ISA Server 2004 Introduction Владимир Александров MCT, MCSE, MCSD, MCDBA Корус, Управител

Slides:



Advertisements
Similar presentations
Faith Allington Program Manager Microsoft Corporation WSV322.
Advertisements

Microsoft Internet Security and Acceleration (ISA) Server 2004 Technical Overview
Remote Desktop Services
Guide to Network Defense and Countermeasures Second Edition
Module 5: Configuring Access to Internal Resources.
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Introduction to ISA 2004 Dana Epp Microsoft Security MVP.
Firewall Configuration Strategies
Secure Messaging Nick Hall & James Clifford Microsoft.
Dan Stolts IT Pro Evangelist US DPE - North East Microsoft Corporation
Access Controls Supervised by: Dr.Lo’ai Tawalbeh Prepared by: Abeer Saif.
Microsoft Internet Security & Acceleration Server Dave Sayers Technical Specialist Microsoft UK.
Threat Management Gateway 2010 Questo sconosciuto? …ancora per poco! Manuela Polcaro Security Advisor.
ISA Server Microsoft’s Goals Security is a top priority for Microsoft, and we are committed to helping our customers protect their intellectual.
Lesson 19: Configuring Windows Firewall
Chapter 11: Dial-Up Connectivity in Remote Access Designs
Appliance Firewalls A Technology Review By: Brent Huston T h e B l a c k H a t B r i e f i n g s July 7-8, 1999 Las Vegas.
Winter Consolidated Server Deployment Guide for Hosted Messaging and Collaboration version 3.5 Philippe Maurent Principal Consultant Microsoft.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
1 Advanced Application and Web Filtering. 2 Common security attacks Finding a way into the network Exploiting software bugs, buffer overflows Denial of.
Security of Communication & IT systems Bucharest, 21 st September 2004 Stephen McGibbon Chief Technology Officer, Eastern Europe, Russia & CIS Senior Director,
Module 8: Configuring Virtual Private Network Access for Remote Clients and Networks.
Internal NetworkExternal Network. Hub Internal NetworkExternal Network WS.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
1 Chapter 6: Proxy Server in Internet and Intranet Designs Designs That Include Proxy Server Essential Proxy Server Design Concepts Data Protection in.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
1 Overview of Microsoft ISA Server Introducing ISA Server Protects resourcesProtects resources Connects directly to the Internet and your private.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
Module 4: Configuring ISA Server as a Firewall. Overview Using ISA Server as a Firewall Examining Perimeter Networks and Templates Configuring System.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
Module 11: Remote Access Fundamentals
Windows Small Business Server 2003 Setting up and Connecting David Overton Partner Technical Specialist.
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
Module 11: Implementing ISA Server 2004 Enterprise Edition.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Overview of Microsoft ISA Server. Introducing ISA Server New Product—Proxy Server In 1996, Netscape had begun to sell a web proxy product, which optimized.
How to create DNS rule that allow internal network clients DNS access Right click on Firewall Policy ->New- >Access Rule Right click on Firewall.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Network Edge Protection: A Technical Deep-Dive into Internet Security & Acceleration Server
1 Implementing Monitoring and Reporting. 2 Why Should Implement Monitoring? One of the biggest complaints we hear about firewall products from almost.
Selling Strategies Microsoft Internet Security and Acceleration (ISA) Server 2004 Powerful Protection for Microsoft Applications.
TNT ISA Server 2004 Technical Overview What we will cover:  Improvements over ISA Server 2000  Exploring the new user interface  Configuring.
Microsoft ISA Server 2000 Presented by Ricardo Diaz Ryan Fansa.
Security fundamentals Topic 10 Securing the network perimeter.
Module 10: Windows Firewall and Caching Fundamentals.
Lesson 2a © 2005 Cisco Systems, Inc. All rights reserved. SNPA v4.0—2-1 Firewall Technologies and the Cisco Security Appliance.
SEC304 Enhancing Exchange, OWA and IIS Security with ISA Server Feature Pack 1 Steve Riley Microsoft Corporation
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
Securing the Network Perimeter with ISA Server 2004 Ravi Sankar IT Professional Evangelist Microsoft.
Microsoft ® Internet Security and Acceleration Server 2006 Beta Technical Overview Steve Lamb Information Security Evangelist
Securing Access to Data Using IPsec Josh Jones Cosc352.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Security fundamentals
6NPS Session 1 Introduction and Planning for Microsoft Forefront Threat Management Gateway (TMG)
Module 3: Enabling Access to Internet Resources
Top 5 Open Source Firewall Software for Linux User
Securing the Network Perimeter with ISA 2004
Forefront Security ISA
Threat Management Gateway
Configuring TMG as a Firewall
{ Security Technologies}
Implementing Client Security on Windows 2000 and Windows XP Level 150
Securing web applications Externally
Security Insights: Secure Messaging
Presentation transcript:

ISA Server 2004 Introduction Владимир Александров MCT, MCSE, MCSD, MCDBA Корус, Управител

Agenda Firewall evolution ISA2004 Overview More features drilldown Scenarios and demos

Firewall Evolution

Traditional Firewalls Wide open to advanced attacks Code Red, Nimda Code Red, Nimda SSL-based attacks SSL-based attacks Performance vs. security tradeoff Bandwidth too expensive Bandwidth too expensive Too many moving parts Too many moving parts Limited capacity for growth Not easily upgradeable Not easily upgradeable Don’t scale with business Don’t scale with business Hard to manage Security is complex Security is complex IT already overloaded IT already overloaded Problem Implications Implications

ISA2004 Overview

What is ISA2004 Full blown edge firewall Wide variety of firewall edge scenarios VPN, Proxy & Cache Very easy to use Easy installation & setup Easy policy configuration Reduced risk of configuration mistakes Advanced protection for MS applications Built in MS-specific filters Defense in Depth High performance Highly secure platform

Scenarios Edge Firewall Multi Networks DMZ Web Caching Secure Publishing Exchange Web servers Others Remote Access (VPN) Branch office Remote site security S2S VPN – Including IPSec (for interop) Integrated Solution Single edge security solution Easy Unified management

What’s new vs. ISA2000 ? Support for multiple networks New integrated single policy model Intuitive UI Application Layer Filtering improvements Logging & monitoring Integrated VPN Security Enhancements And more…

Multiple Networks

ISA 2000 networking model Internal Network Internet DMZ 1 Single “outbound” policy Single “outbound” policy “In” (LAT) and “out” (Internet, DMZ)“In” (LAT) and “out” (Internet, DMZ) ISA 2000 Static PF Only Static filtering from DMZ to InternetOnly Static filtering from DMZ to Internet

The new networking model Network A Internet DMZ 1 DMZ 2 Network B VPN Network Any number of networks Any number of networks Assigned relationships Assigned relationships Per network policy VPN represented as network ISA 2004 Isolation of the firewall host

Demo 1: Connecting networks

New Policy Model

ISA 2000 rules Basic ISA 2000 rules: Protocol rules Site and Content rules Static packet filters Publishing rules Web publishing rules Other filtering configuration Other ISA 2000 rules: Address translation rules Web routing rules Cache rules Configuration policy Firewall policy

ISA 2004 Policy Rules Single rule base Rules evaluated in order Support for multiple networks Integration with application filtering – part of rule System rules for built in policies Rich set of building blocks

User Interface

The User Interface Drag & Drop toolbox Task pane for common tasks Wizards Network templates Dashboard Policy Editor Toolbox Network Templates Task Bars MMC…On Steroids!

Application Layer Filtering

IP/Port filtering is not enough Hackers attack via application layer vulnerabilities (Nimda, Slammer...) HTTP - the carrier protocol Users need the ability to define a fine grain, application level security policies. Firewalls need to understand applications, beyond TCP/IP

ISA 2004’s application filtering Open platform for app layer filtering Built in filters for common protocols Scenario-driven design (protect Exchange, IIS) Rich partners community

Logging and Monitoring

ISA Server 2004 Monitoring Goals Server Status – It’s a critical service Troubleshooting – Quick and easy Investigations – Attacks, mistakes Future Planning – optimizing network performance

ISA 2004 Monitoring Tools Dashboard – centralized view Alerts – One place for all problems Sessions – Active sessions view Services – ISA services status Connectivity – Connectivity to network svcs Logging – Powerful viewer of ISA logs Reports – Top users, Top sites, Cache hits…

Dashboard

Logging

Reports

Security Enhancements

Engine Security Enhancements Session quota restrictions Restriction of user sessions (protection against Denial of Service attacks) IP options filtering Filter out individual options Lockdown mode Restrict firewall machine access on service failures Fail to most secure mode

And there’s more… Authentication improvements RADIUS OWA Form authentication Secure ID Integrated VPN IPSec tunnel mode for interoperability Quarantine support Full control over RRAS Performance Improvements Kernel and user mode improvements Web proxy improvements due to integration into the firewall

Demo 2: Secure publishing Publishing Internal Mail Server SMTPPOP3/IMAP4RPC Publishing Internal Exchange 2003 Server Publishing Outlook web access Publishing RPC over HTTP Publishing RPC interfaces (NtFrs etc.)

QuestionsQuestions

© 2003 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.