250 likes | 547 Views
2. What Is ISA?. ISA is Microsoft Internet Security and Acceleration Server 2000ISA is Microsoft's new Internet firewall and Web-caching server built on Microsoft
E N D
1. Introduction to Microsoft Internet Security and Acceleration Server 2000Shantanu MondalSupport EngineerMicrosoft Platform Support Windows 2000 NetworkMicrosoft Corporation
2. 2
3. 3 Introduction to ISA 2000 Integrated firewall and Web cache management:
ISA protects your internal computers from Internet by installing packet filter
ISA server protects all communication between internal computers and the Internet
4. 4 Minimum System Requirements To use Microsoft Internet Security and Acceleration (ISA) Server, you need:
A computer with a 300 MHz or faster Pentium II-compatible processor that is running one of these operating systems:
Microsoft Windows 2000 Server with Service Pack 1 or later
Windows 2000 Advanced Server with Service Pack 1 or later
Windows 2000 Datacenter Server
5. 5 Minimum System Requirements (2) Additional requirements:
256 MB of RAM
20 MB of available hard-disk space
A Windows 2000-compatible network adapter for communicating with the internal network
One local hard disk partition formatted with the NTFS file system
6. 6 Migrating from Microsoft Proxy Server 2.0
Microsoft Internet Security and Acceleration (ISA) Server supports a full migration path for Microsoft Proxy Server 2.0 users.
Most Proxy Server rules, network settings, monitoring configuration, and cache configuration migrate to ISA Server.
Furthermore, ISA Server will continue to support Winsock Proxy client software, together with its own firewall client software, in a heterogeneous client base.
7. 7 Why Upgrade from Proxy 2.0? More than 10 times faster than Proxy 2.0
Superior Internet access control
Scaleable central management
Certified enterprise firewall
Extensible open platform
8. 8 Basic ISA Layout
9. 9 Internet Access ISA Server manages Internet access consistently with access control policies
10. 10 Single Management Interface
Administrators benefit from a single management interface for firewall and Web caching
11. 11 ISA Server ISA Server is built for enterprise
ISA provides tiered policy management
ISA allows local array policies; it can inherit policies from enterprise level
In distributed environment, administrators can delegate various levels of ISA administration
12. 12 ISA and the Network ISA Server secures your network, allowing you to implement your business security policy by configuring a broad set of rules that specify which sites, protocols, and content can be passed through the ISA Server computer.
13. 13 Requests and Responses ISA Server monitors requests and responses between the Internet and internal client computers, controlling who can access which computers on the corporate network.
14. 14 ISA and Internal Clients ISA Server also controls which computers on the Internet can be accessed by internal clients.
15. 15 ISA Cache Management Flowchart
16. 16 Firewall and Security Firewall and security overview:
ISA Server can be deployed as dedicated firewall that acts as the secure gateway to the Internet for internal clients
Outgoing access policy
Intrusion detection
Application filters
Authentication
Security wizard
17. 17 Outgoing Access Policy You can use ISA Server to configure site and content rules and protocol rules that control how your internal clients access the Internet.
Site and content rules specify which sites and content can be accessed.
Protocol rules indicate whether a particular protocol is accessible for inbound and outbound communication.
18. 18 Intrusion Detection Integrated intrusion detection mechanisms can alert you when a specific attack is launched against your network.
19. 19 Security Wizard The ISA Server Security Wizard allows you to set the appropriate level of system security, based on how ISA Server functions in your network.
20. 20 Application Filters ISA Server controls application-specific traffic with data-aware filters.
ISA Server uses the filters to determine if packets should be accepted, rejected, redirected, or modified.
21. 21 Authentication ISA Server supports the following user authentication methods:
Integrated Windows authentication
Client certificates
Digest
Basic
22. 22 Microsoft ISA 2000 Architecture
23. 23 Extensibility Extensible administration
Application filters
Web filters
Extensible user interface
Extensible alerts
Extensible storage
24. 24 More Information Useful Web sites
http://www.microsoft.com/ISAServer/
http://www.isaserver.org/ (Note that this site is not affiliated with Microsoft in any way.)
Book:
Microsoft ISA Configuration and Administration by Curt Simmons (ISBN: 0764548050)