1 / 35

ISA Server 2004

ISA Server 2004. Installation & Configuration Overview. By Nicholas Quinn. This presentation will detail the following 3 steps. The Installation of ISA Server 2004 The Configuration of an Allow Policy The Configuration of a Deny Policy. Step 1 – Install ISA Server. Begin the Installation.

Download Presentation

ISA Server 2004

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. ISA Server 2004 Installation & Configuration Overview By Nicholas Quinn

  2. This presentation will detail the following 3 steps. • The Installation of ISA Server 2004 • The Configuration of an Allow Policy • The Configuration of a Deny Policy

  3. Step 1 – Install ISA Server

  4. Begin the Installation • Insert ISA CD and double click ICON. • The Installation Wizard will open • Agree to the licensing agreement • Enter your Customer Information

  5. Select Setup Type • Select to install a Custom setup • Select the Firewall Client Installation Share option • And Install this feature on the local hard drive

  6. Configure Internal NIC • Click Add to specify internal address ranges • Select Internal under Network Adapter • Click Select Network Adapter and choose the IP range required

  7. Finish Installation • ISA’s Installation Wizard will now install your configuration • ISA Server 2004 is now installed • The Next Step is to configure your allow policy

  8. Step 2 - Configure Allow Policy

  9. Enable ICMP • Click on Firewall Policy • Click on Create New Access Rule • Find ICMP in the list • Make sure the Enable check box is selected • Click on the Form tab

  10. Add Internal NIC • Click the Add button to add the Internal NIC • Expand Networks • Highlight the Internaloption and click Add • Make sure you click the Applybutton

  11. Create the Network • Select the Networks option from the list • Click the Networkstab • Highlight the Internal option • Right Click and select properties

  12. Configure IP Range • Click the Addressestab • Click the Remove button to remove any addresses • Click Add • Select Internal Network Adapter

  13. Apply IP Range Configuration • Your IP address range will appear automatically • If it is correct click the Apply tab

  14. Setup Internet Access • Click on the Web Chaining tab • Click the Create New Web Chaining Rule option • Name the New WebChaining Rule

  15. Select Destination • On the Web Chaining Rule Destinationpage clickAdd • Highlight External and click Add • Click Next

  16. Configure Proxy Server • Select Redirect Requests to a Specified Upstream Server • Click Next

  17. Configure Proxy Server • Enter the IP address of the server • Change the Port number to 80 instead of 8080 • the SSL Portnumber to 443 instead of 8443

  18. Configure Backup Action • Select Ignore Requestunder the heading When the Primary Route is Unavailable • Click Finish • Make sure you click the Applybutton

  19. Firewall Policy • Expand icon next to the word Server • Select the Firewall Policy option • Select the Create New Access Rule • Enter a name for the rule • Select Allow

  20. Configure Access Rule Source • Select All Outbound Traffic click Next • Click Add • Expand Networks • Highlight Internal then click Add • Repeat the previous step and select External

  21. Configure User Sets • Select all users • Click Next • Click Finish • Make sure you click the Applybutton

  22. Step 3 – Deny Policy

  23. Configure IP Address • Open Network Connections and Properties • Configure the IP address and the Subnet Mask • The Preferred DNS Server must be the IP address of the Exchange Server

  24. Connect to the Domain • Right click on My Computer and select Properties • Click on the Computer Name tab • Click Change • Enter Domain Name • Change Primary DNS to Domain name

  25. Configure ISA Server • Open ISA Server • Select Firewall Policy • Create New Access Rule • Name the New Access Rule • Click Deny

  26. Select Protocol • Select the Selected Protocols option • Expand the Common Protocols folder • Highlight HTTPS to block a webpage • Click Add • Click Close

  27. Configure Access Rule Source • Add Network Entities • Expand Networks • Highlight Internal and click Add • Highlight Local Host and click Add • Click Close

  28. Access Rule Destination • On the Access Rule Destinations screen click Add • Click New and Select URL Set

  29. Configure URL Set • Enter the name of the website you wish to block • Click New • Enter the address of the website • Click Ok

  30. Add Network Entities • Expand URL Sets • Highlight Google • Click Add • Click Close

  31. Create User Set • Highlight All Users and click Remove • Click Add • On the URL Sets screen click New • Name the User Set • Click Next

  32. Add Users Sets to Block • On the Users screen click Add and Select Windows User and Groups • Click Locations • Enter the Administrator account User Name and Password

  33. Find Users to Block • Expand Entire Directory • Expand the domain that the users are in • Select the required organisational unit • Click Ok

  34. Select Users to Block • Enter the user name you wish to block • Click Check Names • The full name should appear • Click Ok • Check information • Click Ok

  35. Add User Set • On the Add Users screen highlight the group you have created and click Add • Click Next • Click Finish • Make sure you click the Applybutton

More Related