Module 12: Implementing ISA Server 2004 Enterprise Edition: Back-to-Back Firewall Scenario
Overview
Implementing a Back-to-Back Firewall Scenario
Lab: Implementing a Back-to-Back Firewall Scenario
Lesson: Implementing a Back-to-Back Firewall Scenario
Issues in Deploying a Back-to-Back Firewall Solution
Guidelines for Configuring ISA Servers in a Workgroup
Guidelines for Implementing Network Load Balancing
Guidelines for Configuring a Front-End Firewall Array
Guidelines for Configuring a Back-End Firewall Array
Issues in Deploying a Back-to-Back Firewall Solution
Issues in deploying a back-to-back firewall Issues in deploying a back-to-back firewall configuration include: Using public or private IP addresses in the configuration include: Using public or private IP addresses in the perimeter network perimeter network
Deploying the ISA Server computers in a Deploying the ISA Server computers in a domain or workgroup domain or workgroup
Configuring network load balancing Configuring network load balancing
Configuring name resolution and network Configuring name resolution and network routing routing
Configuring access to Configuration Configuring access to Configuration Storage servers Storage servers
Configuring configure publishing rules and Configuring configure publishing rules and access rules access rules
Configuring SSL connections Configuring SSL connections
Configuring user authentication Configuring user authentication
Guidelines for Configuring ISA Servers in a Workgroup
ISA Server Enterprise Edition supports the ISA Server Enterprise Edition supports the following deployment scenarios: following deployment scenarios:
Deploying all ISA Server components on Deploying all ISA Server components on domain members domain members
Deploying all ISA Server components on Deploying all ISA Server components on workgroup members workgroup members
Deploying ISA Server components in a mixed Deploying ISA Server components in a mixed configuration configuration
You can change the deployment configuration You can change the deployment configuration after deployment after deployment
Guidelines for Implementing Network Load Balancing
Configuring intra-array addressing: Configuring intra-array addressing:
Used by array members to communicate Used by array members to communicate with other array members with other array members
If not enabling NLB, use the internal If not enabling NLB, use the internal network for the intra-array network network for the intra-array network
If enabling NLB, create a separate IP If enabling NLB, create a separate IP address or a separate network for the intra- address or a separate network for the intra- array addresses array addresses
When configuring network load balancing: When configuring network load balancing: Do not use a layer-2 switch to connect array Do not use a layer-2 switch to connect array members members
If all networks are enabled for NLB, add an If all networks are enabled for NLB, add an additional network adapter and create a additional network adapter and create a separate network for intra-array traffic separate network for intra-array traffic
Guidelines for Configuring a Front-End Firewall Array
Network routing Network routing
When configuring a back-to-back firewall, When configuring a back-to-back firewall, begin by defining the Internal and External begin by defining the Internal and External networks for both arrays networks for both arrays On the front-end firewall array, you need On the front-end firewall array, you need to configure: to configure:
The Internal network IP addresses The Internal network IP addresses
The network relationship The network relationship
Access to resources on the perimeter Access to resources on the perimeter network network
Access to resources on the Internal network Access to resources on the Internal network
SSL publishing for perimeter network SSL publishing for perimeter network servers servers
SSL publishing for Internal network servers SSL publishing for Internal network servers
Authentication Authentication
Guidelines for Configuring a Back-End Firewall Array
The internal network IP addresses The internal network IP addresses
On a back-end firewall array, you need to On a back-end firewall array, you need to configure: configure:
Network routing Network routing
The perimeter network on the internal The perimeter network on the internal array array
Network objects Network objects
Access to perimeter network resources Access to perimeter network resources
Access for front-end ISA Server computers Access for front-end ISA Server computers
Access to resources on the Internal network Access to resources on the Internal network
Internal network access for domain Internal network access for domain members members