Siêu thị PDFTải ngay đi em, trời tối mất

Thư viện tri thức trực tuyến

Kho tài liệu với 50,000+ tài liệu học thuật

© 2023 Siêu thị PDF - Kho tài liệu học thuật hàng đầu Việt Nam

Working with Microsoft ISA server 2004
PREMIUM
Số trang
307
Kích thước
3.9 MB
Định dạng
PDF
Lượt xem
1249

Working with Microsoft ISA server 2004

Nội dung xem thử

Mô tả chi tiết

Working with Microsoft ISA Server 2004

SkillSoft Corporation. (c) 2006.

Introduction

About the Book

ISA Server 2004 provides secure, fast, and controllable Internet connectivity. ISA Server 2004

provides various ISA Server services, such as Job Scheduler and Firewall, to implement security on

the network. ISA Server provides a service called the Web cache solution. The Web cache stores

the Web content, which a client requests from the Web server, locally on the ISA Server computer

and sends the information to the client. ISA Server provides another complementary service called

the organizational firewall solution that prevents unauthorized Internet users from accessing your

organizational network.

About the Author

Chitrank Gautam

Chitrank Gautam holds a Bachelor's degree in Computer Science Engineering. He is proficient in

languages such as C, C++, C#, Visual Basic .NET, and Java. He has a sound knowledge of

databases, such as SQL Server and Oracle. He has also worked on Internet technologies, such as

HTML and ASP .NET. He has authored books and refrencepoints on .NET technologies.

Credits

I would like to thank Sushmita Chakraborty and Shruti Gupta for helping me complete the book on

time and providing continuous support and encouragement.

Copyright

Working with Microsoft ISA Server 2004

Copyright © 2006 by SkillSoft Corporation

All rights reserved. No part of this work may be reproduced or transmitted in any form or by any

means, electronic or mechanical, including photocopying, recording, or by any information storage

or retrieval system, without the prior written permission of SkillSoft.

Trademarked names may appear in this publication. Rather than use a trademark symbol with every

occurrence of a trademarked name, we use the names only in an editorial fashion and to the benefit

of the trademark owner, with no intention of infringement of the trademark.

Published by SkillSoft Corporation

20 Industrial Park Drive

Nashua, NH 03062

(603) 324−3000

[email protected]

The information in this book is distributed on an "as is" basis, without warranty. Although every

precaution has been taken in the preparation of this work, neither the author nor SkillSoft shall have

any liability to any person or entity with respect to any loss or damage caused or alleged to be

caused directly or indirectly by the information contained in this work.

Chapter 1: Overview of Internet Security and

Acceleration Server 2004

Microsoft Internet Security and Acceleration (ISA) Server 2004 helps secure an Internet connection

and also improves the performance of Internet access. ISA Server provides various ISA Server

services, such as Job Scheduler and Firewall, to implement security on the network. It also provides

features, such as monitoring and Virtual Private Networks (VPN), to manage the Internet

connection. ISA Server also allows you to define rules to secure the network and protect it from

unauthorized access.

This chapter provides an overview of ISA Server 2004, and explains its various features. It also

explains the differences between the Standard and Enterprise versions of the software.

Introducing ISA Server 2004

ISA Server 2004 provides the firewall solution to secure the network of your organization. An

organizational firewall solution is useful for preventing the unauthorized Internet users from

accessing the organizational network. ISA Server also provides a Web cache solution to provide

fast access to the Internet. A Web cache fills requests from the Web server, stores the requested

information locally, and sends the information to the client. When the Web cache receives a request

for the same information again, it does not search the requested information on the Internet.

Instead, the Web cache returns the requested information from the cached data. This reduces

network traffic and the response time for Web access. In addition, ISA Server 2004 helps implement

business policies to secure the network. These business policies can be implemented by

configuring the rules that specify the Web sites, protocols, and information that can be passed

through an ISA Server 2004 computer.

ISA Server 2004 Architecture

ISA Server 2004 contains various communication layers to secure the organizational network. The

communication layers inspect the incoming and outgoing requests through ISA Server to ensure

secure communication among the networks. The communication layers are:

Packet filtering: Inspects the incoming and outgoing packets on a network to secure the

network. The data is first passed to the packet filtering layer, which determines the packets

that can pass through ISA Server.

Firewall service: Protects the network from unauthorized users. The data is passed to the

Firewall service layer after the packet filtering layer.

Web proxy: Processes ISA Server 2004 rules and determines whether or not a HTTP

request should be processed.

Figure 1−1 shows the architecture of ISA Server 2004:

Figure 1−1: The ISA Server 2004 Architecture

The components of the ISA Server 2004 architecture are:

Network Address Translation (NAT) driver: Performs the network address translation

process, which helps send and receive information by translating IP addresses of the client

computers.

Application filters: Allow you to use third−party filters, such as Surfcontrol Web Filter and GFI

Web Monitor, to extend the Firewall service. The Simple Mail Transfer Protocol (SMTP) and

FTP filters are some examples of application filters.

Clients: Represent the end−user computers that access ISA Server 2004. ISA Server

supports three types of clients:

Firewall clients: Are client computers with the Firewall Client software installed. The

Firewall clients use the Firewall service to access ISA Server.

SecureNAT clients: Are client computers that do not have Firewall Client software

installed. SecureNAT clients use the Firewall service to access ISA Server.

Web Proxy clients: Are computers on which Web applications are configured to use

ISA Server as a proxy server.

ISA Server 2004 Features

ISA Server 2004 provides various features that help manage and secure Internet connections. The

key features of ISA Server 2004 are:

• Web Cache

• Multi−networking

• Security and firewall policy

• Virtual Private Networks

• Monitoring

• Add−Ins

• Enterprise Management

• Extensible Platform

Web Cache

ISA Server 2004 uses the Web cache to improve network performance. The various caching

features are:

The various caching features of ISA Server 2004 are:

Distributed caching: Enables you to configure ISA Server 2004 on multiple computers and to

use ISA Server 2004 computers as a logical cache. ISA Server 2004 uses Cache Array

Routing Protocol (CARP) to implement this feature.

Hierarchical caching: Enables you to set up a hierarchy of computer arrays hosting ISA

Server. This enables a network client to access the data cached at the nearest cache.

Scheduled caching: Enables the configuring and scheduling of ISA Server 2004 to provide

frequently requested Web content to the cache. You can use the Microsoft ISA Server 2004

Job Scheduler service to implement the scheduled caching feature.

Reverse caching: Enables external clients to access internal or published servers. You can

deploy ISA Server as a reverse caching server to cache all the data that the external clients

frequently request from your network's published Web servers. ISA Server fulfills all external

client requests using the cached data. If the requested content is not found in the Web

cache, ISA Server forwards the request to the Web server.

Forward caching: Enables internal clients to communicate with the Internet. You can deploy

ISA Server as a forward caching server to cache all frequently requested Web content. This

reduces the processing time to fulfill requests.

High performance Web caching: Uses the RAM cache and the Web cache to cache

frequently requested Web content. This improves Web performance when internal clients

access the Internet Web servers and Internet users access the internal Web server.

Multi−Networking

Multi−networking is the process of grouping the network of an organization into network sets. A

network set is a group of networks on which you can apply a rule to secure the networks in the

network set. Multi−networking restricts communication between the clients in an organization, which

helps ISA Server protect an organization's network against internal and external security threats.

For each network set on an internal network, ISA Server allows you to configure an access policy

and define its relationship with the other network sets. The relationship between two network sets

defines how computers on these two networks communicate with each other. As a result, the

multi−networking feature of ISA Server allows you to identify, configure, and define the connections

and relationships among computers on internal and external networks.

Multi−Networking Environment

The multi−networking environment of an organizational network consists of network sets that a

firewall or a router connects. Inbound and outbound communication with a network is allowed or

denied based on the access control configuration on the firewall or router. Figure 1−2 shows the

multi−networking environment:

Figure 1−2: Multi−Networking Environment

The perimeter network in the multi−networking environment is connected to the organizational

network and the Internet. Connectivity between the perimeter network and the other two networks

allows the clients on the organizational network and the Internet to access the resources on the

perimeter network.

Note A perimeter network is set up in isolation from both an organizational network and the

Internet. The perimeter networks protect an organizational network from access by external

users. The external users can access specific servers located on the perimeter network. A

perimeter network is also called a screened subnet or the demilitarized network.

Connectivity between the various network sets in the multi−networking environment are:

Clients on the organizational network can access the Internet but computers on the Internet

cannot access the clients on the organizational network.

• Clients on the organizational network can access the resources on the perimeter network.

• Clients on the Internet can access some resources on the perimeter network.

Network Access Policy

The network access policy defines the relationships among networks to specify whether the

networks can connect to each other. This policy also defines how the networks can connect to each

other. You can define network rules to set the level of access among the networks. Figure 1−3

shows the concept of the network access policy:

Figure 1−3: Network Access Policy

The relationships that network rules define among networks are:

Routing relationship: Defines a bi−directional relationship that allows traffic between

networks. In Figure 1−3, this relationship exists between the branch office and headquarters,

which is represented by Label 1.

NAT relationship: Defines unidirectional NAT relationships. In the figure, three NAT

relationships exist, which are:

Organizational network to perimeter network: Defines the unidirectional relationship

from the organizational network to the perimeter network.

Organizational network to Internet: Defines the unidirectional relationship from the

organizational network to the Internet.

Perimeter network to Internet: Defines the unidirectional relationship from the

perimeter network to the organizational network.

Note You should define a routing relationship when you want to publish IP addresses for Web

publishing or publish a mail server and a NAT relationship when you do not want to expose

IP addresses.

Multi−Networking Features

The multi−networking features of ISA Server 2004 are:

Multiple network configuration: Allows you to separately configure each network with a

distinct relationship with other networks in a multi−networking environment.

Unique per−network policies: Ensures that any internal or external attacks, such as virus

attacks, do not affect a network. To ensure this, ISA Server limits communication among

clients. ISA Server's support for perimeter networks in multi−networking scenarios allows

you to configure the way various networks can access the perimeter network.

The routed and NAT network relationship: Allows you to define network relationships

according to your routing, transparency, and security requirements. The routed relationship

routes the traffic to ISA Server which is used when you require transparent and less−secure

communication between networks. The NAT relationship is used when you require secure

and less−transparent communication between networks.

Security and Firewall Policy

You can deploy ISA Server as a firewall to prevent unauthorized Internet users from accessing a

network. ISA Server monitors communication, including requests and responses, between the

Internet and the clients on a network. ISA Server 2004 uses monitoring to issue alerts on authorized

access to the network. This allows only authorized users to access the computers on a network. In

addition, monitoring communication allows you to limit Internet access to authorized clients on a

network.

ISA Server 2004 allows you to control both inbound and outbound access based on the firewall

policy. This policy allows you to define access controls based on user, group, application, source,

destination, content, protocol, port, and schedule. For example, you can define a firewall policy to

allow or deny access to a resource to clients. In addition, the firewall policy specifies the sites and

the content accessible for both inbound and outbound communication.

The various security and firewall policy features of ISA Server 2004 are:

Allows you to define access rules, which specify accessible sites and content from the

Internet and protocols to access these sites and content.

• Issues an alert on interference detection, such as an attack on a network.

Supports complex protocols, such as the ones that streaming media, voice applications, and

video applications, require. These applications require multiple primary connections.

Allows you to define a customized protocol definition. You can define firewall policy rules for

a protocol to manage the source and destination port numbers of that protocol. The protocol

definition also allows you to manage the packets flowing through firewall.

Allows you to define network objects, such as computers, network sets, and address ranges.

You can apply one firewall policy rule to all the computers on a network object.

Allows you to define firewall policy rules that are stored in an ordered list. ISA Server

compares the connection parameters of the connection with the connection parameters of

the rules in the order of their appearance on the ordered list. When ISA Server finds a rule

with an identical set of connection parameters, it enforces the policy of that rule. This

enables ISA Server to determine whether a connection is allowed or denied.

Supports FTP, which allows you to access the Internet FTP servers that are listening to

alternate port numbers. You do not need any special configuration on the client or the ISA

Server computer if the FTP port is allowed in the firewall policy of the client.

Provides port redirection for server publishing rules. A client request received at a port

number can be redirected to another port number on the published server.

Provides secure Web publishing. You can use Web Publishing Wizard for creating rules that

allow the remote users to access the published servers from a remote location using Secure

Socket Layer (SSL) connections. ISA Server allows you to place the servers behind the

firewalls on both the corporate network and a perimeter network to secure the services.

Placing servers behind firewalls allows you to securely publish the services of published

servers.

Provides user authentication and authenticates an end user who sends a Web request. The

various user authentication methods that ISA Server 2004 provides are:

Integrated authentication: Generates unique numbers, called a message digest or a

hash value, using a formula for the user name and the password before sending the

hashed value across the network. ISA Server 2004 uses the Kerberos V5

authentication protocol, the Windows NT LAN Manager (NTLM) authentication

protocol, or a challenge\response authentication protocol to authenticate users using

this method.

Authentication using SSL client certificates: Encrypts and decrypts data to enable

privacy of all communication over the network.

Digest authentication: Generates hash values for the user names, passwords, and

other data of HTTP clients.

Advanced digest authentication: Generates hash values for user accounts in Active

Directory in a Windows Server 2003 domain. Active Directory is a directory service

that stores information, such as number of computers, devices, and users on the

network, to securely manage the network.

Basic authentication: Encodes user names and passwords using the base−64

encoding method. You can decode the data related to authentication information

using any decoding utility. This is the default authentication method.

ISA Server 2004 provides multilayered firewall security by filtering traffic at the packet, circuit, and

application levels. The three types of filtering for securing the network are:

Stateful packet filtering: Determines whether a packet can pass through network and

application−layer proxy services. Stateful packet filtering opens and closes ports

automatically for communication.

Circuit filtering: Allows you to access Internet protocols and services from multiple platforms

using application−transparent circuit gateways. Gateways are devices that connect networks

and use protocols for communication among these networks.

Application filtering and stateful inspection: Verifies whether or not the data in a packet is

valid. Application filtering evaluates the packets at the application layer and allows the

connection only if the data in the packet is valid.

Virtual Private Networks

VPN is a private network that a company uses for internal communication or by companies who use

to communicate over a public network. VPN messages use standard protocols for communication

over a private networking infrastructure. VPN connects branch offices or remote users to

organizational networks, enabling them to send data.

Two types of VPN connections are:

Remote access VPN connection: Allows remote clients to establish a remote access VPN

connection with a private network. Using this connection, a remote access client can access

a network attached to the VPN server.

Site−to−site VPN connection: Uses a site−to−site VPN connection that enables

communication among the offices of an organization.

VPN enables you apply a firewall policy to VPN connections to secure your network. The VPN

features of ISA Server 2004 include:

Tải ngay đi em, còn do dự, trời tối mất!