
|
479 | (10) |
|
Performing an Upgrade Installation |
|
|
489 | (1) |
|
Performing a Single NIC Installation (Unihomed ISA Firewall) |
|
|
490 | (2) |
|
Quick Start Configuration for ISA Firewalls |
|
|
492 | (28) |
|
Configuring the ISA Firewall's Network Interfaces |
|
|
494 | (3) |
|
IP Address and DNS Server Assignment |
|
|
494 | (2) |
|
|
496 | (1) |
|
Installing and Configuring a DNS Server on the ISA Server Firewall |
|
|
497 | (6) |
|
Installing the DNS Service |
|
|
497 | (1) |
|
Configuring the DNS Service on the ISA Firewall |
|
|
498 | (3) |
|
Configuring the DNS Service on the Internal Network DNS Server |
|
|
501 | (2) |
|
Installing and Configuring a DHCP Server on the ISA Server Firewall |
|
|
503 | (3) |
|
Installing the DHCP Service |
|
|
503 | (1) |
|
Configuring the DHCP Service |
|
|
504 | (2) |
|
Installing and Configuring the ISA Server 2004 Software |
|
|
506 | (11) |
|
Configuring the ISA Firewall |
|
|
509 | (8) |
|
Configuring the Internal Network Computers |
|
|
517 | (3) |
|
Configuring Internal Clients as DHCP Clients |
|
|
518 | (2) |
|
Hardening the Base ISA Firewall Configuration and Operating System |
|
|
520 | (17) |
|
ISA Firewall Service Dependencies |
|
|
521 | (2) |
|
Service Requirements for Common Tasks Performed on the ISA Firewall |
|
|
523 | (3) |
|
Client Roles for the ISA Firewall |
|
|
526 | (2) |
|
ISA Firewall Administrative Roles and Permissions |
|
|
528 | (2) |
|
|
530 | (1) |
|
Lockdown Mode Functionality |
|
|
530 | (1) |
|
|
531 | (2) |
|
DHCP Spoof Attack Prevention |
|
|
533 | (4) |
|
|
537 | (1) |
|
|
537 | (2) |
|
Frequently Asked Questions |
|
|
539 | (4) |
Chapter 7 Creating and Using ISA 2004 Firewall Access Policy |
|
543 | (88) |
|
|
544 | (2) |
|
ISA Firewall Access Rule Elements |
|
|
546 | (9) |
|
|
547 | (1) |
|
|
548 | (1) |
|
|
548 | (6) |
|
|
554 | (1) |
|
|
555 | (1) |
|
Configuring Access Rules for Outbound Access through the ISA Firewall |
|
|
555 | (19) |
|
|
556 | (1) |
|
|
556 | (2) |
|
The Access Rule Sources Page |
|
|
558 | (1) |
|
The Access Rule Destinations Page |
|
|
559 | (1) |
|
|
559 | (1) |
|
|
560 | (8) |
|
|
561 | (1) |
|
|
561 | (1) |
|
|
562 | (1) |
|
|
563 | (1) |
|
|
564 | (1) |
|
|
565 | (1) |
|
|
566 | (1) |
|
|
566 | (2) |
|
The Access Rule Context Menu Options |
|
|
568 | (1) |
|
|
569 | (1) |
|
|
570 | (1) |
|
|
570 | (1) |
|
Ordering and Organizing Access Rules |
|
|
570 | (1) |
|
How to Block Logging for Selected Protocols |
|
|
571 | (2) |
|
Disabling Automatic Web Proxy Connections for SecureNAT Clients |
|
|
573 | (1) |
|
Using Scripts to Populate Domain Name Sets |
|
|
574 | (17) |
|
|
576 | (5) |
|
Extending the SSL Tunnel Port Range for Web Access to Alternate SSL Ports |
|
|
581 | (2) |
|
Avoiding Looping Back through the ISA Firewall for Internal Resources |
|
|
583 | (2) |
|
Anonymous Requests Appear in Log File Even When Authentication is Enforced For Web (HTTP Connections) |
|
|
585 | (1) |
|
Blocking MSN Messenger using an Access Rule |
|
|
585 | (3) |
|
Allowing Outbound Access to MSN Messenger via Web Proxy |
|
|
588 | (2) |
|
Changes to ISA Firewall Policy Only Affects New Connections |
|
|
590 | (1) |
|
Creating and Configuring a Public Address Trihomed DMZ Network |
|
|
591 | (22) |
|
Configure the Routing Table on the Upstream Router |
|
|
597 | (1) |
|
Configure the Network Adaptors |
|
|
598 | (1) |
|
Install the ISA Server 2004 Firewall Software |
|
|
599 | (1) |
|
Install and Configure the IIS WWW and SMTP Services on the DMZ Server |
|
|
599 | (1) |
|
|
600 | (2) |
|
Create the Network Rules Between the DMZ and External Network and for the DMZ and Internal Network |
|
|
602 | (1) |
|
Create Server Publishing Rule Allowing DNS from DMZ to Internal |
|
|
603 | (1) |
|
Create an Access Rule Allowing DNS from Internal to External |
|
|
604 | (1) |
|
Create an Access Rule Allowing DNS from Internal to External |
|
|
605 | (1) |
|
Create an Access Rule Allow HTTP from External to DMZ |
|
|
606 | (2) |
|
Create an Access Rule Mowing SMTP from External to DMZ |
|
|
608 | (1) |
|
Test the Access Rules from External to DMZ |
|
|
609 | (2) |
|
Test the DNS Rule from the DMZ to the Internal Network |
|
|
611 | (1) |
|
Change the Access Rule Allowing External to DMZ by Disabling the Web Proxy Filter |
|
|
612 | (1) |
|
Allowing Intradomain Communications through the ISA Firewall |
|
|
613 | (10) |
|
|
623 | (1) |
|
|
623 | (4) |
|
Frequently Asked Questions |
|
|
627 | (4) |
Chapter 8 Publishing Network Services with ISA 2004 Firewalls |
|
631 | (80) |
|
Overview of Web Publishing and Server Publishing |
|
|
632 | (9) |
|
|
632 | (6) |
|
Provide Proxied Access to Web Sites Protected by ISA firewall |
|
|
633 | (1) |
|
Perform Deep Application-Layer Inspection of Connections Made to Published Web Sites |
|
|
633 | (1) |
|
|
634 | (1) |
|
Pre-authentication of Connections Made to Published Web Sites |
|
|
634 | (1) |
|
Reverse Caching of Published Web Sites |
|
|
635 | (1) |
|
Ability to Publish Multiple Web Sites with a Single IP Address |
|
|
635 | (1) |
|
Ability to Rewrite URLs Returned by the Published Web Site using the ISA Firewall's Link Translator |
|
|
636 | (1) |
|
Support for Forwarding either the ISA Firewall's IP Address, or the Original Web Client's IP Address to the Web Site |
|
|
637 | (1) |
|
Support for SecurlD Authentication |
|
|
637 | (1) |
|
Support for RADIUS Authentication |
|
|
637 | (1) |
|
Ability to Schedule when Connections are Allowed to Published Web Sites |
|
|
638 | (1) |
|
Port and Protocol Redirection |
|
|
638 | (1) |
|
|
638 | (3) |
|
Server Publishing Rules are a Form of Reverse NAT or "Port Mapping" and do not Proxy the Connection |
|
|
639 | (1) |
|
Almost All IP Level and TCP/UDP Protocols Can be Published using Server Publishing Rules |
|
|
639 | (1) |
|
Server Publishing Rules do not Support Authentication |
|
|
639 | (1) |
|
Application-Layer Filtering can be Applied To a Defined Subset of Server Published Protocols |
|
|
639 | (1) |
|
Configuring Port Overrides to Customize the Listening Ports and the Port Redirection |
|
|
640 | (1) |
|
You can use IP Address Controls Over who can Access Published Resources |
|
|
640 | (1) |
|
External Client Source IP Address can be Preserved Or Replaced with the ISA Firewall's IP address |
|
|
641 | (1) |
|
Apply Schedules Limiting when the Published Server can be Accessed via the Server Publishing Rule |
|
|
641 | (1) |
|
Support for Port Redirection or PAT (Port Address Translation) |
|
|
641 | (1) |
|
Creating and Configuring Non-SSL Web Publishing Rules |
|
|
641 | (27) |
|
The Select Rule Action Page |
|
|
642 | (1) |
|
The Define Website to Publish Page |
|
|
642 | (3) |
|
The Public Name Details Page |
|
|
645 | (1) |
|
The Select Web Listener Page and Creating an HTTP Web Listener |
|
|
646 | (8) |
|
|
654 | (1) |
|
The Web Publishing Rule Properties Dialog Box |
|
|
655 | (13) |
|
|
655 | (1) |
|
|
656 | (1) |
|
|
656 | (1) |
|
|
657 | (2) |
|
|
659 | (1) |
|
|
659 | (1) |
|
|
660 | (1) |
|
|
661 | (3) |
|
|
664 | (2) |
|
|
666 | (1) |
|
|
667 | (1) |
|
|
668 | (1) |
|
Creating and Configuring SSL Web Publishing Rules |
|
|
668 | (20) |
|
|
669 | (5) |
|
SSL "Tunneling" versus SSL "Bridging" |
|
|
670 | (1) |
|
What About SSL-to-HTTP Bridging? |
|
|
670 | (1) |
|
Enterprise and Standalone Certificate Authorities |
|
|
671 | (1) |
|
SSL-to-SSL Bridging and Web Site Certificate Configuration |
|
|
672 | (2) |
|
Importing Web Site Certificates into The ISA Firewall's Machine Certificate Store |
|
|
674 | (2) |
|
Requesting a User Certificate for the ISA Firewall to Present to SSL Web Sites |
|
|
676 | (2) |
|
Creating an SSL Web Publishing Rule |
|
|
678 | (10) |
|
|
679 | (1) |
|
The Select Rule Action page |
|
|
679 | (1) |
|
|
680 | (1) |
|
The Define Website to Publish Page |
|
|
681 | (2) |
|
The Public Name Details Page |
|
|
683 | (1) |
|
The Select Web Listener Page |
|
|
684 | (4) |
|
|
688 | (1) |
|
The SSL Web Publishing Rule Properties Dialog Box |
|
|
688 | (1) |
|
Creating Server Publishing Rules |
|
|
688 | (11) |
|
The Server Publishing Rule Properties Dialog Box |
|
|
693 | (5) |
|
Server Publishing HTTP Sites |
|
|
698 | (1) |
|
Creating Mail Server Publishing Rules |
|
|
699 | (7) |
|
The Web Client Access: Outlook Web Access (OWA), Outlook Mobile Access, Exchange Server ActiveSync Option |
|
|
701 | (2) |
|
The Client Access: RPC, IMAP, POP3, SMTP Option |
|
|
703 | (3) |
|
|
706 | (1) |
|
|
706 | (3) |
|
Frequently Asked Questions |
|
|
709 | (2) |
Chapter 9 Creating Remote Access and Site-to-Site VPNs with ISA Firewalls |
|
711 | (114) |
|
Overview of ISA Firewall VPN Networking |
|
|
712 | (10) |
|
Firewall Policy Applied to VPN Client Connections |
|
|
713 | (2) |
|
Firewall Policy Applied to VPN Site-to-Site Connections |
|
|
715 | (1) |
|
|
715 | (1) |
|
User Mapping of VPN Clients |
|
|
716 | (1) |
|
SecureNAT Client Support for VPN Connections |
|
|
717 | (1) |
|
Site-to-Site VPN Using Tunnel Mode IPSec |
|
|
718 | (1) |
|
Publishing PPTP VPN Servers |
|
|
719 | (1) |
|
Pre-shared Key Support for IPSec VPN Connections |
|
|
719 | (1) |
|
Advanced Name Server Assignment for VPN Clients |
|
|
720 | (1) |
|
Monitoring of VPN Client Connections |
|
|
721 | (1) |
|
Creating a Remote Access PPTP VPN Server |
|
|
722 | (15) |
|
|
722 | (9) |
|
Create an Access Rule Allowing VPN Clients Access to Allowed Resources |
|
|
731 | (2) |
|
|
733 | (3) |
|
Test the PPTP VPN Connection |
|
|
736 | (1) |
|
Creating a Remote Access L2TP/IPSec Server |
|
|
737 | (10) |
|
Issue Certificates to the ISA Firewall and VPN Clients |
|
|
738 | (5) |
|
Test the L2TP/IPSec VPN Connection |
|
|
743 | (1) |
|
|
744 | (1) |
|
Using a Pre-shared Key for VPN Client Remote Access Connections |
|
|
745 | (2) |
|
Creating a PPTP Site-to-Site VPN |
|
|
747 | (17) |
|
Create the Remote Site Network at the Main Office |
|
|
750 | (3) |
|
Create the Network Rule at the Main Office |
|
|
753 | (1) |
|
Create the Access Rules at the Main Office |
|
|
754 | (2) |
|
Create the VPN Gateway Dial-in Account at the Main Office |
|
|
756 | (2) |
|
Create the Remote Site Network at the Branch Office |
|
|
758 | (1) |
|
Create the Network Rule at the Branch Office |
|
|
759 | (1) |
|
Create the Access Rules at the Branch Office |
|
|
760 | (2) |
|
Create the VPN Gateway Dial-in Account at the Branch Office |
|
|
762 | (1) |
|
Activate the Site-to-Site Links |
|
|
763 | (1) |
|
Creating an L2TP/IPSec Site-to-Site VPN |
|
|
764 | (10) |
|
Enable the System Policy Rule on the Main Office Firewall to Access the Enterprise CA |
|
|
765 | (1) |
|
Request and install a Web Site Certificate for the Main Office Firewall |
|
|
766 | (3) |
|
Configure the Main Office ISA Firewall to Use L2TP/IPSec for the Site-to-Site Link |
|
|
769 | (1) |
|
Enable the System Policy Rule on the Branch Office Firewall to Access the Enterprise CA |
|
|
770 | (1) |
|
Request and Install a Web Site Certificate for the Branch Office Firewall |
|
|
770 | (2) |
|
Configure the Main Office ISA Firewall to Use L2TP/IPSec for the Site-to-Site Link |
|
|
772 | (1) |
|
Activate the L2TP/IPSec Site-to-Site VPN Connection |
|
|
773 | (1) |
|
Configuring Pre-shared Keys for Site-to-Site L2TP/IPSec VPN Links |
|
|
774 | (1) |
|
IPSec Tunnel Mode Site-to-Site VPNs with Downlevel VPN Gateways |
|
|
774 | (1) |
|
Using RADIUS for VPN Authentication and Remote Access Policy |
|
|
775 | (16) |
|
Configure the Internet Authentication Services (RADIUS) Server |
|
|
776 | (1) |
|
Create a VPN Clients Remote Access Policy |
|
|
777 | (3) |
|
Remote Access Permissions and Domain Functional Level |
|
|
780 | (2) |
|
Changing the User Account Dial-in Permissions |
|
|
782 | (1) |
|
Changing the Domain Functional Level |
|
|
782 | (2) |
|
Controlling Remote Access Permission via Remote Access Policy |
|
|
784 | (1) |
|
Enable the VPN Server on the ISA Firewall and Configure RADIUS Support |
|
|
785 | (3) |
|
Create an Access Rule Allowing VPN Clients Access to Approved Resources |
|
|
788 | (1) |
|
Make the Connection from a PPTP VPN Client |
|
|
789 | (2) |
|
Using EAP User Certificate Authentication for Remote Access VPNs |
|
|
791 | (6) |
|
Configuring the ISA Firewall Software to Support EAP Authentication |
|
|
792 | (1) |
|
Enabling User Mapping for EAP Authenticated Users |
|
|
793 | (1) |
|
Issuing a User Certificate to the Remote Access VPN Client Machine |
|
|
794 | (3) |
|
Supporting Outbound VPN Connections through the ISA Firewall |
|
|
797 | (3) |
|
Installing and Configuring the DHCP Server and DHCP Relay Agent on the ISA Firewall |
|
|
800 | (2) |
|
Creating a Site-to-Site VPN Between an ISA Server 2000 and ISA Firewall |
|
|
802 | (12) |
|
Run the Local VPN Wizard on the ISA Server 2000 firewall |
|
|
805 | (2) |
|
Change the Password for the Remote VPN User Account |
|
|
807 | (1) |
|
Change the Credentials the ISA Server 2000 Firewall uses for the Demand-dial Connection to the Main Office |
|
|
807 | (1) |
|
Change the ISA Server 2000 VPN Gateway's Demand-dial Interface Idle Properties |
|
|
808 | (1) |
|
Create a Static Address Pool for VPN Clients and Gateways |
|
|
809 | (1) |
|
Run the Remote Site Wizard on the Main Office ISA firewall |
|
|
810 | (1) |
|
Create a Network Rule that Defines the Route Relationship Between the Main and Branch Office |
|
|
811 | (1) |
|
Create Access Rules Allowing Traffic from the Main Office to the Branch Office |
|
|
812 | (1) |
|
Create the User Account for the Remote VPN Router |
|
|
813 | (1) |
|
|
814 | (1) |
|
|
814 | (4) |
|
|
818 | (1) |
|
|
818 | (4) |
|
Frequently Asked Questions |
|
|
822 | (3) |
Chapter 10 ISA 2004 Stateful Inspection and Application Layer Filtering |
|
825 | (72) |
|
|
826 | (1) |
|
|
827 | (19) |
|
The SMTP Filter and Message Screener |
|
|
827 | (13) |
|
Installing the SMTP Message Screener on a Dedicated SMTP Relay |
|
|
828 | (12) |
|
|
840 | (2) |
|
The POP Intrusion Detection Filter |
|
|
842 | (1) |
|
|
842 | (1) |
|
|
843 | (1) |
|
|
844 | (1) |
|
|
845 | (1) |
|
|
845 | (1) |
|
|
845 | (1) |
|
|
846 | (1) |
|
|
846 | (1) |
|
|
846 | (36) |
|
The HTTP Security Filter (HTTP Filter) |
|
|
846 | (27) |
|
Overview of HTTP Security Filter Settings |
|
|
848 | (11) |
|
HTTP Security Filter Logging |
|
|
859 | (1) |
|
Exporting and Importing HTTP Security Filter Settings |
|
|
860 | (2) |
|
Investigating HTTP Headers for Potentially Dangerous Applications |
|
|
862 | (3) |
|
Example HTTP Security Filter Policies |
|
|
865 | (4) |
|
Commonly Blocked Headers and Application Signatures |
|
|
869 | (2) |
|
The Dangers of SSL Tunneling |
|
|
871 | (2) |
|
The ISA Server Link Translator |
|
|
873 | (5) |
|
Determining Custom Dictionary Entries |
|
|
876 | (1) |
|
Configuring Custom Link Translation Dictionary Entries |
|
|
877 | (1) |
|
|
878 | (1) |
|
|
879 | (1) |
|
The OWA Forms-based Authentication Filter |
|
|
880 | (1) |
|
The RADIUS Authentication Filter |
|
|
881 | (1) |
|
IP Filtering and Intrusion Detection/Intrusion Prevention |
|
|
882 | (11) |
|
Common Attacks Detection and Prevention |
|
|
882 | (8) |
|
Denial-of-Service Attacks |
|
|
883 | (6) |
|
|
889 | (1) |
|
DNS Attacks Detection and Prevention |
|
|
890 | (1) |
|
IP Options and IP Fragment Filtering |
|
|
891 | (7) |
|
|
892 | (1) |
|
|
893 | (1) |
|
|
893 | (1) |
|
Frequently Asked Questions |
|
|
894 | (3) |
Chapter 11 Accelerating Web Performance with ISA 2004 Caching Capabilities |
|
897 | (44) |
|
Understanding Caching Concepts |
|
|
898 | (6) |
|
|
899 | (2) |
|
|
899 | (1) |
|
|
899 | (2) |
|
Web Caching Architectures |
|
|
901 | (2) |
|
|
903 | (1) |
|
Understanding ISA Server 2004's Web Caching Capabilities |
|
|
904 | (6) |
|
Using the Caching Feature |
|
|
905 | (1) |
|
Understanding Cache Rules |
|
|
906 | (2) |
|
Using Cache Rules to Specify Content Types That Can Be Cached |
|
|
906 | (1) |
|
Using Cache Rules to Specify How Objects are Retrieved and Served from Cache |
|
|
907 | (1) |
|
Understanding the Content Download Feature |
|
|
908 | (2) |
|
Configuring ISA Server 2004 as a Caching Server |
|
|
910 | (25) |
|
Enabling and Configuring Caching |
|
|
910 | (3) |
|
How to Enable Caching in Standard Edition |
|
|
911 | (1) |
|
How to Disable Caching in Standard Edition |
|
|
912 | (1) |
|
How to Configure Caching Properties |
|
|
913 | (3) |
|
Configuring Which Content to Cache |
|
|
913 | (1) |
|
Configuring the Maximum Size of Objects in the Cache |
|
|
914 | (1) |
|
Configuring Whether Expired Objects Should be Returned from Cache |
|
|
915 | (1) |
|
Allocating a Percentage of Memory to Caching |
|
|
915 | (1) |
|
|
916 | (9) |
|
How to Create a Cache Rule |
|
|
916 | (4) |
|
How to Modify an Existing Cache Rule |
|
|
920 | (1) |
|
How to Disable or Delete a Cache Rule |
|
|
921 | (1) |
|
How to Change the Order of Cache Rules |
|
|
922 | (1) |
|
|
922 | (1) |
|
How to Export and Import Cache Rules |
|
|
922 | (3) |
|
Configuring Content Downloads |
|
|
925 | (18) |
|
How to Ensure a Content Download Job Can Run |
|
|
925 | (4) |
|
How to Create and Configure Scheduled Content Download Jobs |
|
|
929 | (3) |
|
How to Make Changes to an Existing Content Download Job |
|
|
932 | (1) |
|
How to Disable or Delete Content Download Jobs |
|
|
932 | (1) |
|
How to Export and Import Content Download Job Configurations |
|
|
932 | (2) |
|
How to Run a Content Download Job Immediately |
|
|
934 | (1) |
|
|
935 | (1) |
|
|
935 | (2) |
|
Frequently Asked Questions |
|
|
937 | (4) |
Chapter 12 Using ISA Server 2004's Monitoring, Logging, and Reporting Tools |
|
941 | (64) |
|
|
942 | (1) |
|
Exploring the ISA Server 2004 Dashboard |
|
|
943 | (9) |
|
|
944 | (7) |
|
Dashboard Connectivity Section |
|
|
945 | (1) |
|
Dashboard Services Section |
|
|
946 | (1) |
|
Dashboard Reports Section |
|
|
947 | (1) |
|
|
948 | (1) |
|
Dashboard Sessions Section |
|
|
949 | (1) |
|
Dashboard System Performance Section |
|
|
950 | (1) |
|
Configuring and Customizing the Dashboard |
|
|
951 | (1) |
|
Creating and Configuring ISA Server 2004 Alerts |
|
|
952 | (11) |
|
|
952 | (2) |
|
Viewing the Predefined Alerts |
|
|
954 | (1) |
|
|
955 | (5) |
|
|
960 | (1) |
|
|
961 | (2) |
|
Monitoring ISA Server 2004 Connectivity; Sessions, and Services |
|
|
963 | (13) |
|
Configuring and Monitoring Connectivity |
|
|
963 | (7) |
|
Creating Connectivity Verifiers |
|
|
964 | (3) |
|
|
967 | (3) |
|
|
970 | (5) |
|
Viewing, Stopping and Pausing Monitoring of Sessions |
|
|
970 | (2) |
|
Monitoring Specific Sessions Using Filter Definitions |
|
|
972 | (3) |
|
|
975 | (1) |
|
Exporting and Importing Filter Definitions |
|
|
975 | (1) |
|
|
975 | (1) |
|
Working with ISA Server 2004 Logs and Reports |
|
|
976 | (22) |
|
Understanding ISA Server 2004 Logs |
|
|
976 | (10) |
|
|
976 | (2) |
|
|
978 | (3) |
|
How to Use the Log Viewer |
|
|
981 | (2) |
|
How to Filter the Log Information |
|
|
983 | (2) |
|
Saving Log Viewer Data to a File |
|
|
985 | (1) |
|
Exporting and Importing Filter Definitions |
|
|
986 | (1) |
|
Generating, Viewing, and Publishing Reports with ISA Server 2004 |
|
|
986 | (8) |
|
How to Generate a One-time Report |
|
|
987 | (2) |
|
How to Configure an Automated Report Job |
|
|
989 | (3) |
|
|
992 | (1) |
|
|
993 | (1) |
|
|
994 | (1) |
|
Using ISA Server 2004's Performance Monitor |
|
|
994 | (4) |
|
|
998 | (4) |
|
Frequently Asked Questions |
|
|
1002 | |
Appendix A: Network Security Basics is available at www.syngress.com/solutions |
|
Download the bonus chapter "Configuring Entperprise Networks, Caching Arrays, and Network Load Balancing," from www.syngress.com/solutions after the release of ISA Server 2004 Enterprise Edition. |
|
Index |
|
1005 | |