ISA Server 2004 Configuration Guide: Published: June 2004 For The Latest Information, Please See
ISA Server 2004 Configuration Guide: Published: June 2004 For The Latest Information, Please See
ISA Server 2004 Configuration Guide: Published: June 2004 For The Latest Information, Please See
IP: 10 .0.1.1/24
10.0.1.0 /24 DNS: 192 .168 .1 .34
IP: 10.0.0.2/24
IP: 172.16.0.2/16
DG: 10.0.0.1
DG: 172 .16 .0.1
DNS: 10.0.0 .2
DNS: 172.16.0.2
WINS: 10 .0.0.2
ISALOCAL
IP: 10.0.0.1 /24 RADIUS
DHCP CLIENT
IIS 6.0 DNS `
Caching-only DNS WINS
TRIHOMEDLAN1 Domain Controller
Enterprise CA IP: 10.0.0.3/24
DG: 10 .0.0.1
Exchange 2003 Server
172.16.0.0/16 DNS: 10.0.0.2
EXCHANGE2003 BE 10.0.0 .0/24
WINS: 10.0.0 .2
Default 10.0.0.1
10.0.0.1 192.168.1.60 192.168.1.60 10.0.1.1
Gateway
DNS 10.0.0.2 10.0.0.2 10.0.0.2 NONE NONE
DC IIS: IIS:
DNS WWW WWW
Services WINS SMTP ISA Server 2004 ISA Server 2004 SMTP
DHCP NNTP NNTP
RADIUS FTP FTP
Default 10.0.0.1
10.0.0.1
Gateway
DNS 10.0.0.2 10.0.0.2
This is a preliminary document and may be changed substantially prior to final commercial release of the software described herein.
The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the
date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment
on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication.
This white paper is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS
DOCUMENT.
Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of
this document may be reproduced, stored in, or introduced into a retrieval system, or transmitted in any form or by any means
(electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of
Microsoft Corporation.
Microsoft may have patents, patent applications, trademarks, copyrights, or other int ellectual property rights covering subject
matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this
document does not give you any license to these patents, trademarks, copyrights, or other intellectual property.
© 2004 Microsoft Corporation. All rights reserved.
The example companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted
herein are fictitious. No association with any real company, organization, product, domain name, e-mail address, logo, person, place,
or event is intended or should be inferred.
Microsoft, Windows, Windows 2000, Windows 2000 Server, Windows Server 2003, Windows Server System, ISA Server, and ISA
Server 2004 are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.
The names of actual companies and products mentioned herein may be the trademarks of their respective owners.
This is a preliminary document and may be changed substantially prior to final commercial release of the software described herein.
The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the
date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment
on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication.
This white paper is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS
DOCUMENT.
Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of
this document may be reproduced, stored in, or introduced into a retrieval system, or transmitted in any form or by any means
(electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of
Microsoft Corporation.
Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject
matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this
document does not give you any license to these patents, trademarks, copyrights, or other intellectual property.
© 2004 Microsoft Corporation. All rights reserved.
The example companies, organizations, products, domain names, e-mail addresses, logos, people, places, and event s depicted
herein are fictitious. No association with any real company, organization, product, domain name, e-mail address, logo, person, place,
or event is intended or should be inferred.
Microsoft, Windows, Windows 2000, Windows 2000 Server, Windows Serv er 2003, Windows Server System, ISA Server, and ISA
Server 2004 are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.
The names of actual companies and products mentioned herein may be the trademarks of their respective owners.
3. On the Name and Address page of the New RADIUS Client wizard, enter a friendly name
for the ISA Server 2004 firewall computer in the Friendly name text box. This name is used
to identify the RADIUS client and not used for operational purposes. Enter the fully qualified
domain name of the ISA Server 2004 firewall computer in the Client address (IP or DNS)
text box.
7. The new RADIUS client entry appears in the right pane of the console.
This is a preliminary document and may be changed substantially prior to final commercial release of the software described herein.
The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the
date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment
on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication.
This white paper is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS
DOCUMENT.
Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of
this document may be reproduced, stored in, or introduced into a retrieval system, or transmitted in any form or by any means
(electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of
Microsoft Corporation.
Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject
matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this
document does not give you any license to these patents, trademarks, copyrights, or other intellectual property.
© 2004 Microsoft Corporation. All rights reserved.
The example companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted
herein are fictitious. No association with any real company, organization, product, domain name, e-mail address, logo, person, place,
or event is intended or should be inferred.
Microsoft, Windows, Windows 2000, Windows 2000 Server, Windows Server 2003, Windows Server System, ISA Server, and ISA
Server 2004 are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.
The names of actual companies and products mentioned herein may be the trademarks of their respective owners.
3. Click the Refresh button in the mmc button bar. Notice that the icon on the server name in
the left pane of the console changes from a red, down-pointing arrow to a green, up-pointing
arrow.
8. Do not enter any exclusions on the Add Exclusions page. Click Next.
9. Accept the default lease duration of 8 Days on the Lease Duration page. Click Next.
10. On the Configure DHCP Options page, select the Yes, I want to configure these
options now option and click Next.
11. On the Router (Default Gateway) page, enter the IP address of the internal interface of the
ISA Server 2004 firewall machine in the IP address text box and click Add. Click Next.
This is a preliminary document and may be changed substantially prior to final commercial release of the software described herein.
The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the
date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment
on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication.
This white paper is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS
DOCUMENT.
Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of
this document may be reproduced, stored in, or introduced into a retrieval system, or transmitted in any form or by any means
(electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of
Microsoft Corporation.
Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject
matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this
document does not give you any license to these patents, trademarks, copyrights, or other intellectual property.
© 2004 Microsoft Corporation. All rights reserved.
The example companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted
herein are fictitious. No association with any real company, organization, product, domain name, e-mail address, logo, person, place,
or event is intended or should be inferred.
Microsoft, Windows, Windows 2000, Windows 2000 Server, Windows Server 2003, Windows Server System, ISA Server, and ISA
Server 2004 are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.
The names of actual companies and products mentioned herein may be the trademarks of their respective owners.
7. The 252 wpad entry now appears in the right pane of the console under the list of Scope
Options.
3. In the Browse dialog box, double click on your server name in the Records list.
5. In the Browse dialog box, double click on the name of your forward lookup zone in the
Records frame.
Note that if you have multiple domains and clients on your Internal network that belong to
multiple domains, you will need to create wpad CNAME alias entries for each of the domains.
4. Click Apply and then click OK in the Internet Properties dialog box.
The next step is to configure the ISA Server 2000 firewall publish autodiscovery information for
autodiscovery Web Proxy and Firewall clients.
This is a preliminary document and may be changed substantially prior to final commercial release of the software described herein.
The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the
date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment
on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication.
This white paper is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS
DOCUMENT.
Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of
this document may be reproduced, stored in, or introduced into a retrieval system, or transmitted in any form or by any means
(electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of
Microsoft Corporation.
Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject
matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this
document does not give you any license to these patents, trademarks, copyrights, or other intellectual property.
© 2004 Microsoft Corporation. All rights reserved.
The example companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted
herein are fictitious. No association with any real company, organization, product, domain name, e-mail address, logo, person, place,
or event is intended or should be inferred.
Microsoft, Windows, Windows 2000, Windows 2000 Server, Windows Server 2003, Windows Server System, ISA Server, and ISA
Server 2004 are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.
The names of actual companies and products mentioned herein may be the trademarks of their respective owners.
5. Click the Advanced tab. Confirm that there is a checkmark in the Secure cache against
pollution check box. This prevents Internet DNS servers and attackers from inserting
additional records in a DNS response. These additional records could be used as part of a
co-coordinated DNS attack.
This is a preliminary document and may be changed substantially prior to final commercial release of the software described herein.
The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the
date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment
on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication.
This white paper is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS
DOCUMENT.
Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of
this document may be reproduced, stored in, or introduced into a retrieval system, or transmitted in any form or by any means
(electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of
Microsoft Corporation.
Microsoft may hav e patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject
matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this
document does not give you any license to these patents, trademarks, copyrights, or other intellectual property.
© 2004 Microsoft Corporation. All rights reserved.
The example companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted
herein are fictitious. No association with any real company, organization, product, domain name, e-mail address, logo, person, place,
or event is intended or should be inferred.
Microsoft, Windows, Windows 2000, Windows 2000 Server, Windows Server 2003, Windows Server System, ISA Server, and ISA
Server 2004 are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.
The names of actual companies and products mentioned herein may be the trademarks of their respective owners.
8. On the Internal Network page, click the Add button. The Internal network is different than
the LAT, which was used in ISA Server 2000. In the case of ISA Server 2004, the Internal
network contains trusted network services the ISA Server 2004 firewall must be able to
communicate. Examples of such services include Active Directory domain controllers, DNS,
DHCP, terminal services client management workstations, and others. The firewall System
Policy automatically uses the Internal network. We will look at the System Policy later in
this document.
10. In the Select Network Adapter dialog box, remove the checkmark from the Add the
following private ranges… checkbox. Leave the checkmark in the Add address ranges
based on the Windows Routing Table checkbox. Put a checkmark in the checkbox next
to the adapter connected to the Internal network. The reason why we remove the checkmark
from the add private address ranges checkbox is that you may wish to use these private
address ranges for perimeter networks. Click OK.
18. Click Yes in the Microsoft ISA Server dialog box informing you that the machine must be
restarted.
19. Log on as Administrator after the machine restarts
3. Click the Show/Hide Console Tree button and then click the Open/Close Task Pane arrow
(the little blue arrow on the left edge of the task pane on the right side of the console).
Notice that the ISA Server 2004 Access Policy represents an ordered list. Policies are
processed from top to bottom, which is a significant departure from how ISA Server 2000
processed Access Policy. The System Policy represents a default list of rules controlling
access to and from the ISA Server 2004 firewall by default. Note that the System Policy
Rules are ordered above any custom Access Policies you will create, and therefore are
You may want to widen the Name column to get a quick view rule the rule descriptions. Notice
that not all the rules are enabled. Disabled System Policy Rules have a tiny down-pointing red
arrow in their lower right corner. Many of the disabled System Policy Rules will become
automatically enabled when you make configuration changes to the ISA Server 2004 firewall,
such as when you enable VPN access.
Notice that one of the System Policy Rules allows the firewall to perform DNS queries to DNS
servers on all networks.
4. You can change the settings on a System Policy Rule by double clicking on the rule.
The following table includes a complete list of the default, built-in System Policy:
Table 1: System Policy Rules
3. In the Set Password dialog box, enter a password and confirm the password in the
Password and Confirm password text boxes. The information in the backup file is
encrypted because it can potentially contain passwords and other confidential information
that you do not want others to access. Click OK.
This is a preliminary document and may be changed substantially prior to final commercial release of the software described herein.
The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the
date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment
on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication.
This white paper is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS
DOCUMENT.
Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of
this document may be reproduced, stored in, or introduced into a retrieval system, or transmitted in any form or by any means
(electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of
Microsoft Corporation.
Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject
matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this
document does not give you any license to these patents, trademarks, copyrights, or other intellectual property.
© 2004 Microsoft Corporation. All rights reserved.
The example companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted
herein are fictitious. No association with any real company, organization, product, domain name, e-mail address, logo, person, place,
or event is intended or should be inferred.
Microsoft, Windows, Windows 2000, Windows 2000 Server, Windows Server 2003, Windows Server System, ISA Server, and ISA
Server 2004 are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.
The names of actual companies and products mentioned herein may be the trademarks of their respective owners.
7. In the Set Password dialog box, enter a password and confirm the password in the
Confirm password text box. The information in the backup file is encrypted because it can
potentially contain passwords and other confidential information that you do not want others
to access. Click OK.
3. Enter the password you assigned to the file in the Type Password to Open File dialog
box, then click OK.
6. Select the Save the changes and restart the service(s) option in the ISA Server
Warning dialog box (note that this is not the selected option in the figure, please select the
appropriate option).
7. Click OK in the Apply New Configuration dialog box informing you that the Changes to
the configuration were successfully applied.
4. Click OK in the Exporting dialog box when you see the message Successfully exported
the configuration.
3. Enter the password you assigned to the file in the Type Password to Open File dialog
box. Click OK.
6. Click OK in the Apply New Configuration dialog box when you see the message
Changes to the configuration were successfully applied. Note that changes in the VPN
configuration may take several minutes as they are updated in the background.
This is a preliminary document and may be changed substantially prior to final commercial release of the software described herein.
The information contained in this doc ument represents the current view of Microsoft Corporation on the issues discussed as of the
date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment
on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication.
This white paper is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS
DOCUMENT.
Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of
this document may be reproduced, stored in, or introduced into a retrieval system, or transmitted in any form or by any means
(electronic, mechanical, phot ocopying, recording, or otherwise), or for any purpose, without the express written permission of
Microsoft Corporation.
Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject
matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this
document does not give you any license to these patents, trademarks, copyrights, or other intellectual property.
© 2004 Microsoft Corporation. All rights reserved.
The example companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted
herein are fictitious. No association with any real company, organization, product, domain name, e-mail address, logo, person, place,
or event is intended or should be inferred.
Microsoft, Windows, Windows 2000, Windows 2000 Server, Windows Server 2003, Windows Server System, ISA Server, and ISA
Server 2004 are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.
The names of actual companies and products mentioned herein may be the trademarks of their respective owners.
Perform the following steps to configure the firewall using the Edge Firewall Network Template:
1. In the Microsoft Internet Security and Acceleration Server 2004 management console,
expand the server name and then expand the Configuration node. Click on the Networks
node.
2. Click on the Templates tab in the Task Pane. Click on the Edge Firewall network
template.
10. Click on the Firewall Policies node in the left pane of the console to view the policies
created by the Edge Firewall network template. These two Access Rules allow Internet
network and VPN clients full access to the Internet, and the VPN clients are allowed full
access to the Internal network.
Perform the following steps to use the 3-Leg Perimeter network template:
1. Open the Microsoft Internet Security and Acceleration Server 2004 management
console and expand the server name. Expand the Configuration node and click on the
Networks node.
2. Click the Networks tab in the Details pane and then click the Templates tab in the Task
pane. Click on the 3-Leg Perimeter network template.
9. On the Select a Firewall Policy page, you select a firewall policy that will create network
relationships between the Internet, perimeter and Internal networks and also creates Access
Rules. In this example, we want to allow the Internal network clients full access to the
Internet and the perimeter network, and allow the perimeter network hosts access to the
Internet. After you are more familiar with how to configure Access Policies on the ISA Server
2004 firewall, you will want to tighten the outbound access controls between the perimeter
network segment and the Internet, and between the Internal network segment and the
Internet. Select the Allow unrestricted access firewall policy and click Next.
13. Click on the Firewall Policy node in the left pane of the Microsoft Internet Security and
Acceleration Server 2004 management console to view the rules created by the 3-Leg
Perimeter network template. These two rules allow hosts on the Internal network and in the
VPN clients network full access to the Internet and to the perimeter network. In addition, the
VPN Clients network is allowed full access to the Internal network.
15. Click on the Network Rules tab. Right click on the Perimeter Configuration Network
Rule and click Properties.
17. Click on the Destination Networks tab. You see the Perimeter network in the This rule
applies to traffic sent to these destinations list.
This is a preliminary document and may be changed substantially prior to final commercial release of the software described herein.
The information contained in this document represents the current view of Microsoft Corporation on the issues discus sed as of the
date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment
on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication.
This white paper is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS
DOCUMENT.
Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of
this document may be reproduced, stored in, or introduced into a retrieval system, or transmitted in any form or by any means
(electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of
Microsoft Corporation.
Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject
matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this
document does not give you any license to these patents, trademarks, copyrights, or other intellectual property.
© 2004 Microsoft Corporation. All rights reserved.
The example companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted
herein are fictitious. No association with any real company, organization, product, domain name, e-mail address, logo, person, place,
or event is intended or should be inferred.
Microsoft, Windows, Windows 2000, Windows 2000 Server, Windows Server 2003, Windows Server System, ISA Server, and ISA
Server 2004 are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.
The names of ac tual companies and products mentioned herein may be the trademarks of their respective owners.
We will discuss the following procedures in this ISA Server 2004 Configuration Guide
document:
• Configuring the ISA Server 2004 SecureNAT client
• Configuring the ISA Server 2004 Web Proxy client
This is a preliminary document and may be changed substantially prior to final commercial release of the software described herein.
The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the
date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment
on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication.
This white paper is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS
DOCUMENT.
Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of
this document may be reproduced, stored in, or introduced into a retrieval system, or transmitted in any form or by any means
(electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of
Microsoft Corporation.
Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject
matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this
document does not give you any license to these patents, trademarks, copyrights, or other intellectual propert y .
© 2004 Microsoft Corporation. All rights reserved.
The example companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted
herein are fictitious. No association with any real company, organization, product, domain name, e-mail address, logo, person, place,
or event is intended or should be inferred.
Microsoft, Windows, Windows 2000, Windows 2000 Server, Windows Server 2003, Windows Server System, ISA Server, and ISA
Server 2004 are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.
The names of actual companies and products mentioned herein may be the trademarks of their respective owners.
Access Rules allow you to gain a fine level of control over which users have access to sites and
protocols. For example, consider the following Access Rule:
This rule limits allows users that belong to the Limited Web Access group to use the HTTP
and FTP (download) protocols. However, members of that group must be located on the internal
network when they issue the request. In addition, not only must the members of the Limited
Web Access be located on the internal network when they issue an HTTP or FTP (download)
request, they can only access the www.microsoft.com and ftp.microsoft.com sites when using
the protocols. This prevents users from putting the network at risk by downloading content from
other Web sites which may contain untrusted or dangerous content.
The first step to strong user/group-based outbound access control is configuring the client
systems behind the ISA Server 2004 firewall as Firewall and Web Proxy clients. Only Firewall
and Web Proxy clients can authenticate with the firewall. By contrast, SecureNAT clients are
not able to authenticate. Outbound access control is limited by the source IP address.
In Chapter 10 of the ISA Server 2004 Configuration Guide, you configured the CLIENT
machine on the internal network as a SecureNAT, Firewall and Web Proxy client. This
configuration enables the machine to send credentials to the ISA Server 2004 so that strong
user/group-based Access Rules can be created.
In this chapter, you will create several Access Rules that control outbound access through the
ISA Server 2004 firewall. Two rules are based on user/group membership, and one rule will
control outbound access based on the source IP address of a server on the internal network.
You will perform the following procedures to create the customized firewall policy:
• Create a user account
• Disable the Access Rules created by the Network Template
• Create an Access Rule limiting protocols and sites users can access
• Create an Access Rule that provides administrators greater access to protocols and
sites
• Create a DNS server Access Rule allowing the Internal network DNS server access to
Internet DNS servers
• Use HTTP Policy to prevent access to suspect Web sites
• Test the Access Rules
4. Enter a password and then confirm the password in the Confirm password text box.
Remove the checkmark from the User must change password at next logon, and click
Next.
3. Click Apply to save the changes and update the firewall policy.
The rule will look like this in the Firewall Policy Details pane:
Perform the following steps to create the limit user Access Rule:
1. At the ISA Server 2004 firewall computer, open the Microsoft Internet Security and
Acceleration Server 2004 management console and expand the server name in the left
pane of the console. Click on the Firewall Policy node. In the Task pane, click the Tasks
tab. Click Create New Access Rule.
10. In the New Domain Name Set Policy Element dialog box, click New. Enter the first
domain name *.microsoft.com and press ENTER. Enter the following three domains
*.msn.com, *.hotmail.com and *.windows.com. In the Name text box, enter Microsoft
and click OK.
16. In the Select Users or Groups dialog box, click the Locations button.
17. In the Locations dialog box, expand the Entire Directory entry and click on your domain
name. In this example, the domain name is msfirewall.org. Click OK.
The rule will look like this in the Firewall Policy Details pane:
14. In the Select Users or Groups dialog box, click the Locations button.
15. In the Locations dialog box, expand the Entire Directory entry and click on your domain
name. In this example, the domain name is msfirewall.org. Click OK.
16. In the Select Users or Groups dialog box, enter Domain Admins in the Enter the object
names to select text box and click Check Names. When the Active Directory finds the
user name, the name will be underlined. Click OK.
The rule will look like this in the Firewall Policy Details pane:
Perform the following steps to create an Access Rule that allows the internal network DNS
server access to DNS servers on the Internet:
1. In the Microsoft Internet Security and Acceleration Server 2004 management console,
right click on the Firewall Policy node in the left pane of the console. Point to New and
click Access Rule.
2. On the Welcome to the New Access Rule Wizard page, enter the name of the rule in the
Access rule name text box. In this example, we will call the rule DNS Servers. Click
Next.
3. On the Rule Action page, select Allow and click Next.
4. On the Protocols page, select Selected protocols from the This rule applies to list, and
click Add.
5. In the Add Protocols dialog box, click on the Infrastructure folder. Double click on the
DNS protocol. Click Close .
10. Click OK in the New Computer Set Rule Element dialog box.
11. In the Add Network Entities dialog box, click on the Computer Sets folder. Double click
on the DNS Servers entry. Click Close .
3. In the Configure HTTP policy for rule dialog box, click on the Signatures tab.
4. On the Signatures tab, click on the Add button.
5. In the Signature dialog box, enter a name for the signature in the Name text box. In this
example we will enter Kaaza URL. Select the Request URL entry in the Search in list.
Enter the string kaaza in the Signature text box. Click OK.
2. Log on to the CLIENT computer as User2. Open the browser and enter www.microsoft.com
in the Address bar. Press ENTER.
3. The home page of the Microsoft site appears in the browser. In the Internet Explorer
Address bar, enter www.isaserver.org and press ENTER.
4. You will see the MSN search page indicating that the www.isaserver.org page could not be
found. You can provide a more informative response to users by redirecting denied requests
to an Internet Web server.
5. In Internet Explorer, enter www.msn.com and press ENTER.
6. You see the home page of the www.msn.com Web site. Note that some graphics do not
appear on the page because they fall outside the range of sites allowed by the Domain Set
we created for the Access Rule.
7. In the Internet Explorer Address bar, enter the URL http://www.msn.com/kaaza. An error
page is returned indicating that the HTTP Security filter has blocked the connection. The
Signature configured in the HTTP policy for the Access Rule detected that Kaaza was in the
URL and blocked the connection attempt.
This is a preliminary document and may be changed substantially prior to final commercial release of the software described herein.
The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the
date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment
on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication.
This white paper is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS
DOCUMENT.
Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of
this document may be reproduced, stored in, or introduced into a retrieval system, or transmitted in any form or by any means
(electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of
Microsoft Corporation.
Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject
matter in this document. Except as expressly provided in any written license agreement f rom Microsoft, the furnishing of this
document does not give you any license to these patents, trademarks, copyrights, or other intellectual property.
© 2004 Microsoft Corporation. All rights reserved.
The example companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted
herein are fictitious. No association with any real company, organization, product, domain name, e-mail address, logo, person, place,
or event is intended or should be inferred.
Microsoft, Windows, Windows 2000, Windows 2000 Server, Windows Server 2003, Windows Server System, ISA Server, and ISA
Server 2004 are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.
The names of actual companies and products mentioned herein may be the trademarks of their respective owners.
5. Click on the Documents tab, and click Add. In the Add Content Page dialog box, enter
the name default.txt. Click OK.
5. Click on the Messages tab. In the Banner text box, enter This is the perimeter network
FTP site. In the Welcome text box, enter Welcome to the ISA firewall protected FTP
site. In the Exit text box, enter Goodbye! In the Maximum connections text box, enter
the phrase Site is busy come back later.
3. Click Apply to save the changes and update the firewall policy.
4. Click OK in the Apply New Configuration dialog box.
5. Click the first rule created by the Wizard. In this example, the first rule is the VPN Clients
to Internal Network rule. Hold down the CTRL key and click the second rule so that both
rules are selected. Right click one of the selected rules and click Enable.
15. On the User Sets page, accept the default entry, All Users, and click Next.
16. Click Finish on the Completing the New Web Publishing Rule Wizard page.
17. Click Apply to save the changes and update the firewall policy.
18. Click OK in the Apply New Configuration dialog box.
The next step is to create a HOSTS file entry so that the firewall will resolve the name
perimeter.msfirewall.org to the IP address used by the Web site on the perimeter network. In
this example, the Web site is listening on IP address 172.16.0.2.
1. Click Start and Run. In the Run dialog box, enter notepad in the Open text box and click
OK.
2. Click the File menu and Open. In the Open dialog box, enter
c:\windows\system32\drivers\etc\hosts in the File name text box and click Open.
5. On the Select Protocol page, select the FTP Server protocol from the Selected protocol
list. Click Next.
8. In the Configures FTP protocol policy dialog box, remove the checkmark from the Read
Only check box. Click Apply and OK.
This is a preliminary document and may be changed substantially prior to final commercial release of the software described herein.
The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the
date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment
on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication.
This white paper is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS
DOCUMENT.
Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of
this document may be reproduced, stored in, or introduced into a retrieval system, or transmitted in any form or by any means
(electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of
Microsoft Corporation.
Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject
matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this
document does not give you any license to these patents, trademarks, copyrights, or other intellectual property.
© 2004 Microsoft Corporation. All rights reserved.
The example companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted
herein are fictitious. No association with any real company, organization, product, domain name, e-mail address, logo, person, place,
or event is intended or should be inferred.
Microsoft, Windows, Windows 2000, Windows 2000 Server, Windows Server 2003, Windows Server System, ISA Server, and ISA
Server 2004 are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.
The names of actual companies and products mentioned herein may be the trademarks of their respective owners.
7. The IP address 10.0.0.10 now appears second in the list of IP addresses. Click OK.
8. Click OK in the Internet Protocol (TCP/IP) Properties dialog box.
9. Click OK in the LAN Properties dialog box.
14. Right click the Default SMTP Virtual Server node and click Stop. Right click the Default
SMTP Virtual Server node and click Start.
6. On the Custom Setup page, click the Message Screener option and This feature, and
all subfeatures, will be installed on local hard drive. Click Next.
9. Click Finish on the Completing the New Server Publishing Rule Wizard page.
Now we are ready to configure the SMTP Message Screener. Each Publishing Rule can be
configured with a different SMTP Message Screener configuration.
Perform the following steps on the Outbound SMTP Relay Server Publishing Rule:
1. Right click the Outbound SMTP Relay rule and click Configure SMTP.
4. Click Apply and then click OK in the Configure SMTP Protocol Policy dialog box.
4. Click Apply and then click OK in the Configure SMTP Protocol Policy dialog box.
5. Click Apply to save the changes and update the firewall policy.
6. Click OK in the Apply New Configuration dialog box.
5. In the Add Protocols dialog box, click on the Common Protocols folder and double click
on the SMTP protocol. Click Close .
6. Click Next on the Protocols page.
7. On the Access Rule Sources page, click the Add button. In the Add Network Entities
dialog box, click the Networks folder and double click on Local Host. Click Close .
8. Click Next on the Access Rule Sources page.
9. On the Access Rule Destinations page, click Add. In the Add Network Entities dialog
box, click the Networks folder and double click on the External network. Click Close .
4. In the Options dialog box, confirm that ISA Logs folder is selected. Make a note of the
Log file storage limits that are configured by default, and how it Maintains log storage
limit by. Change the value in the Delete files older than (days) from 7 to 30. Confirm that
there is a checkmark in the Compress log files check box.
This is a preliminary document and may be changed substantially prior to final commercial release of the software described herein.
The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the
date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment
on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication.
This white paper is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS
DOCUMENT.
Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of
this document may be reproduced, stored in, or introduced into a retrieval system, or transmitted in any form or by any means
(electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of
Microsoft Corporation.
Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject
matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this
document does not give you any license to these patents, trademarks, copyrights, or other intellectual property.
© 2004 Microsoft Corporation. All rights reserved.
The example companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted
herein are fictitious. No association with any real company, organization, product, domain name, e-mail address, logo, person, place,
or event is intended or should be inferred.
Microsoft, Windows, Windows 2000, Windows 2000 Server, Windows Server 2003, Windows Server System, ISA Server, and ISA
Server 2004 are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.
The names of actual companies and products mentioned herein may be the trademarks of their respective owners.
5. On the Select Services page, put a checkmark in the Outlook Web Access check box.
Confirm that there is a checkmark in the Enable high bit characters used by non-
English character sets. Click Next.
Next, we will test the POP3 and SMTP functionality using Outlook Express:
1. On the external client machine, open Outlook Express. Click Tools and Accounts.
2. In the Internet Accounts dialog box, click the existing account and Remove. Click Yes in
the Internet Accounts dialog box asking if you are sure you want to delete the account.
3. Click Add and then click Mail.
4. On the Your Name page, enter the name Administrator in the Display name text box.
Click Next.
5. On the Internet E-mail Address page, enter the address administrator@msfirewall.org
in the E-mail address text box. Click Next.
6. On the E-mail Server Names page, select the POP3 entry in the My incoming mail
server is a x server list. Enter 192.168.1.70 in the Incoming mail (POP3, IMAP or
HTTP) server text box. Enter 192.168.1.70 in the Outgoing mail (SMTP) server text box.
Click Next.
This is a preliminary document and may be changed substantially prior to final commercial release of the software described herein.
The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the
date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment
on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication.
This white paper is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS
DOCUMENT.
Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of
this document may be reproduced, stored in, or introduced into a retrieval system, or transmitted in any form or by any means
(electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of
Microsoft Corporation.
Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject
matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this
document does not give you any license to these patents, trademarks, copyrights, or other intellectual property.
© 2004 Microsoft Corporation. All rights reserved.
The example companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted
herein are fictitious. No association with any real company, organization, product, domain name, e-mail address, logo, person, place,
or event is intended or should be inferred.
Microsoft, Windows, Windows 2000, Windows 2000 Server, Windows Server 2003, Windows Server System, ISA Server, and ISA
Server 2004 are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.
The names of actual companies and products mentioned herein may be the trademarks of their respective owners.
3. Click Apply to save the changes and update the firewall policy.
4. Click OK in the Apply New Configuration dialog box.
5. Click Configure VPN Client Access.
6. On the General tab, change the value for the Maximum number of VPN clients allowed
from 5 to 10.
10. The VPN client establishes a connection with the ISA Server 2004 VPN server. Click OK in
the Connection Complete dialog box informing that the connection is established.
11. Double click the Connection icon in the system tray and click the Details tab. You can
see that MPPE 128 encryption is used to protect the data and IP address assigned to the
VPN client.
This is a preliminary document and may be changed substantially prior to final commercial release of the software described herein.
The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the
date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment
on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication.
This white paper is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS
DOCUMENT.
Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of
this document may be reproduced, stored in, or introduced into a retrieval system, or transmitted in any form or by any means
(electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of
Microsoft Corporation.
Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject
matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this
docum ent does not give you any license to these patents, trademarks, copyrights, or other intellectual property.
© 2004 Microsoft Corporation. All rights reserved.
The example companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted
herein are fictitious. No association with any real company, organization, product, domain name, e-mail address, logo, person, place,
or event is intended or should be inferred.
Microsoft, Windows, Windows 2000, Windows 2000 Server, Windows Server 2003, Windows Server System, ISA Server, and ISA
Server 2004 are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.
The names of actual companies and products mentioned herein may be the trademarks of their respective owners.
3. On the Welcome to the New Network Wizard page, enter a name for the remote network
in the Network name text box. In this example, name the remote network Branch. Click
Next.
4. On the VPN Protocol page, select Layer Two Tunneling Protocol (L2TP) over IPSec,
and click Next.
3. Click OK in the ISA Server 2004 dialog box informing you that the Routing and Remote
Access service must be restarted.
4. Click Apply to save the changes and update the firewall policy.
5. Click OK in the Apply New Configuration dialog box.
The last step we need to take in the Microsoft Internet Security and Acceleration Server
2004 management console is to enable access for VPN clients:
1. Click on the Virtual Private Network node in the left Pane of the console.
2. Click the VPN Clients tab in the Details Pane. Click the Tasks tab in the Task Pane. Click
p Enable VPN Client Access p.
3. Click OK in the ISA Server 2004 dialog box informing you that the Routing and Remote
Access service must be restarted.
4. Click Apply to save the changes and update the firewall policy.
5. Click OK in the Apply New Configuration dialog box.
This is a preliminary document and may be changed substantially prior to final commercial release of the software des cribed herein.
The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the
date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment
on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication.
This white paper is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS
DOCUMENT.
Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of
this document may be reproduced, stored in, or introduced into a retrieval system, or transmitted in any form or by any means
(electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of
Microsoft Corporation.
Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject
matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this
document does not give you any license to these patents, trademarks, copyrights, or other intellectual property.
© 2004 Microsoft Corporation. All rights reserved.
The example companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted
herein are fictitious. No association with any real company, organization, product, domain name, e-mail address, logo, person, place,
or event is intended or should be inferred.
Microsoft, Windows, Windows 2000, Windows 2000 Server, Windows Server 2003, Windows Server System, ISA Server, and ISA
Server 2004 are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.
The names of actual companies and products mentioned herein may be the trademarks of their respective owners.