1 / 16

Overview of Microsoft ISA Server

Overview of Microsoft ISA Server. Introducing ISA Server. New Product—Proxy Server In 1996, Netscape had begun to sell a web proxy product, which optimized Internet web browsing by caching the images and text from web pages to local servers, enabling clients to access them quickly.

temple
Download Presentation

Overview of Microsoft ISA Server

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Overview of Microsoft ISA Server

  2. Introducing ISA Server • New Product—Proxy Server • In 1996, Netscape had begun to sell a web proxy product, which optimized Internet web browsing by caching the images and text from web pages to local servers, enabling clients to access them quickly. • Microsoft released the first version (1.0) of Proxy Server, a new product to provide web proxy capabilities for clients. • the release of version 1.0 was version 2.0 , which equalized many ofthe disparities between Microsoft’s Proxy Server product and the competitors • Proxy Server2.0 introduced the capability to create arrays of servers for redundancy and providedsupport for HTTP 1.1 and FTP

  3. Introducing ISA Server • The Internet Security and AccelerationServer 2000: • focus more attention on the product’s security capabilities • This version of the productwas the first that marketed it as a firewall by and of itself

  4. Introducing ISA Server • ISA Server 2004: • This version of ISA was vastlyimproved over the previous versions of the product, and it quickly became noticed in thewider security community. • ISA Server 2004 was originally released with only a standard edition of the product • Finally, predating the release of ISA Server 2006

  5. Exploring ISA Server 2006’s New Features • Multiple network support and per-network policies:introducedthe capability to set up and secure ISA between multiple networks • Support for complex and customizable protocols:include a widearray of known protocol support for rules. • New server and OWA(OutlookWeb Access) publishing rules • Remote Procedure Call (RPC) filtering support:enables an administrator tospecify what type of RPC traffic will be allowed from one network to another

  6. Exploring ISA Server 2006’s New Features • End-to-end secure web publishing capabilities:allow for end-to-end securing of Secure Sockets Layer(SSL) encrypted web traffic from client to ISA Server, and then back to web server • RADIUS and SecurID authentication support • Stateful inspection for VPNconnections • VPN quarantine control features • Enhanced monitoring, logging, and reporting • Forms-based authentication for all web sites • Enhanced branch office support tools

  7. Choosing the Operating System for ISA Server 2006 • install and deploy ISA Server 2006 servers on the Windows Server 2003platform. • With ISA Server 2004, it was previously possible, though not recommended,to install ISA Server 2004 on the Windows 2000 Operating System

  8. Using Web Caching to Improve and Control Web Browsing • caching commonly used web sitesand their associated graphics, text, and media, and serving them up to end users morequickly than if they had to access the content across the Internet. • in ISA Server 2006:the first time that particular page hasbeen opened, the ISA Server then goes out to the Internet, downloads the contentrequested, and then serves it back to the client, while at the same time keeping a localcopy of the text, images, and other HTTP or FTP content. • If another client on the networkrequests the same page, the caching mechanism delivers the local copy of the page to theuser instead of going back to the Internet

  9. Using Firewalls • What is a Firewall? • A firewall is hardware, software, or a combination of both that is used to prevent unauthorized programs or Internet users from accessing a private network and/or a single computer • Firewall Rules: • Allow – traffic that flows automatically because it has been deemed as “safe” • Block – traffic that is blocked because it has been deemed dangerous to your computer • Ask – asks the user whether or not the traffic is allowed to pass through

  10. Using Firewalls

  11. 3 Using Firewalls • enables you toblock Internet traffic from using a specific port, such as FTP ports, to accessinternal resources. • In ISA, this type of filtering, done by traditional firewalls as well, provides forfiltering of Internet Protocol (IP) traffic at the Network layer (Layer 3). however, comes with its capabilities to filter IPtraffic at the more complex Application layer (Layer 7).

  12. Virtual Private Networks (VPNs) • Deployment of an ISA Server 2006 VPN solutionis an increasingly common scenario for many organizations. • The capabilities for clientsto securely access internal resources from anywhere in the world is ideal for manyorganizations. • VPN deployment with ISA Server 2006 typically involves a secure, encrypted tunnel beingset up between clients on the Internet and an Internet-facing ISA firewall. • After the clientshave authenticated, they are granted access to specific internal resources that are definedby the ISA administrator • The resources that can be accessed can be designated via accessrules, so the control can be very granular

  13. Virtual Private Networks (VPNs) • ISA Server also makes it possible to quarantine VPN users thatdo not comply with specific rules that can be set up

More Related