Contents
Chapter 2: Planning Considerations
Chapter 3: Installing ISA Server
Chapter 4: Mirgrating from Microsoft Proxy Server 2.0
Chapter 5: Upgrading to ISA Server, Enterprise Edition
Chapter 6: Installing and Configuring Clients
Chapter 7: Deployment Scenarios
The Internet provides organizations with new opportunities to connect with customers, partners, and employees. While this presents great opportunities, it also introduces new risks and concerns such as security, performance, and manageability. Microsoft Internet Security and Acceleration (ISA) Server addresses the needs of today’s Internet-enabled businesses. ISA Server provides a multilayered firewall that helps protect your network resources. The Web cache of ISA Server enables organizations to save network bandwidth and provide faster Web access for users by serving objects from a local source, rather than over a periodically congested Internet.
Whether it is deployed as dedicated components or as an integrated firewall and caching server, ISA Server provides a unified management console that simplifies security and access management. Built for the Windows 2000 platform, ISA Server provides secure and fast Internet connectivity with powerful integrated management tools.
ISA Server can provide value to information technology managers, network administrators and information-security professionals in organizations of all sizes, who are concerned about the security, performance, manageability or operating costs of their networks. ISA Server can be used in a spectrum of scenarios, ranging from small offices and branch offices, to Internet service providers (ISPs) and Web hosting companies, and to e-commerce sites.
This guide is intended for systems professionals, network administrators, and small business power users who want to learn how to install and deploy ISA Server in their network. The guide assumes that you are familiar with basic networking concepts, including familiarity with DNS, DHCP, Routing and Remote Access, Transmission Control Protocol/Internet Protocol (TCP/IP) networking, and other Windows networking components.
This guide presents an overview of ISA Server and provides the background information you need to plan your implementation of this software.
The guide also includes detailed procedures on the installation process, checklists for post-installation configuration, and detailed sample scenarios of how ISA Server might be used in your network.
This guide is organized into the following chapters:
This chapter provides an overview of Microsoft Internet Security and Acceleration (ISA) Server. It also describes some common scenarios in which ISA Server might be used in your network.
This chapter includes the following sections:
With the exploding growth of business activities taking place on the Internet and the vast number of corporate networks which are connected to it, the need is greater than ever for a powerful and easy-to-administer Internet gateway that provides a secure connection while also enhancing and improving network performance. ISA Server meets these demands by offering a complete Internet connectivity solution that contains both an firewall and a complete Web cache solution. These services are complementary: you can use either or both of these functionalities when you install ISA Server in your network.
ISA Server secures your network, allowing you to implement your business security policy by configuring a broad set of rules that specify which sites, protocols, and content can pass through the ISA Server computer. ISA Server monitors requests and responses between the Internet and internal client computers, controlling who can access which computers on the corporate network. ISA Server also controls which computers on the Internet can be accessed by internal clients.
ISA Server offers many security options, including packet filtering and intrusion detection. You can create access policies based on user-level information or Internet Protocol (IP) addresses and control when the rule will be applied.
ISA Server features secure publishing. You can use ISA Server to define a publishing policy, protecting the internal publishing servers and making them safely accessible to Internet clients.
ISA Server implements a cache of frequently requested objects. You can configure the cache to ensure that it contains the data that is most frequently used by the organization or accessed by your Internet clients.
ISA Server is extensible. ISA Management has a corresponding COM interface which administrators can program, using high-level programming languages or scripting languages. The core firewall functionality can be extended by other developers, who implement application filters or Web filters. The cache functionality can be enhanced using the cache application programming interface (API). The ISA Management interface can be extended to provide integrated administration tools for the third-party extensions.
Microsoft has worked with customers to design a product that addresses the needs of today’s Internet-enabled businesses: security, performance, and manageability. The following sections survey some common user scenarios and show how you can use ISA Server features to implement the scenarios in your network.
ISA Server can be deployed as a dedicated firewall that acts as the secure gateway to the Internet for internal clients. By setting the access policies, administrators can prevent unauthorized access and malicious content from entering the network as well as restrict outbound traffic.
ISA Server presents you with a comprehensive solution for securing network access. ISA Server includes the following firewall and security features:
Internet access is an essential tool for today’s knowledge worker. With the heavy Internet traffic that goes across network gateways, Web access performance can become the bottleneck for productivity. The Web caching features of ISA Server provide faster Web access performance by caching Internet content closer to the user. In addition, by using the policy-based access controls, administrators can limit which Web sites are permitted for specific users, by time of day, content type, and more. With fast caching and access control, ISA Server can help lower the cost of managing Internet connectivity and improve the productivity of Internet users. ISA Server uses RAM caching and efficient file input/output to deliver fast cache performance.
ISA Server caching features include:
Whether your organization is an Internet e-commerce retailer or a large organization looking to expand your business reach, the Internet is a key part of your business strategy. Organizations cannot afford to have slow, unresponsive e-commerce Web sites, especially when the competition is one mouse-click away. The Web cache of ISA Server provides users with a fast Web experience that scales with your growing business. Caching is available also for Internet clients that request objects from computers on your local network.
ISA Server allows you to publish services to the Internet without compromising the security of your internal network. You can configure Web publishing and server publishing rules that determine which requests should be sent downstream to a server located behind the ISA Server computer, providing an increased layer of security for your internal servers.
You can use these ISA Server features to publish servers:
Managing security and caching separately usually requires a separate set of network technologies, infrastructure equipment, and skilled administrators, therefore increasing complexity, cost, and inconsistency. The unified policy-based administration tool in ISA Server helps administrators manage and secure their Internet connectivity from a central location, reducing network complexity and lowering total cost of ownership.
Organizations often benefit from consistent firewall and cache policies. The management integration in ISA Server provides a single view of these policies, rather than having to separately manage firewall and cache infrastructure.
This chapter concentrates on the information you need to plan and deploy Microsoft Internet Security and Acceleration (ISA) Server in your organization. Although this chapter provides much of the information you need to deploy ISA Server, it does not attempt to cover all networking issues.
The table below lists factors you should consider as you plan your ISA Server deployment.
| Issue | Description | See |
| How many computers do I need? | Hardware configuration and Internet connectivity depend on how you use ISA Server. | “Capacity planning guidelines” |
| Which ISA Server features will I need? | You can choose to install specific ISA Server features to meet your specific network needs. | “Selecting ISA Server features” |
| What are the user requirements? | Determine what applications and services your users require, so that you can decide how to configure clients. | “Assessing client requirements” |
| Should I reconfigure my existing network? | Consider how ISA Server will interact with the existing network. | Existing network considerations |
This chapter includes the following sections:
For improved performance, you should plan the ISA Server hardware and Internet connectivity to meet the expected load. The following sections describe recommended system configurations for various usage scenarios.
To use ISA Server, you need:
A maximum of four processors can be used on the computer running ISA Server. ISA Server will not install on a computer with more than four processors.
If you are using ISA Server in firewall or integrated mode, two network adapters are required.
Note
Always use the latest Service Pack.
For remote ISA Server administration, you need only install ISA Management, which can run on Windows 2000 Professional or above.
Instead, you can install Terminal Services in Remote Administration mode on the computer running ISA Server. In that case, you do not have to install the ISA Management tool on another computer at all for remote administration. Instead, you can use a Terminal Services session to administer ISA Server.
ISA Server can be deployed as a forward caching server, maintaining a centralized cache of frequently requested Internet objects that can be accessed by any Web browser client. In this case, consider how many Web browser clients will be accessing the Internet. The table below lists hardware configurations for expected number of internal clients accessing objects on the Internet.
| Number of Users | ISA Server Computer | RAM (in MB) | Disk Space Allocated for Caching |
| Up to 500 | Single ISA Server computer with Pentium II, 300 MHz processor | 256 | 2-4 Gigabytes (GB) |
| 500 1,000 | Single ISA Server computer with two Pentium III, 550 MHz processors | 256 | 10 GB |
| More than 1,000 | Two ISA Server computers, each with Pentium III, 550 MHz processors | 256 for each server | 10 GB for each server |
As your user base exceeds 1,000 users, you can consider either using hardware with faster processors and more memory or adding more ISA Server computers. For more information, see “Adding More Computers.”
When you set up more than one ISA Server computer, consider upgrading to ISA Server, Enterprise Edition, so that you can group the computers in arrays. For more information, see Chapter 5, “Upgrading to ISA Server, Enterprise Edition.”
ISA Server can provide caching for external users requesting data. For example, it can be deployed between the Internet and an organization's Web server that is hosting a commercial Web business or providing access to business partners. In this case, you need to consider how often external clients will request objects on the publishing servers.
The table below lists hardware configurations for expected number of requests from Internet (external) users, in a reverse caching scenario.
| Hits per Second | ISA Server computer |
| Less than 100 | Single ISA Server computer with Pentium II, 300 MHz processor |
| Up to 250 | Single ISA Server computer with Pentium III, 450 MHz processor |
| More than 250 | ISA Server computer with Pentium III, 550 MHz processor
Additional ISA Server computer for each 250 hits per second. You can also use Performance Monitor to determine bottlenecks and add more servers or stronger hardware, as necessary. |
For random access memory (RAM), memory requirements depend on the size of the cacheable content that you are publishing. Ideally, all cacheable content should be able to fit into memory. For example, if the Web site you are publishing is made up of 250 MB of content, then 256 MB of RAM is sufficient.
You can use the capacity planning requirements detailed above as a general guideline to determine how many ISA Server computers you require. In some cases, you face the decision whether to add an additional ISA Server computer or simply boost the performance of the existing computer by adding an additional processor. Each option has different advantages.
When you add a new computer, consider upgrading to ISA Server Enterprise Edition, so that you can create an array of ISA Server computers. Arrays help ensure a more fault-tolerant system. Should one computer crash, the other continues to function. Furthermore, because ISA Server’s centralized array management means that there are few additional ISA Server management issues when you add more servers to the array.
On the other hand, adding another computer means that you will have to purchase and manage additional hardware, as well as any other software (such as the operating system) installed on the computer.
ISA Server can be installed with both firewall and caching features. You can also install just firewall features or just cache features. As part of the installation process, you choose the mode of installation: firewall, cache, or integrated.
In firewall mode, you can secure network communication by configuring rules that control communication between your corporate network and the Internet. In firewall mode, you can also publish internal servers, thereby sharing data on your internal servers with Internet users.
In cache mode, you can improve network performance and save bandwidth by storing commonly accessed objects closer to the user. You can route requests from Internet users to the appropriate Web server.
In integrated mode, all cache and firewall features are available. You can configure a policy that takes both cache performance needs and security needs into consideration.
Depending on which mode you select, different features are available. The table below lists which features are available for the firewall and cache modes. In integrated mode, all the features are available.
Selecting ISA Server Features
| Feature | Firewall | Cache |
| Access policy | Yes | Yes (HTTP and HTTPS protocol only) |
| Application filters | Yes | No |
| Cache configuration | No | Yes |
| Firewall and SecureNAT client support | Yes | No |
| Packet filtering | Yes | No |
| Real-time monitoring | Yes | Yes |
| Reports | Yes | Yes |
| Server publishing | Yes | No |
| Virtual private networking | Yes | No |
| Web filters | Yes | Yes |
| Web publishing | Yes | Yes |
| Web Proxy client support | Yes | Yes |
ISA Server supports the following types of clients:
Before you deploy or configure client software, assess your organizational needs. Determine which applications and services your internal clients require. Assess how you will publish servers, then map these needs to the client types supported by ISA Server.
| If you want to… | Then use… |
| Improve the performance of Web requests for internal clients | Web Proxy clients. |
| Avoid deploying client software or configuring client computers | SecureNAT clients. SecureNAT clients do not require any software or specific configuration |
| Improve Web performance in an environment with non-Microsoft operating systems | SecureNAT clients. SecureNAT client requests are transparently passed to the ISA Server's Firewall service and then to the caching service for caching. |
| Publish servers that are located on your internal network | SecureNAT clients. Internal servers can be published as SecureNAT clients, which eliminates the need for creating special configuration settings on the publishing server. It is not recommended to set up publishing servers as Firewall clients. |
| Allow Internet access only for authenticated users | Firewall clients. You can configure user-based access policy rules for Firewall clients |
Previously, you may have used Routing and Remote Access in Windows 2000 Server to make network services and computers available to remote clients. ISA Server provides the remote connectivity, and extends Routing and Remote Access by offering more extensive and flexible security features. ISA Server packet filtering replaces the Routing and Remote Access packet filtering. ISA Server uses the dial-up connections that you configured for Routing and Remote Access.
Similarly, you may have previously used the Internet Connection Sharing (ICS) or network address translation (NAT) features of Windows 2000 to access the Internet. ISA Server can be used instead of NAT or ICS, replacing and enhancing its function in the organization. ISA Server provides the connectivity enabled by NAT or ICS and adds sophisticated security and caching features.
This chapter assists you as you install Microsoft Internet Security and Acceleration (ISA) Server.
This chapter includes the following sections:
Before you install ISA Server, you must set up the hardware and configure the software of the computer that will run ISA Server.
Use the information in the following sections to ensure that the ISA Server computer meets pre-installation requirements. For additional information on any task, see the documentation provided with your hardware component or Microsoft Windows 2000.
You can choose to connect your network to the Internet through either a direct connection (such as T1, T3, xDSL, or cable modem) or a dial-up connection. If you choose a direct connection, you must set up a network adapter that connects the computer running ISA Server to the Internet.
When you set TCP/IP properties for the external network adapter, check with your ISP for the correct settings. You must have the IP address, subnet mask, default gateway, and IP addresses for the DNS servers to be used in DNS name searches. In some cases, your ISP may be using DHCP or bootstrap protocol (BOOTP) for dynamic assignment of client addresses.
Typically, ISA Server will have only one IP default gateway. You should only configure the IP address of the default gateway on the external network adapter and not on the internal network adapter. Simply leave the internal card’s Default Gateway setting blank.
Refer to the Windows on-line help for instructions on setting up network adapters.
When setting TCP/IP properties for any internal network adapter, you should enter a permanently-reserved IP address for the ISA Server computer and an appropriate subnet mask for your local network. Addressing assigned by DHCP should not be used for the internal network adapter, since it might reset the default gateway you selected for the ISA Server computer. The external network adapter can use DHCP or its IP address is statically defined, including the default gateway and DNS settings.
After setup, you can use the Ping.exe utility that is provided with Windows 2000 Server or a similar utility on another internal IP client computer to verify network connectivity and to check if network adapters and other hardware are configured correctly.
If you choose to connect to the Internet through a dial-up connection instead of a direct link by using an external network adapter, you must use a modem or an ISDN adapter with your server.
Depending on the ISDN adapter, you may not be able to view the two ISDN channels in Windows 2000. Typically, the drivers for the ISDN card manage bandwidth-based connectivity for the second channel; you cannot use Windows 2000 to manage the driver. Be sure that the network adapter is set up so that both channels can be configured and that your ISP supports connecting by using both channels.
For more information on setting up an ISDN adapter or modem, see the Windows 2000 Help.
The local address table (LAT) is a table of all IP address ranges used by the internal network that is behind the ISA Server computer. ISA Server uses the LAT to control how machines on the internal network communicate with external networks and decides which network adapters should be protected by loading the packet filter driver.
ISA Server can construct the LAT, based on your Windows 2000 routing table. You can also select the private IP address ranges, as defined by the Internet Assigned Numbers Authority (IANA) in RFC 1918. These three blocks of addresses are reserved for private intranets only and are never used on the public Internet.
If the computer is connected to a routed internal network and you are unsure of your routing topology or how to add static routes, you can manually construct the table to contain the range or ranges of IP addresses used by your internal clients.
Since a default gateway cannot be set on the internal interface of the ISA Server computer, you will need to create static routes for your internal network to achieve full connectivity. This can be accomplished using the ROUTE command at a command prompt.
A LAT that is configured correctly ensures that ISA Server determines which network adapter to use in order to access different portions of your internal network. If you fail to set the routing table correctly, the LAT may not be built correctly. This can result in a client request for an internal IP address being incorrectly routed to the Internet or being redirected through the Firewall service.
If needed, after installation, the LAT should be edited manually to include all other network segments that are internal to your organization, including those that are located across internal routers so that the ISA Server computer and Firewall clients can correctly determine when to use ISA Server and when to access a resource directly.
When creating a LAT, you should only include addresses on the private network. This means that you should not add the external interface of the ISA Server computer, any Internet sites, or any other external addresses including the DNS server at your Internet service provider, and so forth. An incorrect configuration of the LAT could make your network vulnerable to attacks.
The LAT is maintained centrally at the ISA Server computer. Firewall clients automatically download and receive LAT updates at preset, regular intervals.
When you install ISA Server, you will be asked for the following information.
Important
Confirm that you have installed Windows 2000 Service Pack 1 or later before you install ISA Server.
To install server software
Note
After installation, ISA Server effectively blocks all communication between your corporate network and the Internet. Until you configure an access policy, with protocol rules and site and content rules specifically allowing access, no communication is allowed. Similarly, you must configure publishing rules if you want to allow Internet clients access to computers on your internal network.
After installation, ISA Server uses the default settings that are listed in the table below.
| Feature | Default Setting |
| User permissions | Members of the Administrators group on the local computer can configure policy. |
| Local address table | Contains entries specified during installation process. |
| Packet filtering | Enabled in firewall mode and in integrated mode
Disabled in cache mode. |
| Access control | A default site and content rule named "Allow Rule" allows all clients access to all content on all sites always. However, since no protocol rules are defined, no traffic is allowed to pass. |
| Publishing | No internal servers are accessible to external clients. A default Web publishing rule discards all requests. |
| Routing | All Web Proxy client requests are retrieved directly from the Internet. |
| Caching | The cache size is set to the size that was specified during setup. HTTP and FTP caching are enabled. Active caching is disabled. |
| Alerts | All alerts except the following are active: All port scan attack, Dropped packets, Protocol violation, and UDP bomb attack |
| Client configuration | When installed or configured, Firewall and Web Proxy clients have automatic discovery enabled. Web browser applications on Firewall clients are configured when the Firewall client is installed. |
After you install ISA Server, you can use ISA Server to implement your corporate security and Internet access guidelines. As a first step, you should create the policy elements that describe your network. Group computers into client address sets and users into Windows 2000 security groups. Create destination sets that include computers and domains on the Internet. Define protocols that can be used to communicate with the Internet. Then use the policy elements which implement the corporate guidelines when you create policy rules.
The Getting Started Wizard will walk you through the steps of defining and configuring the ISA Server policy. After you finish, ISA Server secures your network's connection to the Internet.
The Getting Started Wizard helps you perform the following tasks:
After you configure the ISA Server policy, read Chapter 5 to learn how to set up and configure the clients in your network. Then read Chapter 6 to learn about specific deployment scenarios.
Microsoft Internet Security and Acceleration (ISA) Server supports a full migration path for Microsoft Proxy Server 2.0 users. Most Proxy Server rules, network settings, monitoring configuration, and cache configuration will be migrated to ISA Server. Furthermore, ISA Server will continue to support Winsock proxy client software, together with its own Firewall client software, in a heterogeneous client base.
ISA Server introduces many new features and changes over Proxy Server 2.0. These changes affect the server configuration and upgrade scenarios. This chapter outlines the key items that an administrator should consider as part of the upgrade process to ISA Server.
This chapter includes the following sections:
ISA Server is the successor to Proxy Server 2.0, although it is much more than a “proxy.” When compared with Proxy Server 2.0, new or significantly improved features in ISA Server, include the following:
Before you can migrate an array of Proxy Server 2.0 computers, it is recommended that you remove all the members. Each member will retain an identical set of rules, which was replicated to all the servers in the array. Also, all the servers will retain identical network configuration (such as dial-on-demand settings) and monitoring configuration (such as alerts).
When you migrate Microsoft Proxy Server 2.0 to ISA Server, Standard Edition, ISA Server cannot be installed as an array member. If you want to install ISA Server as an array member, you must install ISA Server, Enterprise Edition.
There are a number of additional issues you should consider while preparing to migrate from Proxy Server 2.0 to ISA Server.
In addition, ISA Server can only be installed on computers running Windows 2000 Server or later. Therefore, if your current version of Microsoft Proxy Server 2.0 runs on Windows NT 4.0, follow these steps:
|
|
|
|
|
|
|
|
|
|
Since the core services required for firewall operation are inactive during setup, it is recommended that the computer being upgraded be disconnected from the Internet for the rest of the installation procedure.
Most Proxy Server rules, network settings, monitoring configuration, and cache configuration will be migrated to ISA Server.
Mixed chains of Proxy Server 2.0 and ISA Server computers are supported.
When a computer running Proxy Server 2.0 is downstream of the ISA Server computer, only Web proxy chaining is supported. Proxy Server 2.0 does not support upstream Winsock Proxy chaining.
When an ISA Server computer is the downstream server, both Web Proxy and Firewall chaining are supported. (In Proxy Server 2.0, “Firewall chaining” was called “Winsock Proxy chaining.”)
Proxy Server 2.0 listened for client HTTP requests on port 80, but when ISA Server is installed, it listens on port 8080 for the Web Proxy service. Therefore, all downstream chain members (or browsers) connecting to the ISA Server computer must connect to port 8080. You can also configure ISA Server to listen on port 80.
Proxy Server 2.0 required that you configure publishing servers as Winsock Proxy clients. ISA Server allows you to publish internal servers, without requiring any special configuration or software installation on the publishing server. Instead, the ISA Server computer treats the publishing servers as SecureNAT clients. Web publishing rules and server publishing rules that are configured on the ISA Server computer make the servers securely accessible to specific external clients. No additional configuration is required on the publishing server.
The Proxy Server 2.0 cache configuration is migrated to ISA Server, including cache drive specifications, size, and all other properties.
Proxy Server 2.0 cache content will not be migrated, because ISA Server’s cache storage engine is vastly different and more sophisticated. It will be deleted as part of ISA Server setup, and the new storage engine will be instituted, based on existing cache and drive settings.
Note
Depending on the cache size and the number of objects in the cache, the deletion process may take some time.
ISA Server includes a SOCKS application filter, which allows client SOCKS applications to communicate with the network, using the applicable policy to determine if the client request is allowed. Migration of Proxy Server 2.0 SOCKS rules to ISA Server policy is not supported.
ISA Server supports the following authentication methods: basic, digest, integrated Windows, and client certificate. By default, when you install ISA Server, the integrated Windows authentication method is configured for Web requests. In Proxy Server 2.0, basic and integrated authentication are enabled by default.
Internet Explorer 5 supports integrated Windows authentication, however, other Web browsers may support only the basic authentication method. In this case, no requests will be allowed, since the user cannot be authenticated. ISA Server rejects Web requests which were previously allowed by Proxy Server. You can configure basic authentication for all Web requests.
The table below lists how Proxy Server 2.0 rules and other configuration information are migrated on the ISA Server computer:
| Proxy Server 2.0 | ISA Server computer |
| Domain filters | Site and content rules |
| Winsock permission settings | Protocol rules |
| Publishing properties | Web publishing rules |
| Static packet filters | Open or blocked IP packet filters |
| Web Proxy routing rules | Routing rules |
Policy elements are created, as necessary, for the new rules. Additional configuration information is also migrated: local address table, automatic dial settings, alerts, log settings, and client configurations.
Web Proxy Service permissions are not migrated to the ISA Server configuration. Active caching configuration is always disabled after the migration.
As your organization grows, and the need to communicate with the Internet increases, you should consider upgrading Microsoft Internet Security and Acceleration (ISA) Server, Standard Edition to the Enterprise Edition. The Enterprise Edition includes the following features:
This chapter describes how to upgrade to ISA Server, Enterprise Edition. This chapter includes the following sections:
You can perform the following steps to upgrade from ISA Server, Standard Edition to ISA Server, Enterprise Edition:
When you upgrade a computer running ISA Server, Standard Edition to ISA Server, Enterprise Edition, it can be set up either as an array member or as a stand-alone server.
A stand-alone server has similar functionality to ISA Server, Standard Edition. In addition to the standard functionality, ISA Server, Enterprise Edition can be promoted to an array. For more information on promoting stand-alone servers, refer to the ISA Server, Enterprise Edition Help.
An array is a group of ISA Server computers used to provide fault tolerance, load balancing, and distributed caching. Arrays allow a group of ISA Server computers to be treated and managed as a single, logical entity.
All the servers in the array share a common configuration. This saves on management overhead, since the array is configured once and the configuration is applied to all the servers in the array. Furthermore, you can apply an enterprise policy to an array, allowing you to centralize management for all the arrays in your enterprise.
An array installation also means performance savings. Arrays allow client requests to be distributed among several ISA Server computers, which improves response time for clients. Because load is distributed across all the servers in the array, you can achieve good performance even with moderate hardware.
In order to install an ISA Server computer as an array member, the computer must be a member of a Windows 2000 domain. Furthermore, the ISA Server enterprise must be initialized before you can install an ISA Server computer as an array member. For more information, see the ISA Server, Enterprise Edition Help.
ISA Server, Enterprise Edition can be installed on a stand-alone server in a Windows NT 4.0 domain with no special configuration requirements.
All array members must be in the same domain and in the same site.
As part of the enterprise initialization, the enterprise administrator can select how the enterprise policy should be applied at the array level:
Important
If you modify the default enterprise policy settings, changing them from array policy to enterprise policy, or vice versa, then the new settings will apply only to arrays that do not use the default enterprise policy settings that was previously configured. Enterprise policy settings for arrays that use the previous default enterprise policy settings will be changed to custom settings and will be configured with the previous default settings.
Publishing rules cannot be created at the enterprise level. However, the enterprise administrator can specify whether an array is allowed to publish servers by creating Web publishing rules or server publishing rules.
Similarly, packet filtering cannot be enabled at the enterprise level. However, the enterprise administrator determines whether packet filtering is forced at the array level. Alternatively, the enterprise administrator can allow the array administrator to decide if packet filtering should be made available.
After you install Microsoft Internet Security and Acceleration (ISA) Server, you can configure the clients and install the Firewall client software, as appropriate.
Before you deploy or configure clients for ISA Server, you must consider the requirements of your organization. For more information, see "Assessing Client Requirements” in Chapter 2.
This chapter describes how to configure the ISA Server clients. This chapter includes the following sections:
ISA Server supports the following clients:
The table below lists the client types supported by ISA Server, and compares feature support for the clients.
| Feature | SecureNAT client | Firewall client | Web Proxy Client |
| Installation required | No, but network configuration changes are required. | Yes | No, requires Web browser configuration |
| Operating system support | Any operating system that supports Transmission Control Protocol/Internet Protocol (TCP/IP) | Only Windows platforms | All TCP/IP platforms |
| Protocol support | Protocols with primary connections and protocols defined by application filters | All Winsock applications | HTTP, HTTPS, and FTP |
| User-level authentication | No, only by IP address | Yes, also by IP address | Web browser passes authentication information |
| Server publishing | No configuration or installation required | Requires configuration file | N/A |
Both Firewall client computers and SecureNAT client computers might also be Web Proxy clients. If the Web application on the computer is configured explicitly to use ISA Server, then all Web requests (HTTP, FTP, and HTTPS) are sent directly to the Web Proxy service. All other requests are handled first by the Firewall service.
You do not need to install any software to configure Web Proxy clients. However, you must configure the Web browser on the client computer to use the ISA Server computer as the proxy server.
Important
Unless Web browser helper applications, such as streaming media clients, can function as Web Proxy clients themselves, these applications will not use ISA Server to connect to the Web. To allow these applications to connect to the Web, use the SecureNAT client or the Firewall client in addition to the Web Proxy client.
The exact configuration steps for configuring ISA Server depend on the Web browser you use.
To Configure Internet Explorer 5:
Although SecureNAT clients do not require specific software to be deployed on the client computers, you must configure the network appropriately. This section details network considerations for SecureNAT clients.
SecureNAT clients do not require specific software to be deployed on the client computers. However, you must configure your network topology for the ISA Server computer to protect the SecureNAT clients and ensure that their requests are serviced.
Specifically, the default gateway for the SecureNAT clients must be properly configured. When setting the default gateway property, identify which type of network topology you are configuring:
To configure SecureNAT clients on a simple network, you should set the SecureNAT client's Internet Protocol (IP) default gateway settings to the IP address of the ISA Server computer's internal network address card. You can set this manually, using the TCP/IP network control panel settings on the client. Alternatively, you can configure these settings automatically for the client using DHCP.
To configure SecureNAT clients on a complex network, you should set the default gateway settings to the router on the client’s local segment and make sure that the router routes traffic destined for the Internet correctly to the ISA server’s internal interface.
Optimally, the router should use the shortest path to the ISA Server computer. Also, the router should not be configured to discard packets destined for addresses outside the corporate network; ISA Server will determine how to route the packets.
SecureNAT clients will probably request objects both from computers in the local network and from the Internet. Thus, SecureNAT must be configured to use DNS servers that can resolve names both for external and internal hosts.
For Internet access only, the SecureNAT clients should be configured with TCP/IP settings that use the DNS servers on the Internet. You should create a protocol rule that allows the SecureNAT clients to connect to a DNS server on the Internet. This protocol rule should use the predefined DNS Query (client) protocol.
If the DNS server is located on the internal network, then you will need to create a policy that allows two-way traffic. That is, you will create a protocol rule that allows DNS queries from the DNS server to reach external DNS servers, including the Internet root servers.
Before you can install Firewall client software, the ISA Server software must be installed. When you set up ISA Server, you configure the ISA Server to which Firewall clients should connect when sending requests to the Internet.
After installing the client software, you can modify the server name to which the client connects by changing the name in the Firewall client software. For more information, see the Firewall Client on-line help.
ISA Server installs the following components on the client computer during client setup:
You can change the default settings for all of these components after installation.
To Install Firewall Client Software:
Note
Do not install Firewall client software on the ISA Server computer.
Microsoft Internet Security and Acceleration (ISA) Server can be deployed in various network topologies. This section describes some typical network configurations. While your actual network configuration may differ from those described here, the basic concepts and configuration logic provides insights that are applicable to your configuration.
This chapter includes the following sections:
ISA Server can be deployed in a small network, providing the internal clients with secured connectivity to the network. Because of its multipurpose functionality, ISA Server can also act as the caching server for the internal clients. The scenario described in this section shows a typical setup and configuration for a small business with clients requiring access to the Internet.
The corporation used in this scenario is a small office, with less than 500 users requiring Internet access. Most users require only Web access (HTTP or FTP), although one specific department also requires access to Windows Streaming Media servers. The corporation needs a reliable method to provide Internet access in an environment with the following requirements:
In this scenario, the corporation includes three departments: Sales; Research and Development; and Human Resources. Business requires that Sales and Research and Development departments need unlimited HTTP access, but only to a specific list of Web sites. Employees in all departments are allowed HTTP access after hours. In addition, all employees can access Windows Media applications after hours.
In this scenario, ISA Server is set up on the corporate network to serve as the connection between the local network and the Internet. The users are set up either as Web Proxy clients or SecureNAT clients. An access policy is configured on the ISA Server computer that stipulates which users are allowed to access the Internet.
ISA Server is installed in integrated mode as a stand-alone server. A network dial-up connection is set up to dial to the Internet service provider (ISP). The ISA Server computer has a network card that is connected to the internal network and a modem for dialing out to the Internet.
No other servicessuch as Web browsers, Outlook, or Terminal Serverrun on the ISA Server computer.
For the most part, the users require only Web access. For this reason, the administrator sets up most clients as Web Proxy clients. For Web Proxy clients, the Web browsers are configured so that the proxy server is the ISA Server computer. The proxy server port on the Web browser is set to 8080, assuming that the ISA Server computer's outgoing Web request settings are also set to listen on port 8080.
Some users can use Windows Streaming Media protocols; these users’ computers are also configured as SecureNAT clients. The default gateway for the SecureNAT clients is set to the ISA Server computer's IP address. That way, all requests to the Internet will be forwarded to the ISA Server computer, which will handle the request in accordance with the access policy.
After setting up the ISA Server computer, the administrator uses ISA Management to implement the access policy.
Before creating policy rules, the administrator creates the following policy elements:
Note
If Firewall Client software is installed on the client computers, then Windows 2000 user groups can be created, rather than client address sets.
The administrator follows these steps to implement an access policy:
The administrator creates a routing rule, which routes all client requests to the Internet. The routing rule is configured so that ISA Server will retrieve requests for objects for all destinations directly from the specified destination on the Internet, unless a valid version of the requested object is in the ISA Server cache. The routing rule is configured to use the Call_ISP dial-up entry, when a request is routed to the Internet.
When a client requests an object from a server on the Internet that is using a non-Web protocol, ISA Server dials out to the Internet, using the Call_ISP dial-up entry.
ISA Server creates this rule during installation, however, users will only be allowed access after a protocol rule is created.
For more information on routing, policy elements, protocol rules, and site and content rules, see ISA Server Help.
More and more employees work from home, dialing in from their home computer to the corporate network. It is becoming increasingly common for employees to establish a virtual private network (VPN) connection. In this scenario, the user dials in to the local ISP. On the other end, a server on the corporate network is connected to its ISP and a tunnel is established between the two.
ISA Server is installed in integrated mode as a stand-alone server. A network dial-up connection is configured on the ISA Server computer to dial to the Internet service provider (ISP). The ISA Server computer also has a network card connected to the internal network.
The ISA Server computer is configured as a VPN server, to allow communication from specific remote clients to network resources.
Clients that connect via VPN to the ISA Server computer must be able to access corporate network resources, such as DNS and WINS.
The remote client computers must have a dial-up connection configured to dial in to the local ISP.
After ISA Server is set up on the computer, the administrator uses ISA Management to configure the computer as an ISA Server VPN. The administrator does the following:
Note
If ISA Server is protecting access from the corporate network to the Internet, then the remote client will have to be configured to use the ISA Server.
ISA Server can be used together with other Windows 2000 Server and Advanced Server services to create a fault tolerant, balanced network. The following sections describe how to configure a DNS server and how to configure Network Load Balancing in Windows 2000 Advanced Server to accomplish this goal. The following sections describe these configurations.
Firewall clients can achieve fault tolerance when two or more ISA Server computers are used together with a Windows 2000 DNS server.
The administrator uses DNS to assign the same name to the ISA Server computers. This way, when a client requests an object from the ISA Server computer, specifying the DNS name of the ISA Server computer, the DNS server resolves the name to either one of the ISA Server computers in a round-robin fashion. For more information on DNS and round robin, see “Configuring round robin” in Windows 2000 Help.
Follow these steps to configure the DNS server, adding a new A resource record to a zone:
For SecureNAT clients, fault tolerance can be achieved when two or more ISA Server computers are used together with Network Load Balancing in Windows 2000 Advanced Server. By combining the resources of two or more computers running Windows 2000 Advanced Server into a single cluster, Network Load Balancing can deliver the reliability and performance that Web servers and other mission-critical servers need. Each Network Load Balancing computer runs ISA Server.
Network Load Balancing clusters together several computers running server programs that use the TCP/IP networking protocol. Network Load Balancing allows all of the computers in the cluster to be addressed by an IP address while maintaining their existing addressability using unique, dedicated IP addresses. Network Load Balancing distributes incoming client requests in the form of TCP/IP traffic across the hosts.
Note
Network Load Balancing is only available with Windows 2000 Advanced Server.
Network Load Balancing requires that each ISA Server computer have a unique IP address on its internal network card. In addition, the Network Load Balancing cluster must have an IP address, which will be used by both ISA Server computers. For more information on Network Load Balancing and clusters, see "Network Load Balancing” in Windows 2000 Advanced Server Help.
Follow these steps to configure the ISA Server computers for Network Load Balancing:
For a single network adapter, the TCP/IP stack must be configured with both dedicated and cluster addresses, with the dedicated address ordered first. For a computer with two network adapters, the network adapter with the dedicated address must have a lower metric value (that is, higher priority) than that of the network adapter with the cluster address.
The default gateway for SecureNAT clients should be configured to the cluster's dedicated IP address. In other words, the cluster's virtual address should be used as the gateway address. This way, all requests will be handled by Network Load Balancing.
The Web publishing functions of ISA Server benefit organizations that want to securely publish Web content. ISA Server can protect an organization's Web server that is hosting a commercial Web business or providing access to business partners. The ISA Server computer impersonates a Web server to the outside world, while the Web server maintains access to internal network services.
The Web server you are publishing can be located either on the same computer as ISA Server or on a different computer. The following sections illustrate network configurations for Web publishing scenarios.
Regardless of how you set up the Web publishing scenario, ISA Server must be configured to listen for incoming Web requests. The incoming Web request properties specify which IP addresses and ports on the ISA Server computer listen for incoming Web requests. The incoming Web request properties also determine the necessary authentication required when accessing internal servers.
When you publish Web servers, external clients may need to resolve their names with the internal DNS server. As such, the internal DNS server is itself a publishing server. If the DNS server is a SecureNAT client, then no configuration is required. After you install ISA Server, create a server publishing rule on the ISA Server computer that publishes the DNS server. For more information on server publishing rules, see the ISA Server Help.
In the Web publishing scenario described here, ISA Server secures content on internal Web servers that are located on computers within the local network.
The corporation described here publishes two Web sites: http://example.microsoft.com/Marketing and http://example.microsoft.com/Development. The content for the sites are on two separate internal Web servers: Mktg and Dev, respectively. When an Internet user requests an object on //example.microsoft.com/Marketing or //example.microsoft.com/Development, the request is actually sent to the ISA Server computer, which routes the request to the appropriate Web server.
The figure below illustrates the scenario.
Notice that the Internet protocol addresses of the Web servers are never exposed. Instead, the Internet users gain access to the Web servers by specifying the ISA Server computer IP address.
The administrator performs the following steps to publish the internal Web servers:
Some organizations may install the Web server and the ISA Server on the same computer.
The corporation used in this scenario publishes a Web site located at http://widgets.microsoft.com.
In this scenario, the administrator can configure ISA Server to publish the Web content in one of the following ways:
The following sections describe how to configure ISA Server, using these methods.
In this scenario, the administrator configures the ISA Server computer to listen for incoming requests on port 80 of the external interface card. By default, the Web server also listens on port 80 for incoming requests.
To avoid this conflict, the administrator must perform one of the following:
Another way to publish a Web server located on the ISA Server computer is by configuring IP packet filters. The IP packet filter passes all packets arriving on port 80 on to the Web server, which is located on the ISA Server computer. The packet filter allows the Web server to listen on port 80 for the incoming Web requests.
Note that, in this case, there is no conflict for outgoing Web requests, because ISA Server listens on port 8080 and the Web server listens for requests from internal clients on port 80. However, the automatic discovery feature of ISA Server should not be configured to listen on port 80 or should be disabled.
The administrator performs the following steps to publish a Web server located on the ISA Server computer:
Note
Since port 80 is used by Internet Information Services (IIS), do not create Web publishing rules when using the method described here to publish the Web server on the ISA Server computer.
Automatic discovery can be used on port 8080. It can also be used from another port if you configure a DHCP server.
As business-to-business e-commerce becomes more prevalent, more organizations realize the need to protect internal servers, while at the same time making them accessible to specific external users. The reverse publishing feature in ISA Server enables you to secure internal server access by external clients.
A common ISA Server scenario involves securing the Simple Mail Transfer Protocol (SMTP) communication of mail servers. For example, ISA Server can protect a Microsoft Exchange Server. The Mail Server Secure Publishing Wizard configures the policy that is needed to allow communication between an Exchange Server and the Internet. The wizard adds a set of server publishing rules which redirect communication from Internet users at a particular port to a specified internal IP address. The wizard also creates protocol rules that open ports dynamically for outgoing communication.
The Exchange Server that you are publishing can be located on the ISA Server computer or on the local network. The following sections describe some Exchange Server publishing scenarios.
Note
If you previously used Microsoft Proxy Server 2.0, you may have configured the Exchange Server as a Winsock Proxy client with a wspcfg.ini file to capture port 25 on the external interface of the Proxy Server computer. In this case, that configuration will work with ISA Server. However, if you use ISA Server’s server publishing rules, it is recommended that you remove the wspcfg.ini file from the Exchange Server and use the ISA Server Mail Security Wizard.
In this scenario, the Exchange Server is on the local network, protected by the ISA Server computer, as illustrated in the figure.
You can use the ISA Server Mail Server Security Wizard to configure the Exchange Server so that it is available to external clients, using one or more of the following protocols:
The wizard creates one or more server publishing rules corresponding to each mail service that ISA Server protects. The server publishing rules created by the wizard have the following parameters:
The new rules created by the wizard are all named with the prefix Mail wizard rule.
The Mail Server Security Wizard also creates protocol rules, to allow outgoing mail traffic. The protocol rules have the following parameters:
Since POP3, IMAP4 and HTTP clients can access the computer that is running Exchange Server either by DNS name or IP address, it is recommended that you map the DNS name used by mail clients to the ISA Server computer external IP addresses.
For MAPI clients, a DNS server on the Internet must resolve the name of the computer running Exchange Server and match it to an IP address on the ISA Server computer's external network adapter. Note that, in this case, the DNS server should map the internal name of the Exchange Server computer to the ISA Server's external IP address. Therefore, the server type should be set to Server and not to Mail server. If you are publishing the SMTP service, a Mail Exchange (MX) record is also necessary and that should also point to the external IP of the ISA Server computer.
In this scenario, ISA Server and Exchange Server are on the same computer, as illustrated below.
You can use the Mail Server Security Wizard to publish the Exchange Server located on the ISA Server computer. In this scenario, the Mail Server Security Wizard creates an IP packet filter for each mail service that you select. For example, if you run the Mail Server Security Wizard and specify Outgoing SMTP mail and POP3 client requests, the following IP packet filters will be created:
Note
In this scenario, Outlook clients cannot access the Exchange Server from outside the local network.
A perimeter network (also known as a DMZ, demilitarized zone, and screened subnet) is a small network that is set up separately from an organization's private network and the Internet. The perimeter network allows external users access to the specific servers located in the perimeter network, while preventing access to the internal corporate network. An organization may also allow very limited access from computers in the perimeter networks to computers in the internal network.
A perimeter network is commonly used for deploying the e-mail and Web servers for the company. The perimeter network can be set up in one of these configurations:
In a back-to-back perimeter network configuration, two ISA Server computers are located on either side of the perimeter network. (A perimeter network is also known as a DMZ, demilitarized zone, and screened subnet.) The figure illustrates a back-to-back perimeter network configuration.
In this configuration, two ISA Server computers are hooked up to each other, with one connected to the Internet and the other to the local network. The perimeter network resides between the two servers. Both ISA Servers are set up in integrated or firewall mode, which reduces the risk of compromise, since an attacker would need to break into both systems in order to get to the internal network.
The administrator performs the following steps to make the servers on the perimeter network available to external clients, such as those from the Internet:
In a three-homed perimeter network, a single ISA Server computer is set up with three network adapters.
The figure illustrates this perimeter network scenario.
The administrator performs these steps to set up a perimeter network with a three-homed ISA Server:
Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the example companies, organizations, products, people and events depicted herein are fictitious and no association with any real company, organization, product, person or event is intended or should be inferred. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation.
Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property.
© 1995-2000 Microsoft Corporation. All rights reserved.
Exchange, Microsoft, MS-DOS, Windows, and Windows NT are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.
The names of actual companies and products mentioned herein may be the trademarks of their respective owners.