142
Module 3: Enabling Secure Internet Access

Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Embed Size (px)

Citation preview

Page 1: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Module 3:Enabling Secure Internet Access

Page 2: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Overview

Access Policies and Rules Overview

Creating Policy Elements

Configuring Access Policies and Rules

Configuring Bandwidth Rules

Using ISA Server Authentication

Page 3: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Microsoft® Internet Security and Acceleration (ISA) Server provides policy-based access control that enables organizations to securely control outbound access. Network administrators can configure access policies to specify which content and sites are accessible, whether a particular protocol is available for outgoing Internet requests, and during which times access is allowed. In addition, network administrators can configure authentication to restrict access on a per-user basis or on a per-group basis.

Page 4: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

After completing this module, you will be able to:

Explain the use of access policies and rules to enable Internet access.

Create policy elements.

Configure access polices and rules.

Configure bandwidth rules.

Explain the use of authentication for outgoing Web requests.

Page 5: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Access Policy and Rules Overview

Understanding Access Policy Components

Processing Outgoing Client Requests

Planning an Access Policy Strategy

Page 6: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

One of the primary functions of ISA Server is connecting your internal network to the Internet while implementing your organization's security policies that define the type of Internet access that you allow. By creating an access policy and associated rules, you can allow or deny internal users access to specific protocols, Internet sites, and content. When ISA Server processes an outgoing request, it uses the access policy to determine if access should be allowed or denied. It is important to plan a strategy before creating an access policy to ensure that the rules that you create meet the needs of your organization.

Page 7: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

In this lesson you will learn about the following topics:

Understanding access policy components

Processing outgoing client requests

Planning an access policy strategy

Page 8: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Site and Content RuleSite and Content Rule

Policy ElementPolicy

ElementPolicy

ElementPolicy

Element

Allow or Deny

Allow or Deny

Allow or Deny

Allow or Deny

Access PolicyAccess Policy

Protocol RuleProtocol Rule

Policy ElementPolicy

ElementPolicy

ElementPolicy

Element

Allow or Deny

Allow or Deny

Allow or Deny

Allow or Deny

Understanding Access Policy Components

Page 9: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

An access policy consists of the following components:

Protocol rules. Define the protocols that the ISA Server clients can use to communicate between the internal network and the Internet.

Site and content rules. Define the type of content and the sites to which Web Proxy clients are allowed or denied access.

Policy elements. Define settings that you use as parts of rules. For example, you can create policy elements that define a schedule or a specific type of content.

Page 10: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Processing Outgoing Client Requests

Is there asite and content

rule that denies therequest?

Is there asite and content

rule that denies therequest?

Is there aprotocol rule that denies

the request?

Is there aprotocol rule that denies

the request?

Request frominternal clientRequest frominternal client

Deny requestDeny request Retrieve objectRetrieve object

Is there aprotocol rule that allows

the request?

Is there aprotocol rule that allows

the request?

Yes

No

No

Yes

Yes

No

No

Is there asite and content

rule that allows therequest?

Is there asite and content

rule that allows therequest?

Yes

No

Yes

Does an IP packet filterblock the request?

Does an IP packet filterblock the request?

Does a routingrule specify routing to an

upstream server?

Does a routingrule specify routing to an

upstream server?

Yes

Route to upstream server

Route to upstream server

No

Page 11: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

When ISA Server processes an outgoing client request, it checks protocol rules and site and content rules to determine if access is allowed. A request is allowed only if both a protocol rule and a site and content rule each allow the request and if there is no rule that explicitly denies the request.

Note: ISA Server also controls Internet traffic based on

Internet Protocol (IP) packet filters and routing rules. When you install ISA Server as a stand-alone server, a site and content rule named "Allow Rule" allows access to all content on all sites by default. However, because ISA Server contains no protocol rules by default, no traffic is allowed to pass until you define at least one protocol rule.

Page 12: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Planning an Access Policy Strategy

Determine Organizational RequirementsDetermine Organizational Requirements

Define Rules Define Rules

Create Policy Elements Create Policy Elements

Create Rules by Using Policy Elements Create Rules by Using Policy Elements

Test Rules Test Rules

Page 13: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

You should perform the following tasks when planning an access policy strategy:

Page 14: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Determine your organization's requirements based on your business needs.

Because an access policy should be consistent with business needs, it is important to identify your business needs before you create an access policy. For example, one of your business needs may include giving users access to a supplier's Web site.

Page 15: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Define the rules that are needed.

You define rules to implement your organization's access policy. For example, you can create a rule to grant access for all employees to the www.contoso.msft Web site during business hours.

Page 16: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Create policy elements.

Rules require policy elements, which are the building blocks that you use to create rules. For example, you can create a policy element that defines specific computers or directories at www.contoso.msft.

Page 17: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Create rules that use the policy elements.

When you create rules, you use policy elements to define the rules.

Page 18: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Test rules.

Ensure that the rules allow the required access for your users, without providing more access than necessary. Ensure that you test all of the rules before allowing users to gain access to the Internet.

Page 19: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Creating Policy Elements

Policy Element Overview

Creating Schedules

Creating Bandwidth Priorities

Creating Destination Sets

Creating Client Address Sets

Creating Protocol Definitions

Creating Content Groups

Page 20: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Policy elements are the components that you use to create ISA Server rules. Policy elements give you more control to define users, locations, bandwidth allocation, specific protocols, and types of content in policy rules. ISA Server includes several types of policy elements that you can use to create rules for your access policy.

Important: Policy elements do not define any access policy by themselves. Rather, you use policy elements as components of rules that control access.

Page 21: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

In this lesson you will learn about the following topics:

Policy element overview

Creating schedules

Creating bandwidth priorities

Creating destination sets

Creating client address sets

Creating protocol definitions

Creating content groups

Page 22: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Policy Element Overview

Policy Elements Can Include:

Schedules

Bandwidth Priorities

Destination Sets

Client Address Sets

Protocol Definitions

Content Groups

Dial-up Entries

Page 23: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Before you can configure an access policy, you must create the associated policy elements that you will use when defining the rules. ISA Server policy elements can include:

Page 24: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Schedules. The days and times when a rule is active.

Page 25: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Bandwidth priorities. Determine the relative amount of bandwidth that you can allocate to different types of network traffic. You use bandwidth priorities in bandwidth rules that determine which connection gets priority over others to allocate available network bandwidth.

Page 26: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Destination sets. One or more computers or directories on specific computers. For access policy rules, destination sets are computers that are not on the internal network.

Page 27: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Client address sets. One or more computers that you specify by name or by using an IP address or range of IP addresses. For access policy rules, client address sets are computers on the internal network.

Page 28: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Protocol definitions. Predefined or user-defined protocols that ISA Server clients can use to communicate with other computers.

Page 29: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Content groups. Logical groupings of common file types and file extensions.

Page 30: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Dial-up entries. Specify how the ISA Server computer will connect to the Internet. The dial-up entry includes the name of the network dial-up connection that is configured for the remote access server and the user name and password for a user who has permissions to gain access to the dial-up connection.

Page 31: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

New schedule

Name: Lunch Hours and Weekends

Description: Use this schedule to permit access to siteslunch hours and weekends.

OK Cancel

Creating Schedules

Click Active to add portions of the week, or click Inactive to remove portions of the week.

Set the activation times for rules that are based on this schedule.

12 · 2 · 4 · 6 · 8 · 10 · 12 · 2 · 4 · 6 · 8 · 10 · 12Al

Sunday

Monday

Tuesday

Wednesday

Thursday

Friday

Saturday

Sunday from 12 AM to 12 AM

Active Inactive

Page 32: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Use schedules to create rules that apply separate access policies during different times of the day or the week. For example, you can create a schedule to use in a rule for an access policy that allows access to the Internet during the lunch hour only.

Page 33: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

To create a schedule:

1. In ISA Management, in the console tree, expand Policy Elements, click Schedules, and then in the details pane, click Create a Schedule.

2. In the New schedule dialog box, in the Name box, type the name of the schedule.

3. In the Description box, type a description for the schedule.

4. In the schedule table, click a cell, day, or hour, or drag multiple cells, to select the specified times.

5. To modify the schedule, do the following tasks, and then click OK:

Click Active to add portions of the week to the schedule. Click Inactive to remove portions of the week from the schedule.

When a blue cell appears, the rule is in effect during that period; when a white cell appears, the rule is not in effect during that period.

Note: By default, ISA Server contains the Weekends schedule and the Work hours schedule, which you can modify for use in policy rules.

Page 34: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Creating Bandwidth Priorities

New Bandwidth Priority

Name:

Description(optional):

OKOKOKOK Cancel

Basic Priority

Assigns high priority to incoming traffic.

Outbound bandwidth (1-2000):

Inbound bandwidth (1-200): 20

New Bandwidth Priority

Name:

Description(optional):

OKOKOKOK Cancel

High Priority

Assigns high priority to incoming traffic.

Outbound bandwidth (1-2000):

Inbound bandwidth (1-200): 30

Page 35: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Use bandwidth priorities to create bandwidth rules that assign a higher priority to specific traffic that is moving to or from the Internet. For example, you can create a bandwidth rule that assigns a high bandwidth priority to traffic for specific employees or departments. Before you can assign this type of bandwidth rule, you must create the associated bandwidth priorities.

Page 36: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

How Bandwidth Priorities Work

Bandwidth priorities assign priorities to connections that pass through ISA Server. Bandwidth priorities are directional and can be controlled for both inbound connections and outbound connections.

When there is limited bandwidth, ISA Server allocates this bandwidth according to bandwidth priorities that you assign to traffic that is processed by ISA Server. You can use a number between 1 and 200 to specify a bandwidth priority. A higher number indicates a higher priority.

When you assign a bandwidth priority, you must assess the impact of that bandwidth priority in relationship to the other bandwidth priorities that you assign. For example, if you assign bandwidth priority A to30 and you assign bandwidth priority B to 20, ISA Server will allocate 60 percent of the available bandwidth to traffic with bandwidth priority A and will allocate 40 percent of the available bandwidth to traffic with bandwidth priority B when processing bandwidth rules.

Page 37: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Creating a New Bandwidth Priority

To create a new bandwidth priority:

1. In ISA Management, in the console tree, right-click Bandwidth Priorities, point to New, and then click Bandwidth Priority.

2. In the New Bandwidth Priority dialog box, in the Name box, type the name of the bandwidth priority.

3. In the Description box, type a description of the bandwidth priority.

4. Do the following tasks, and then click OK:

To define the bandwidth priority for outbound traffic, in the Outbound bandwidth box, type a number between 1 and 200.

To define the bandwidth priority for inbound traffic, in the Inbound bandwidth box, type a number between 1 and 200.

Page 38: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Creating Destination Sets

RemoveRemoveRemoveRemove

New Destination Set

Name: Partner Web

Description (optional):

Cancel

Include these computers:

Name/IP Range Path

OK

Edit…Edit…Edit…Edit…Add…

Add/Edit Destination

Computer name: nwtraders.msft

IP addresses:

Cancel

To include a specific directory in the destination set, type the pathbelow.To include all the files, use this format: /dir/*.To select a specific file, use this format: /dir/filename.

Path:

/sales/accounts.xls

OK

Browse…

From:

To (optional):

Page 39: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Use destination sets to create rules that allow or deny access to one or more computers. For example, you can create a destination set that includes the Web sites of business partners and then allow access to this destination set. You can specify destination sets by using a domain name or by using a range of IP addresses. You can also allow or deny access to specific directories on a computer. Other rules, such as bandwidth rules, also use destination sets.

Page 40: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

To create a new destination set:

1. In ISA Management, in the console tree, click Destination Sets, and then in the details pane, click Create a Destination Set.

2. In the New Destination Set dialog box, in the Name box, type a name for the destination set.

3. In the Description box, type a description for the destination set.

Page 41: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

4. Click Add, and then in the Add/Edit Destination dialog box, do one of the following:

If specifying a destination If specifying a destination set by set by

Then Then

Computer or domain name Click Destination, and then type the computer name or click Browse to select a computer on your network. To add all of the computers in a domain, type *.domain (where domain is the name of your domain). For example, to add all of the computers in the contoso.msft domain, you would type *.contoso.msft

IP address Click IP addresses. In the From box, type the first IP address in the range, and then in the To box, type the last IP address in the range. To include a single computer, type the same IP address in the From box and in the To box.

Page 42: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

5. To specify a particular path on a Web site, in the Path box, type the path of the specified computer by using the format listed in the following table, and then click OK twice:

To specifyTo specify Use the formatUse the format

A specific directory /dir

All of the files in a directory /dir/*

A specific file in a directory /dir/filename

Page 43: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Important: ISA Server processes path components of a rule only for client requests that use the Hypertext Transfer Protocol (HTTP) protocol and only for Web Proxy client requests that use the File Transfer Protocol (FTP) protocol. ISA Server ignores the path component of a destination set when processing any other client requests but still evaluates the computer and IP address components of any applicable destination set, independent of the protocol that the client uses. For more information, see "Site and content rules" in ISA Server Help.

Page 44: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Creating Client Address Sets

Client Set

Name: Support Staff

Description(optional):

Select the addresses of computers that belong to this clientaddress set.

Members:

RemoveRemoveRemoveRemove

From To

Edit…Edit…Edit…Edit…Add…

CancelOK

Add/Edit IP Addresses

Client set IP addresses:

CancelOK

From: 192 . 168 . 101 . 0

To: 192 . 168 . 101 . 255

Page 45: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Use client address sets to create rules that allow or deny access to outgoing Web requests from a single computer or from a set of computers. Other rules, such as bandwidth rules, also use client address sets.

Page 46: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

To create a client address set:

1. In ISA Management, in the console tree, click Client Address Sets, and then in the details pane, click Create a Client Set.

2. In the Client Set dialog box, in the Name box, type a name for the client address set.

3. In the Description box, type a description for the client address set.

4. Click Add.

5. In the Add/Edit IP Addresses dialog box, in the From box, type the first IP address in the range, and then in the To box, type the last IP addresses in the range. To include a single computer, type the same IP address in the From box and the To box.

6. Click OK twice.

Note: Although you can use the Open Windows' User Manager button on the Configure Client Address Sets taskpad to create or modify Microsoft Windows® 2000 security groups on the ISA Server computer, the security groups are separate policy elements from the client address sets.

Page 47: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Creating Protocol Definitions

Type a number between between 1 and 65535 to specify the port number.

Page 48: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Protocol definitions define the communications parameters that a protocol uses. You use protocol definitions to create rules that allow or deny access based on specific protocols. ISA Server includes many predefined protocol definitions for the most popular protocols. If you use a protocol for which ISA Server does not contain a definition, you can create a new protocol definition for that protocol.

Note: You can create protocol definitions for only the Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) protocols. To control network traffic that uses any other protocol types, such as the Internet Control Message Protocol (ICMP), you must create packet filters.

Page 49: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Protocol Definition Overview

Before you create a new protocol definition, you must know how the protocol works. This knowledge includes the port number that a protocol uses, the protocol type, and the direction of the connection. Generally, you obtain port information from an application vendor or from a protocol specification, such as a Request for Comments (RFC).

Note: The Internet Assigned Numbers Authority (IANA) maintains a registry of assigned protocol and port numbers. For more information, see the IANA Web site at www.iana.org/assignments/port-numbers

Page 50: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Primary Connections

Protocols use at least one port during a session. When you define a protocol definition, you must specify which port the protocol uses to establish the session. This port is the primary connection. For example, the Simple Mail Transfer Protocol (SMTP) uses TCP port 25 for a client connection to a mail server. To create a protocol definition for SMTP, you must specify a primary connection that uses TCP port 25 for outgoing connections.

Page 51: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Secondary Connections

Some protocols use multiple ports during the same session. When creating a protocol definition for this type of protocol, you must define one or more secondary connections in addition to the primary connection. For example, the FTP protocol uses TCP port 21 for a client to establish an initial connection with a server and then, by default, the FTP server uses TCP port 20 for a connection to the client to transfer data. To create a protocol definition for the FTP protocol, in addition to configuring a primary connection that uses TCP port 21 for an outgoing connection, you must configure a secondary connection that uses TCP port 20 for incoming connections.

Important: Before deleting a protocol definition that you created, always ensure that no rules use that protocol definition. If a rule uses a protocol definition that you delete, ISA Server will not start. In addition, you cannot modify or delete built-in protocol definitions or the protocol definitions that are defined by application filters. For more information about protocol definitions and application filters and for a list of protocol definitions included with ISA Server, see "Configuring protocol definitions" in ISA Server Help.

Page 52: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Creating a New Protocol Definition

To create a new protocol definition:

1. In ISA Management, in the console tree, right-click Protocol Definitions, and then in the details pane, click Create a Protocol Definition.

2. In the New Protocol Definition Wizard, in the Name box, type the name of the protocol definition, and then click Next

Page 53: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

3. On the Primary Connection Information page, specify a port number between 1 and 65535 that the protocol uses for the initial connection. Specify the protocol type, which is TCP or UDP. Specify the direction: Outbound (TCP only). An internal computer establishes the

connection. Inbound (TCP only). An external computer establishes the

connection. Send (UDP only). An internal computer sends packets without

expecting the external host to reply by using the same connection. Send/Receive (UDP only). An internal computer sends packets and

expects the external host to reply by using the same connection. Receive (UDP only). An external computer sends packets without

expecting the internal host to reply by using the same connection. Receive/Send (UDP only). An external computer sends packets and

expects the internal host to reply by using the same connection.

Page 54: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

5. On the Secondary Connections page, specify whether to use secondary connection settings. If the protocol that you are defining uses secondary connections, for each secondary connection, click New, and then specify the port range, protocol type, and the direction of the secondary connection, click OK, and then click Next.

6. On the Completing the New Protocol Definition Wizard page, review your choices, and then click Finish.

Page 55: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Creating Content Groups

ISA Server includes several preconfigured content groups.

ISA ManagementAction View

Tree Name Description Content TypesInternet Security and Acceleration Server

Servers and ArraysLONDON

MonitoringComputerAccess PolicyPublishingBandwidth RulesPolicy Elements

SchedulesBandwidth PrioritiesDestination SetsClient Address SetsProtocol Definitions

Application Applications application/hta.application/x-internet-signup.application/x-pkcs7-certificApplication Data Files Files containing data for applications application/x-mscardfile.application/x-perform.application/x-msclip.applAudio Audio files audio.*,.ra,.ram,.rmi,.au,.snd,.aif,.aifc,.wav,.m3u,.mid,.mp3Compressed Files Compressed Files application/x-gzip,application/x-tar,application/x-gtar,application/x-comDocuments Documents text/tab-separated-values,text/xml,text/h323,application/postscript,applHTML Documents HTML Documents text/webviewhtml,text/html,.htm,.html,.htt,.stm,.xslImages All known types of images .cod,.cmx,.ief,.pbm,.pnm,.ppm,.gif,.bmp,.jfif,.jpe,.jpg,.jpeg,.ico,.pgm,.rasMacro Documents Documents that may contain macr… application/msword,application/vnd.ms-excel,application/x-msaccess,aText Text content .txt,.h,.c,.htc,.vcf,.etx,.uls,.css,.bas,.rtx,text/plain,text/x-component,text/Video Video files video/*,.asf,.asr,.asx,.avi,.ivf,.lsf,.lsx,.mov,.movie,.mlv,.mp2,.mpa,.mpe,.VRML VRML x-world/x-vrml,.flr,.wrl,.wrz,.xaf,.xof

Page 56: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Content groups define types of Web content. Use content groups to create rules that allow or deny access to Web requests based on the type of content. When you create content groups, you must specify the content's Multipurpose Internet Mail Extensions (MIME) type and file extension. ISA Server uses MIME types when applying rules to HTTP traffic and file extensions when applying rules to FTP traffic. ISA Server includes many predefined content groups. You can also define new content groups when you want to create a rule that is not predefined.

Note: For a list of default MIME types and files extensions, see "Configuring content groups" in ISA Server Help.

Page 57: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

To create a content group:

1. In ISA Management, in the console tree, right-click Content Groups, point to New, and then click Content Group.

2. In the New Content Group dialog box, in the Name box, type the name of the content group.

3. In the Description box, type a description for the content group.

Page 58: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

4. In the Available Types box, do one of the following:

To In the Available types box

Select an existing content type Select a file extension or a MIME type.

Add a new content type Type a new file extension or a MIME type.

Page 59: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

5. Click Add, repeat this step for additional content types, and then click OK.

Important: ISA Server uses content groups only when applying rules to HTTP requests from all client types and to FTP requests from Web Proxy clients.

Page 60: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Configuring Access Policies and Rules

Planning Access Policies

Creating Protocol Rules

Creating Site and Content Rules

Page 61: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

ISA Server access policies and the rules that you use to implement these policies help your organization meet security policy requirements. Proper planning helps to ensure that you configure rules that are appropriate for your organization. Rules determine the type of access to grant users for specific sites on the Internet. An access policy can contain protocol rules and site and content rules. In addition, ISA Server uses bandwidth rules to determine which connections get priority.

Page 62: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

In this lesson you will learn about the following topics:

Planning access policies

Creating protocol rules

Creating site and content rules

Page 63: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Planning Access Policies

Gather organizational support.

22

Implement policy.33

Determine the policy structure.

11

Evaluate policy.44

Site and Content RuleSite and Content Rule

Access PolicyAccess Policy

Protocol RuleProtocol Rule

Page 64: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Before you configure Internet access for clients, you must carefully examine the Internet access requirements of your organization and then implement policies and authentication methods that are based on those requirements. Use the following steps to plan your access policies:

Page 65: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

1. Determine the policy structure. The first step in designing an access policy is to determine how you want to structure your access policy:

Allow all access with the exception of specific rules that deny access. This policy is best suited for an organization that makes Internet access freely available and that has few reasons to restrict Internet access of any kind by employees.

Deny all access except the type of access that you specifically allow. This policy is best suited for an organization that uses the Internet for only a few specific uses.

Many organizations employ a combination of both types of access policy. For example, an organization may allow access to all Web sites, except for a few selected Web sites, by using the HTTP protocol. The same organization may allow other outgoing Internet traffic by using only a few protocols that have been specifically approved.

Page 66: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

2. Gather organizational support. When designing your organization's access policy, it is recommended that you confer with all relevant decision makers in your organization, including management, human resources, and legal departments.

3. Implement policy. After your access policy is in place, you can configure ISA Server authentication and rules to implement your organization's requirements. It is recommended that all required components of the policy are in place before you allow Internet access.

4. Evaluate policy. After you have configured your rules, it is important that you periodically review the policy. You must ensure that all rules work together and that they do not conflict with each other.

Page 67: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Creating Protocol Rules

Name the RuleName the Rule

Specify the Rule ActionSpecify the Rule Action

Select the Protocol(s) Select the Protocol(s)

Select a ScheduleSelect a Schedule

Select a Client TypeSelect a Client Type FinishFinishFinishFinish

StartStartStartStart

Page 68: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Protocol rules determine the protocols that clients can use to gain access to the Internet. For example, a protocol rule might allow clients to use the HTTP protocol.

Important: ISA Server processes a request for a user to gain access to an Internet site only if a protocol rule permits the use of the protocol and a site and content rule allows access to the site.

Page 69: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

To create a protocol rule:

1. In ISA Management, in the console tree, expand Access Policy, click Protocol Rules, and then in the details pane, click Create a Protocol Rule.

2. In the New Protocol Rule Wizard, in the Protocol rule name box, type a name for the protocol rule, and then click Next.

3. On the Rule Action page, click Allow or Deny to specify the rule action, and then click Next.

Page 70: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

4. On the Protocols page, click one of the following options, and then click Next.

If you select Then

All IP traffic No further action is required. For Firewall clients, ISA Server allows or denies all IP traffic. For SecureNAT clients, ISA Server allows or denies all traffic that matches an existing protocol definition.

Selected protocols Select the check boxes for all protocols to which the rule will apply.

All IP traffic except selected

Select the check boxes for all protocols to which the rule will not apply.

Page 71: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

5. On the Schedule page, select a schedule, and then click Next.

6. On the Client Type page, click one of the following options, and then click Next.

If you select Then

Any request No further action is required.

Specific computers (client address sets)

On the Client Sets page, click Add to add client sets. The rule applies to requests from only the computers that belong to the client set that you select.

Specific users and groups

On the Users and Groups page, click Add to add users and groups. The rule applies to requests from only the users or groups that you select.

Page 72: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

7. On the Completing the New Protocol Rule Wizard page, review your choices, and then click Finish.

Page 73: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Disabling and Deleting Protocol Rules

You can disable protocol rules that you are not using. To disable a protocol rule, in the details pane, click the rule, and then on the Action menu, click Disable. To re-enable a rule, click the rule, and then on the Action menu, click Enable. To permanently remove a rule, click the rule, and then click Delete a Protocol Rule.

Page 74: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Creating Site and Content Rules

Name the RuleName the Rule

Specify the Rule ActionSpecify the Rule Action

Select a Destination SetSelect a Destination Set

Select a ScheduleSelect a Schedule

Select a Client TypeSelect a Client Type

StartStartStartStart

FinishFinishFinishFinish

Page 75: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Site and content rules determine if users or client address sets can gain access to specific content on specific destination sets. For example, a site and content rule might allow a group of users to gain access to any destination on the Internet from any computer in a specific department.

Page 76: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

To create a site and content rule:

1. In ISA Management, in the console tree, expand Access Policy, click Site and Content Rules, and then in the details pane, click Create a Site and Content Rule.

2. In the New Site and Content Rule Wizard, in the Site and Content rule name box, type a name for the rule, and then click Next.

3. On the Rule Action page, click Allow or Deny to specify the rule action.

Note: You can also choose to redirect users to a specific Web page when users attempt to gain access to a prohibited Web site. For example, you can use a Web page to provide information about your organization's access policies. To redirect users, on the Rule Action page, select the If HTTP request, redirect request to this site check box, and then type the complete URL of the Web page.

Page 77: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

5. On the Destination Sets page, select the destination to which the rule applies, perform the associated actions, and then click Next.

If the rule applies to Then

All destinations Select a schedule, and then select a client type.

All internal destinations Select a schedule, and then select a client type.

All external destinations Select a schedule, and then select a client type.

Specified destination set

Select a schedule, select a client type, and then select the previously configured destination set

All destinations except selected sets

Select a schedule, select a client type, and then select the previously configured destination set.

Page 78: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

6. On the Completing the New Site and Content Rule Wizard page, review your choices, and then click Finish.

Page 79: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Disabling and Deleting Site and Content Rules

You can disable site and content rules that you are not using. To disable a site and content rule, in the details pane, click the rule, and then on the Action menu, click Disable. To re-enable a rule, click the rule, and then on the Action menu, click Enable. To permanently remove a rule, click the rule, and then click Delete a Site and Content Rule.

Page 80: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Using Content Groups in Site and Content Rules

You cannot add a content type to a site and content rule by using the New Site and Content Rule Wizard.

To add a content group to an existing rule:

1. In ISA Management, in the detail pane, click the site and content rule that you want to configure, and then click Configure a Site and Content Rule.

2. In the Properties dialog box for the rule, on the HTTP Content tab, click Selected content groups, select one or more check boxes for the applicable content groups, and then click OK.

Page 81: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Configuring Bandwidth Rules

Bandwidth Rules Overview

Creating Bandwidth Rules

Page 82: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Bandwidth rules determine how ISA Server treats client requests when your network is congested. ISA Server applies bandwidth rules only when there is insufficient bandwidth for all user requests. ISA Server allocates all available bandwidth according to the bandwidth rules that you define.

Note: Before you create bandwidth rules, consider the impact on the system resources of the ISA Server computer. Establishing connections to which a bandwidth rule applies incurs additional processing overhead.

Page 83: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

In this lesson you will learn about the following topics:

Bandwidth rules overview

Creating bandwidth rules

Page 84: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Bandwidth Rules Overview

Network Allocation

User Allocation

Unused Priorities

Rule Order

Default Rule

Priority APriority A

Priority BPriority B

Page 85: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

You use bandwidth rules to assign a priority to different types of network traffic. ISA Server allocates bandwidth as follows:

Page 86: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Network allocation. ISA Server allocates available bandwidth proportionally to the bandwidth priorities that apply to current network traffic. For example, you assign bandwidth priority A to network traffic from managers, and priority A is 30. You assign bandwidth priority B to requests from employees, and priority B is 20. When both employees and managers connect to the Internet, ISA Server allocates 60 percent of available bandwidth to traffic with priority A and 40 percent of available bandwidth to traffic with priority B.

Page 87: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

User allocation. All users who are assigned a priority share the bandwidth that ISA Server allocates to that priority. For example, if your bandwidth priorities result in 60 percent of available bandwidth being allocated to managers, all managers share this portion of bandwidth.

Page 88: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Unused priorities. When bandwidth that is allocated to a priority is not used, ISA Server dynamically allocates the unused bandwidth to a higher priority. For example, if employees do not use the bandwidth that ISA Server allocates to them, ISA Server makes the unused bandwidth available to managers.

Page 89: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Rule order. ISA Server processes bandwidth rules in order. If a request matches the conditions specified by a bandwidth rule, ISA Server applies the bandwidth rule to the request. If the request does not match the conditions specified by the bandwidth rule, ISA Server processes the next bandwidth rule.

Page 90: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Default rule. If no other bandwidth rule applies to the request, ISA Server applies the default rule. ISA Server always applies the default rule last. The default rule assigns the default bandwidth priority. By default the default bandwidth is 100 for inbound and outbound traffic. You can change the numbers used by default bandwidth priority.

Page 91: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Default scheduling priority. Instead of using a bandwidth priority when you create a bandwidth rule you can also assessing the operating system's default scheduling priority. The default scheduling priority guarantees a minimum bandwidth, which is always much lower than the bandwidth allocated to a request with a specified bandwidth priority.

Page 92: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Creating Bandwidth Rules

Name the Rule

Select the Protocol(s)

Select a Schedule

Select a Client Type

Select a Destination Type

Select a Content Group

Select Bandwidth Priority

StartStartStartStart

FinishFinishFinishFinish

Page 93: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

You must configure effective bandwidth before you create bandwidth rules.

Online Demo

Page 94: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Configuring Effective Bandwidth

Before you create bandwidth rules, you must configure your effective bandwidth. ISA Server uses the effective bandwidth to determine when network congestion occurs. Set the effective bandwidth to match the slowest network connection. For example, if your internal network operates at 100 megabits per second (Mbps) and your dial-up connection to the Internet operates at 56 kilobits per second (Kbps), the effective bandwidth is 56 Kbps.

Page 95: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

To configure your effective bandwidth:

1. In ISA Management, in the console tree, right-click Bandwidth Rules, and then click Properties.

2. In the Bandwidth Rules Properties dialog box, select the Enable bandwidth Control check box, type the effective bandwidth in Kbps, and then click OK.

Page 96: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Creating a New Bandwidth Rule

To create a new bandwidth rule:

1. In ISA Management, in the console tree, right-click Bandwidth Rules, point to New, and then click Rule.

2. In the New Bandwidth Rule Wizard, in the Bandwidth rule name box, type a name for the bandwidth rule, and then click Next.

Page 97: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

3. On the Protocols page, click one of the following options, and then click Next.

If you select Then

All IP traffic No further action is required.

Selected protocols Select the check boxes for all protocols to which the rule will apply.

All IP traffic except selected

Select the check boxes for all protocols to which the rule will not apply.

Page 98: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

4. On the Schedule page, select a schedule, and then click Next.

5. On the Client Type page, click one of the following options, and then click Next.

If you select Then

Any request No further action is required.

Specific computers (client address sets)

On the Client Sets page, click Add to add client sets.

Specific users and groups

On the Users and Groups page, click Add to add users and groups.

Page 99: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

6. On the Destination Sets page, click one of the following options, and then click Next.

If you select Then

All destinations No further action is required.

All internal destinations No further action is required.

All external destinations No further action is required.

Specified destinations Select a destination set.

All destinations except selected set

Select a destination set.

Page 100: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

7. On the Content Groups page, select one or more content groups, and then click Next.

8. On the Bandwidth Priority page, click one of the following options, and then click Next.

If you want to specify Then

The default Windows 2000 scheduling priority

Click Use default scheduling priority.

A previously configured bandwidth priority

Click Custom.

Page 101: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

9. On the Completing the New Bandwidth Rule Wizard page, review your choices, and then click Finish.

Page 102: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Disabling and Deleting Bandwidth Rules

You can disable bandwidth rules that you are not using. To disable a bandwidth rule, click the rule, and then on the Action menu, click Disable. To re-enable a rule, click the rule, and then on the Action menu, click Enable. To permanently remove a rule, click the rule, and then on the Action menu, click Delete.

Page 103: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Using ISA Server Authentication

Authentication Overview

Configuring Authentication for Outgoing Web Requests

Selecting Authentication Methods

Configuring Authentication Methods

Page 104: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

How you configure authentication for ISA Server depends on the type of client. Requiring authentication for all Web Proxy clients allows you to configure access rules that are based on users and group membership. It also allows you to include information about user Web activity in ISA Server logs. ISA Server supports several authentication methods to meet the requirements of your organization. You can also select more than one method of authentication, if necessary.

Page 105: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

In this lesson you will learn about the following topics:

Authentication overview

Configuring authentication for outgoing web requests

Selecting authentication methods

Configuring authentication methods

Page 106: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Authentication Overview

InternetInternet

ISA ServerISA Server

SecureNAT ClientNo user-based authentication.

SecureNAT ClientNo user-based authentication.

Firewall ClientAuthentication is based on client credentials.

Firewall ClientAuthentication is based on client credentials.

Web Proxy ClientAuthentication is dependent on

browser and operating environment.

Web Proxy ClientAuthentication is dependent on

browser and operating environment.

Page 107: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

ISA Server authentication is separate from the authentication that may be required for a Web site or other Internet resource. ISA Server requires authentication to process rules that control access based on only a user's identity. The administrator of the Web site determines the level of access, if any, that a user may have to that site.

Page 108: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

The ISA Server authentication that you use depends on the type of client:

Page 109: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

SecureNAT clients. For SecureNAT clients, there is no user-based authentication. You can restrict access to the Internet based on only sites, content, IP address of the client computer, protocol, and time of day.

Page 110: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Firewall clients. When ISA Server authenticates a Firewall client, it uses the credentials of the user making the request on the computer running the Firewall client. Because Firewall client authentication is automatic, no configuration is required to enable authentication of users who gain access to ISA Server by using a Firewall client.

Note: By default, the Firewall service passes all HTTP and FTP requests from Firewall clients to the Web Proxy service, but it does not forward client authentication information. To ensure proper authentication of Web requests from Firewall clients, configure Web browsers as Web Proxy clients on computers that run the Firewall client.

Page 111: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Web Proxy clients. Web Proxy clients do not automatically send authentication information to ISA Server. By default, ISA Server requests credentials from a Web Proxy client to identify a user only when processing a rule. You can configure which method the client and ISA Server use for authentication. When configuring authentication for Web Proxy clients, you must consider both the Web browser and the networking environment. You can also configure ISA Server to require authentication for all Web requests so that ISA Server can log information about which user connects to which Web site.

Page 112: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Configuring Authentication for Outgoing Web Requests

LONDON Array Properties

GeneralIncoming Web Requests Security

OK Cancel

Add…Add…

Apply

Performance

Enable SSL listeners

TCP port: 8080

SSL port: 8443

Connections

Outgoing Web RequestsAuto Discovery

IdentificationUse the same listener configuration for all internal IP addresses.

Configure listeners individually per IP address

Server IP Address Display N… Authentic… Server C…LONDON <All internal Integrated

RemoveRemove Edit…

Configure…Connection settings:

Ask unauthenticated users for identification

Page 113: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

When you configure authentication, ISA Server verifies the identity of the user before processing a Web request that originates from a Web Proxy client. By default, Web Proxy clients use anonymous connections to connect to ISA Server. ISA Server requests user credentials from Web Proxy clients only when it is required, such as when a rule allows only specific users to gain access to a Web site.

You can configure ISA Server to request authentication for all Web requests from Web Proxy clients. Requiring authentication for all requests ensures that ISA Server can log information about the Web sites to which users gain access. However, when you require authentication, you must ensure that all Web Proxy clients can send authentication information.

Page 114: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

To configure authentication for outgoing Web requests:

1. In ISA Management, in the console tree, right-click the appropriate server or array, and then click Properties.

2. On the Outgoing Web Requests tab, select the Ask unauthenticated users for identification check box, and then click OK.

Page 115: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Important: Require ISA Server to ask unauthorized users for identification. If your rules allow all users access to one or more Web sites but deny specific users access to the same Web site, you must configure ISA Server to require authentication for users. If any of your rules allow the Anonymous user access to a Web site, a user may be granted access to the site even though there is a rule that denies access specifically to that user. This is because a Web browser first attempts an anonymous connection, which may be granted by a rule that allows all users access. Requiring authentication ensures that users can never establish an anonymous connection. For more information, see "Rules and authentication" in ISA Server Help.

Page 116: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Selecting Authentication Methods

Basic Authentication

Digest Authentication

Integrated Windows Authentication

Client Certificate Authentication

Page 117: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

ISA Server authentication establishes the identity of the user who issues a request from a Web Proxy client. After ISA Server has established the user's identity, it can apply rules that are based on the user's identity and log which user issues which Web requests. ISA Server supports four methods of authentication. The authentication method that you choose depends on your computing environment and your security requirements. You can configure ISA Server to use one or more authentication methods. When you specify multiple methods, ISA Server and the Web Proxy client negotiate the most secure method that both can use. ISA Server supports the following methods of authentication:

Page 118: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Basic authentication. Prompts users for a user name and password before allowing Web access. Basic authentication sends and receives user information as plain text and does not use encryption. Basic authentication is the least secure authentication method that ISA Server supports. Because basic authentication is part of the HTTP specification, most browsers support it.

Important: Because a malicious user on your internal network could capture network packets that contain user names and passwords, evaluate whether you require authentication before using Basic authentication.

Page 119: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Digest authentication. Passes authentication credentials through a process called hashing. Hashing creates a string of characters based on the password but does not send the actual password across the network, ensuring that no one can capture a network packet containing the password and impersonate the user. Digest authentication currently works only in a domain in which all of the domain controllers are running Windows 2000 and users are using Microsoft Internet Explorer 5 or later, and it is also supported by HTTP 1.1 compliant Web browsers. Use Digest authentication for authentication when you need to connect to ISA Server across a third-party firewall or a third-party proxy server.

Page 120: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Integrated Windows authentication. Uses either the Kerberos V5 authentication protocol or the Windows challenge/response authentication protocol, which do not send the user name and password across the network. Integrated Windows authentication works with Internet Explorer 2.0 or later. Use Integrated Windows authentication when all of the client computers use Internet Explorer.

Page 121: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Client certificate authentication. Requests a client certificate from the client before allowing the request to be processed. Users obtain client certificates from a certification authority that can be internal to your organization or a trusted external organization. Client certificates usually contain identifying information about the user and the organization that issued the client certificate. Use client certificate authentication when your organization requires certificates for user authentication.

Important: When selecting an authentication method, ensure that all client Web browsers can use at least one of the selected authentication methods. Otherwise, users will not be able to gain access to external Web sites.

Page 122: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Configuring Authentication MethodsLONDON Array Properties

GeneralIncoming Web Requests Security

OK Cancel

Add…Add…

Apply

Performance

Enable SSL listeners

TCP port: 8080

SSL port: 8443

Connections

Outgoing Web RequestsAuto Discovery

IdentificationUse the same listener configuration for all internal IP addresses.

Configure listeners individually per IP address

Server IP Address Display N… Authentic… Server C…LONDON <All internal Integrated

RemoveRemove Edit…

Configure…Connection settings:

Ask unauthenticated users for identification

CancelOK

Server: LONDON

IP Address: <All internal IP addresses>

Display Name:

Use a server certificate to authenticate to web clients

Select…Select…

AuthenticationBasic with this domain:

Digest with this domain:

Integrated

Client certificate (secure channel only)

Select domain…

Select domain…Select domain…Select domain…Select domain…

Add/Edit Listeners

Page 123: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

When you configure authentication methods for outgoing Web requests, you define the authentication method that ISA Server uses for requests that arrive on a single internal network adapter or all of the internal network adapters. ISA Server calls these configuration settings listeners. You can also configure the port that ISA Server uses to listen for client requests.

Page 124: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

To configure authentication methods for outgoing Web requests:

1. In ISA Management, in the console tree, right-click the appropriate server or array, and then click Properties.

2. On the Outgoing Web Requests tab, select one of the following options:

To configure authentication methods that are

Then

The same for all IP addresses associated with internal network adapter

Select the appropriate server, click Use the same listener configuration for all IP addresses, and then click Edit.

Different for IP addresses associated with internal network adapter

Click Configure listeners individually per IP address, and then click Add.

Page 125: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

3. In the Add/Edit Listeners dialog box, in the Server list, click the computer for which you are configuring the listener, and then in the IP address list, select the IP address that is associated with the network interface on the internal network that should listen for outgoing Web requests.

4. Under Authentication, select the check boxes for one or more of the following authentication methods, and then click OK twice:

Basic with this domain. If you choose this option, you must also click Edit, and then in the Select Domain dialog box, select the domain in which the user accounts that you use for authentication are located.

Digest

Integrated

Client certificate (secure channel only)

Page 126: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

5. In the ISA Server Warning dialog box, click Save the changes and restart the service(s), and then click OK. If you want to restart the service later (for example, if there are current user connections), click Save the changes, but don't restart the service(s), click OK, and then manually stop and start the Web Proxy service later.

Page 127: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Changing the Listener Port

By default, ISA Server listens for requests from Web Proxy clients on port 8080. If Web Proxy clients are configured to use a different port, you can change the port that ISA Server uses to listen for client requests.

Page 128: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

To change the listening port, in the Properties dialog box for the ISA Server computer, in the TCP box, type the port number on which ISA Server will listen for Web Proxy requests.

Note: You can also configure ISA Server to encrypt communications with Web Proxy clients. This configuration may be required in a high-security environment in which all communication between the Web Proxy client and the ISA Server must be secured. For information about how to enable Secure Sockets Layer (SSL) listeners to provide a secure channel between client computers and the ISA Server computer, see "Configuring outgoing Web request properties" in ISA Server Help.

Page 129: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Lab A: Enabling Secure Internet Access

Page 130: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Objectives

After completing this lab, you will be able to:

Create policy elements.

Configure access polices and rules.

Configure authentication for outgoing Web requests.

Page 131: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Prerequisites

Before working on this lab, you must have:

Experience using ISA Management.

Knowledge of ISA Server policy elements and rules.

Knowledge of ISA Server authentication methods.

Page 132: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Lab Setup

This lab environment includes the following resources:

A computer running Microsoft Windows 2000 Advanced Server with ISA Server installed.

A computer running Windows 2000 Advanced Server that is configured as a Firewall client and a Web Proxy client and that has ISA Management installed.

Page 133: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Exercise 1: Creating Policy Elements

In this exercise, you will create the policy elements that are required to implement your security policy.

Page 134: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Scenario

You must implement an Internet access policy for Northwind Traders. Before you can create the required rules, you must create the policy elements that you will use to create these rules.

Page 135: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

These policy elements are:

A schedule that includes periods of high network utilization, which is the current time until two hours from now.

A destination set that includes the Web site www.contoso.msft/sports.

A client address set for the Accounting department.

A protocol definition for the line-of-business application.

A content group for the .bild file type.

A bandwidth priority definition for high priority traffic.

Online Simulation

Page 136: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Exercise 2: Creating Protocol Rules

Scenario

After the policy elements are created to implement the access policy for Northwind Traders, the protocol rules required to enforce this policy must be created.

Page 137: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

These protocol rules are:

A protocol rule that allows all users to gain access to the Internet by using the HTTP, HTTP-S, and FTP protocols.

A protocol rule that allows members of the Domain Admins group to gain access to the Internet by using all protocols.

A protocol rule that allows access to the line-of-business application.

A protocol rule that denies all Internet access from the Accounting department.

Online Demo

Page 138: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Exercise 3: Creating Site and Content Rules

In this exercise, site and content rules will be created.

Page 139: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Scenario

Northwind Traders's access policy requires that rules be set that restrict access based on specific content. To accomplish this task, site and content rules must be created.

The site and content rules are:

A site and content rule that denies access to the Web site www.contoso.msft/sports during periods of high network usage.

A site and content rule that denies access to files that have a .bild extension.

Online Demo

Page 140: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Exercise 4: Configuring Authentication

In this exercise, authentication settings for ISA Server will be created.

Page 141: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Scenario

User-level authentication must be configured for all users in a network, regardless of which Web browser they use. To do this, an ISA Server must be configured to use Basic Authentication. After confirming that Basic Authentication works, an ISA Server must be configured to use Integrated Authentication in addition to Basic Authentication.

Online Demo

Page 142: Module 3: Enabling Secure Internet Access. Overview Access Policies and Rules Overview Creating Policy Elements Configuring Access Policies and Rules

Review

Access Policies and Rules Overview

Creating Policy Elements

Configuring Access Policies and Rules

Configuring Bandwidth Rules

Using ISA Server Authentication