1 ISA Server 2004 Installation & Configuration Overview By Nicholas Quinn.
-
Upload
gwen-newton -
Category
Documents
-
view
217 -
download
1
Transcript of 1 ISA Server 2004 Installation & Configuration Overview By Nicholas Quinn.
1
ISA Server 2004ISA Server 2004
Installation & ConfigurationInstallation & Configuration
OverviewOverview
By Nicholas Quinn
2
This presentation will detail This presentation will detail the following 3 steps.the following 3 steps.
The Installation of ISA Server 2004The Installation of ISA Server 2004
The Configuration of an Allow PolicyThe Configuration of an Allow Policy
The Configuration of a Deny PolicyThe Configuration of a Deny Policy
3
Step 1 – Install ISA Step 1 – Install ISA ServerServer
4
Begin the InstallationBegin the Installation
Insert ISA CD and Insert ISA CD and double click ICON.double click ICON.
The Installation The Installation Wizard will openWizard will open
Agree to the Agree to the licensing licensing agreement agreement
Enter your Enter your Customer Customer InformationInformation
5
Select Setup TypeSelect Setup Type
Select to install a Select to install a Custom setupCustom setup
Select the Firewall Select the Firewall Client Installation Client Installation Share optionShare option
And Install this And Install this feature on the feature on the local hard drivelocal hard drive
6
Configure Internal NICConfigure Internal NIC
Click Add to Click Add to specify internal specify internal address rangesaddress ranges
Select Internal Select Internal under Network under Network AdapterAdapter
Click Select Click Select Network Adapter Network Adapter and choose the IP and choose the IP range requiredrange required
7
Finish InstallationFinish Installation
ISA’s Installation ISA’s Installation Wizard will now Wizard will now install your install your configurationconfiguration
ISA Server 2004 is ISA Server 2004 is now installednow installed
The Next Step is to The Next Step is to configure your configure your allow policyallow policy
8
Step 2 - Configure Allow Step 2 - Configure Allow PolicyPolicy
9
Enable ICMPEnable ICMP
Click on Firewall Click on Firewall PolicyPolicy
Click on Create New Click on Create New Access RuleAccess Rule
Find ICMP in the listFind ICMP in the list Make sure the Make sure the
Enable check box is Enable check box is selectedselected
Click on the Form Click on the Form tab tab
10
Add Internal NICAdd Internal NIC
Click the Add Click the Add button to add the button to add the Internal NIC Internal NIC
Expand NetworksExpand Networks Highlight the Highlight the
InternalInternal option and option and click Add click Add
Make sure you Make sure you click the Applyclick the Apply button button
11
Create the NetworkCreate the Network
Select the Select the Networks option Networks option from the listfrom the list
Click the NetworksClick the Networks tabtab
Highlight the Highlight the Internal option Internal option
Right Click and Right Click and select propertiesselect properties
12
Configure IP RangeConfigure IP Range
Click the Click the AddressesAddresses tabtab
Click the Remove Click the Remove button to remove button to remove any addresses any addresses
Click AddClick Add Select Internal Select Internal
Network AdapterNetwork Adapter
13
Apply IP Range Apply IP Range ConfigurationConfiguration
Your IP address Your IP address range will appear range will appear automatically automatically
If it is correct click If it is correct click the Apply tab the Apply tab
14
Setup Internet AccessSetup Internet Access
Click on the Web Click on the Web Chaining tabChaining tab
Click the Click the Create Create New Web Chaining New Web Chaining Rule option Rule option
Name the New Name the New WebWeb Chaining RuleChaining Rule
15
Select DestinationSelect Destination
On the Web On the Web Chaining Rule Chaining Rule DestinationDestination page page clickclick Add Add
Highlight External Highlight External and click Addand click Add
Click Next Click Next
16
Configure Proxy ServerConfigure Proxy Server
Select Redirect Select Redirect Requests to a Requests to a Specified Specified Upstream Server Upstream Server
Click NextClick Next
17
Configure Proxy ServerConfigure Proxy Server
Enter the IP Enter the IP address of the address of the server server
Change the Port Change the Port number to 80 number to 80 instead of 8080 instead of 8080
the SSL Portthe SSL Port number to 443 number to 443 instead of 8443 instead of 8443
18
Configure Backup ActionConfigure Backup Action
Select Ignore Select Ignore RequestRequest under the under the heading When the heading When the Primary Route is Primary Route is UnavailableUnavailable
Click FinishClick Finish Make sure you Make sure you
click the Applyclick the Apply buttonbutton
19
Firewall PolicyFirewall Policy
Expand icon next Expand icon next to the word Serverto the word Server
Select the Firewall Select the Firewall Policy option Policy option
Select the Create Select the Create New Access Rule New Access Rule
Enter a name for Enter a name for the rule the rule
Select AllowSelect Allow
20
Configure Access Rule Configure Access Rule SourceSource
Select All Select All Outbound Traffic Outbound Traffic click Nextclick Next
Click AddClick Add Expand NetworksExpand Networks Highlight Internal Highlight Internal
then click Addthen click Add Repeat the Repeat the
previous step and previous step and select External select External
21
Configure User SetsConfigure User Sets
Select all usersSelect all users Click NextClick Next Click FinishClick Finish Make sure you Make sure you
click the Applyclick the Apply buttonbutton
22
Step 3 – Deny PolicyStep 3 – Deny Policy
23
Configure IP AddressConfigure IP Address
Open Network Open Network Connections and Connections and PropertiesProperties
Configure the IP Configure the IP address and the address and the Subnet MaskSubnet Mask
The Preferred DNS The Preferred DNS Server must be the Server must be the IP address of the IP address of the Exchange Server Exchange Server
24
Connect to the DomainConnect to the Domain
Right click on My Right click on My Computer and select Computer and select Properties Properties
Click on the Click on the Computer Name tab Computer Name tab
Click ChangeClick Change Enter Domain NameEnter Domain Name Change Primary DNS Change Primary DNS
to Domain nameto Domain name
25
Configure ISA ServerConfigure ISA Server
Open ISA ServerOpen ISA Server Select Firewall Select Firewall
PolicyPolicy Create New Access Create New Access
RuleRule Name the New Name the New
Access RuleAccess Rule Click DenyClick Deny
26
Select ProtocolSelect Protocol
Select the Selected Select the Selected Protocols option Protocols option
Expand the Expand the Common Protocols Common Protocols folderfolder
Highlight HTTPS Highlight HTTPS to block a webpage to block a webpage
Click Add Click Add Click Close Click Close
27
Configure Access Rule Configure Access Rule SourceSource
Add Network Add Network Entities Entities
Expand NetworksExpand Networks Highlight Internal Highlight Internal
and click Addand click Add Highlight Local Highlight Local
Host and click Add Host and click Add Click Close Click Close
28
Access Rule DestinationAccess Rule Destination
On the Access Rule On the Access Rule Destinations Destinations screen click Add screen click Add
Click New and Click New and Select URL Set Select URL Set
29
Configure URL SetConfigure URL Set
Enter the name of Enter the name of the website you the website you wish to block wish to block
Click NewClick New Enter the address Enter the address
of the website of the website Click Ok Click Ok
30
Add Network Entities Add Network Entities
Expand URL Sets Expand URL Sets Highlight Google Highlight Google Click AddClick Add Click Close Click Close
31
Create User SetCreate User Set
Highlight All Users Highlight All Users and click Remove and click Remove
Click Add Click Add On the URL Sets On the URL Sets
screen click New screen click New Name the User Set Name the User Set Click Next Click Next
32
Add Users Sets to BlockAdd Users Sets to Block
On the Users screen On the Users screen click Add and Select click Add and Select Windows User and Windows User and Groups Groups
Click Locations Click Locations Enter the Enter the
Administrator Administrator account User Name account User Name and Password and Password
33
Find Users to BlockFind Users to Block
Expand Entire Expand Entire Directory Directory
Expand the domain Expand the domain that the users are that the users are in in
Select the required Select the required organisationalorganisational unit unit
Click Ok Click Ok
34
Select Users to BlockSelect Users to Block
Enter the user Enter the user name you wish to name you wish to blockblock
Click Check Names Click Check Names The full name The full name
should appear should appear Click Ok Click Ok Check informationCheck information Click OkClick Ok
35
Add User SetAdd User Set
On the Add Users On the Add Users screen highlight screen highlight the group you have the group you have created and click created and click Add Add
Click Next Click Next Click FinishClick Finish Make sure you Make sure you
click the Applyclick the Apply button button