From Dr. Tom Shinder's Configuring ISA Server 2004


In this chapter we focused on the ISA firewall s networking capabilities. As a prelude to the discussion, we went over our concept of how the ISA firewall fits within an existing corporate firewall infrastructure. We then discussed the details of the sample lab network we used when developing the scenarios discussed in this book. Included in that discussion were detailed instructions in how to configure VMware virtual machines to support the ISA firewalls and other machines in our sample network.

We then drilled down on the ISA firewall s view of the network. The new ISA firewall breaks away from the ISA Server 2000 approach of internal and external networks, where internal networks were trusted and external networks as untrusted. The new ISA firewall does not trust any network, and the default Internal network is quite different from the concept of internal network that previous versions of this product supported. We also went over all the ISA firewall Network Objects and the Network Templates that can be used to simplify configuration of the ISA firewall s network settings.

We finished up with a discussion of various topics related to the ISA firewall s networking feature sets, including Web Proxy chaining, Firewall chaining, and using the ISA firewall as a DHCP server.

Products & Services
Network Security Software
Network security software includes everything from remote access protection to firewall and security appliance solutions to email security to web filtering, monitoring, bandwidth protection, and all elements of computer network security/computer security.
Network Security Services
Network security services determine vulnerability of networks to outside intruders, as well as maintain anti-viral and firewall updates and usage.
Network Firewalls
Network firewalls protect computer networks against unauthorized use or attack. They permit or deny access to private network devices and applications, and represent an important part of an organization's overall security policy. Firewalls may be software applications, hardware devices (such as routers), or a combination of both. They include turnkey products that are relatively easy to install as well as complex, multi-layer installations that require the expertise of a certified network administrator. 
Network Appliances
Network appliances are inexpensive personal computers (PC) or computer boards that provide Internet access and promote network security. They lack many of the features of fully-equipped PCs, however.
Network Security Platforms
Network security platforms are designed to protect networks from incursion by external sources.

Topics of Interest

Solutions Fast Track Our Approach to the ISA Firewall Network Design and Defense Tactics Traditional Firewalls are simple stateful filtering devices, sometimes referred to as stateful packet...

How ISA Firewall s Define Networks and Network Relationships One of the primary limitations of the ISA Server 2000 firewall was its simplistic view of the network. The ISA Server 2000 firewall...

Our Approach to ISA Firewall Network Design and Defense Tactics Every book has its own unique approach to a subject, and that s certainly true for this book s approach to ISA firewalls. You ll notice...

Web Proxy Chaining as a Form of Network Routing Web Proxy Chaining is a method you can use to forward Web Proxy connections from one ISA firewall to another ISA firewall. Web Proxy chains consist of...

Installing and Configuring the DHCP Server and DHCP Relay Agent on the ISA Firewall Many smaller organizations may wish to install a DHCP server on the ISA firewall itself. This allows smaller...