Module 13: Implementing ISA Server 2004 Enterprise Edition: Site-to-Site VPN Scenario.

Slides:



Advertisements
Similar presentations
Configuring and Troubleshooting Network Connections
Advertisements

Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
Module 5: Configuring Access to Internal Resources.
Module 5: Configuring Access for Remote Clients and Networks.
Module 9: Configuring ISA Server for the Enterprise
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Module 10: Configuring Virtual Private Network Access for Remote Clients and Networks.
Module 8: Concepts of a Network Load Balancing Cluster
Lesson 17 – UNDERSTANDING OTHER NETWARE SERVICES.
Implementing ISA Server Caching. Caching Overview ISA Server supports caching as a way to improve the speed of retrieving information from the Internet.
Installing and Maintaining ISA Server. Planning an ISA Server Deployment Understand the current network infrastructure Review company security policies.
1 Enabling Secure Internet Access with ISA Server.
Windows Server 2008 Chapter 8 Last Update
Hands-On Microsoft Windows Server 2008 Chapter 8 Managing Windows Server 2008 Network Services.
Module 8 Configuring Mobile Computers and Remote Access in Windows 7.
VPN Scenarios © N. Ganesan, Ph.D.. Chapter Objectives.
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Course 201 – Administration, Content Inspection and SSL VPN
Implementing Dynamic Host Configuration Protocol
1 ISA Server 2004 Installation & Configuration Overview By Nicholas Quinn.
Module 10: Designing an AD RMS Infrastructure in Windows Server 2008.
Design Windows Media Services Infrastructure. Module 7: Design Windows Media Services Infrastructure Design Windows Media Services for live streaming.
Configuring Routing and Remote Access(RRAS) and Wireless Networking
Module 13: Configuring Availability of Network Resources and Content.
Implementing Dynamic Host Configuration Protocol
Module 12: Designing an AD LDS Implementation. AD LDS Usage AD LDS is most commonly used as a solution to the following requirements: Providing an LDAP-based.
Module 13: Network Load Balancing Fundamentals. Server Availability and Scalability Overview Windows Network Load Balancing Configuring Windows Network.
Module 8: Configuring Virtual Private Network Access for Remote Clients and Networks.
Module 9: Planning Network Access. Overview Introducing Network Access Selecting Network Access Connection Methods Selecting a Remote Access Policy Strategy.
Internal NetworkExternal Network. Hub Internal NetworkExternal Network WS.
Securing Microsoft® Exchange Server 2010
Module 5: Planning a DNS Strategy. Overview Planning DNS Servers Planning a Namespace Planning Zones Planning Zone Replication and Delegation Integrating.
1 Chapter 6: Proxy Server in Internet and Intranet Designs Designs That Include Proxy Server Essential Proxy Server Design Concepts Data Protection in.
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
20411B 8: Installing, Configuring, and Troubleshooting the Network Policy Server Role Presentation: 60 minutes Lab: 60 minutes After completing this module,
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
Module 4: Configuring ISA Server as a Firewall. Overview Using ISA Server as a Firewall Examining Perimeter Networks and Templates Configuring System.
Module 4: Planning, Optimizing, and Troubleshooting DHCP
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
Module 1: Installing and Configuring Servers. Module Overview Installing Windows Server 2008 Managing Server Roles and Features Overview of the Server.
Module 11: Remote Access Fundamentals
Module 5: Designing a Terminal Services Infrastructure.
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
1 Chapter 7: NAT in Internet and Intranet Designs Designs That Include NAT Essential NAT Design Concepts Data Protection in NAT Designs NAT Design Optimization.
Module 5: Configuring Access for Remote Clients and Networks.
Module 11: Implementing ISA Server 2004 Enterprise Edition.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Overview of Microsoft ISA Server. Introducing ISA Server New Product—Proxy Server In 1996, Netscape had begun to sell a web proxy product, which optimized.
Module 5: Configuring Internet Explorer and Supporting Applications.
Module 8: Planning and Troubleshooting IPSec. Overview Understanding Default Policy Rules Planning an IPSec Deployment Troubleshooting IPSec Communications.
Module 8: Managing Terminal Services. Overview Use and manage Terminal Services RemoteApp programs Use and manage Terminal Services Gateway Optimize and.
Module 9: Implementing Caching. Overview Caching Overview Configuring General Cache Properties Configuring Cache Rules Configuring Content Download Jobs.
1 Installing and Maintaining ISA Server Planning an ISA Server Deployment Understand the current network infrastructure. Review company security.
Module 4 Planning for Group Policy. Module Overview Planning Group Policy Application Planning Group Policy Processing Planning the Management of Group.
Clustering Servers Chapter Seven. Exam Objectives in this Chapter:  Plan services for high availability Plan a high availability solution that uses clustering.
NetTech Solutions Common Connectivity Problems Lesson Eight.
Module 10: Windows Firewall and Caching Fundamentals.
Module 12: Implementing ISA Server 2004 Enterprise Edition: Back-to-Back Firewall Scenario.
1/11/2016Lecturer : Trần Thị Ngọc Hoa1 ISA Array  Introduction  Deployment.
Virtual Private Network Access for Remote Networks
Lab A: Planning an Installation
Module 3: Enabling Access to Internet Resources
Affinity Depending on the application and client requirements of your Network Load Balancing cluster, you can be required to select an Affinity setting.
Securing the Network Perimeter with ISA 2004
CIS 409Competitive Success/tutorialrank.com
CIS 409 Education for Service-- tutorialrank.com.
CIS 409 RANK Lessons in Excellence-- cis409rank.com.
CIS 409 RANK Education for Service-- cis409rank.com.
Unit 27: Network Operating Systems
Presentation transcript:

Module 13: Implementing ISA Server 2004 Enterprise Edition: Site-to-Site VPN Scenario

Overview Implementing a Site-to-Site VPN Scenario Lab: Implementing a Site-to-Site VPN Scenario

Lesson: Implementing a Site-to-Site VPN Scenario Issues in Deploying Site-to-Site VPNs Guidelines for Implementing Distributed Configuration Storage Servers Guidelines for Implementing Network Load Balancing for VPN Guidelines for Configuring ISA Server Clients Guidelines for Configuring Access Rules for Site-to-Site VPNs

Issues in Deploying Site-to-Site VPNs Common site-to-site VPN deployment issues include: Choosing a tunneling protocol Configuring the remote site VPN gateway server Configuring network rules and firewall access rules Choosing a tunneling protocol Configuring the remote site VPN gateway server Configuring network rules and firewall access rules ISA Server Enterprise Edition site-to-site deployment issues include: Creating a preliminary connection to install the remote Configuration Storage server Configuring Configuration Storage server replication between locations Implementing NLB for the site-to-site VPN Configuring firewall and Web proxy caching Creating a preliminary connection to install the remote Configuration Storage server Configuring Configuration Storage server replication between locations Implementing NLB for the site-to-site VPN Configuring firewall and Web proxy caching

Guidelines for Implementing Distributed Configuration Storage Servers To deploy the branch-office Configuration Storage server: Use a third-party VPN solution Use Routing and Remote Access Service Use a server publishing rule Use a temporary ISA Server enterprise Use an ISA Server backup file Use a third-party VPN solution Use Routing and Remote Access Service Use a server publishing rule Use a temporary ISA Server enterprise Use an ISA Server backup file To manage Configuration Storage server replication between office locations, use the ADAMSites tool to create ADAM sites and configure replication between sites

Guidelines for Implementing Network Load Balancing for VPN When you enable NLB for site-to-site VPNs: The connection owner for the VPN connection is automatically assigned with failover in the event of a server failure You must assign static IP addresses for VPN clients on each member of a multiple-server array You must configure the virtual IP address for the remote array as the VPN tunnel endpoint, and add all the dedicated IP addresses for the array members to the remote site network properties The connection owner for the VPN connection is automatically assigned with failover in the event of a server failure You must assign static IP addresses for VPN clients on each member of a multiple-server array You must configure the virtual IP address for the remote array as the VPN tunnel endpoint, and add all the dedicated IP addresses for the array members to the remote site network properties

Guidelines for Configuring ISA Server Clients When using ISA Server Enterprise Edition, Web Proxy and Firewall clients must connect to the array DNS name The DNS name is assigned when the array is configured, but can be modified The client must be able to resolve the array DNS name using DNS Configure a DNS host record using the array DNS name and each array members dedicated IP address if NLB is not enabled and the shared IP address if NLB is enabled The DNS name is assigned when the array is configured, but can be modified The client must be able to resolve the array DNS name using DNS Configure a DNS host record using the array DNS name and each array members dedicated IP address if NLB is not enabled and the shared IP address if NLB is enabled When configuring Web Proxy or Firewall client chaining, configure the downstream array to use the DNS name for the upstream array

Guidelines for Configuring Access Rules for Site-to-Site VPNs When configuring access rules for site-to-site VPNs, allow only required network traffic: Create computer sets to define specific computers that need access rather than using the entire network Configure access rules to allow only required protocols Use Web and server publishing rules Restrict access based on user sets Create computer sets to define specific computers that need access rather than using the entire network Configure access rules to allow only required protocols Use Web and server publishing rules Restrict access based on user sets When deploying main site domain members or members of a trusted domain in the remote site, you must enable the required protocols between the domain controllers, or between the domain members and domain controllers

Lab 13: Implementing a Site-to-Site VPN Scenario Exercise 1: Enabling NLB and CARP for the Main\Front-End Array Host1 Host2 Den-DC-01 Den-ISAEE-02 Den-ISAEE-01 Den-CSS-01 RO-ISAEE-01 Den-Web-01 Den-Clt-01 Exercise 2: Configuring the Main Office Array for a Site-to-Site VPN Exercise 3: Deploying a ISA Server Remote Site Exercise 4: Configure the Branch Office Array for a Site-to-Site VPN

Course Evaluation