Download presentation
Presentation is loading. Please wait.
1
Introduction to ISA 2004 Dana Epp Microsoft Security MVP
3
Who am I?
4
Microsoft Windows Security MVP
5
Information Security Professional
6
Computer Security Software Architect
7
Small Business Owner
8
What do I know about firewalls?
9
I’ve written firewall code
11
I’ve deployed firewalls (big and small)
15
100’s of small businesses Many different verticals Manufacturing Medical Professional Services Educational Financial etc
16
I’ve invented new firewalls
18
I know a bit about them.
19
caching Content filtering applicatio n publishing advanced application layer firewall caching content filtering application publishing advanced application layer firewall / vpn ISA Server 2004
20
What’s the difference between ISA and other SMB firewalls?
21
Simple Ingress Filtering Simple Egress Filtering Complex Ingress Filtering Complex Egress Filtering Application Content Filtering Virtual Private Networking Web Caching Microsoft ISA 2004 NAT Device Typical Hardware Firewall Some have limited VPN AD Authentication Advanced Hardware Firewall Rarely available Differences in SMB Firewalls
22
Patch management issues for the firewall
23
What’s the important difference?
24
A traditional firewall’s view of a packet Application Layer Content ?????????????????????? Only packet headers are inspected –Application layer content appears as “black box” IP Header Source Address, Dest. Address, TTL, Checksum TCP Header Sequence Number Source Port, Destination Port, Checksum Forwarding decisions based on port numbers –Legitimate traffic and application layer attacks use identical ports Internet Expected HTTP Traffic Unexpected HTTP Traffic Attacks Non-HTTP Traffic Corporate Network
25
Problem. UFBP!
26
ISA Server’s view of a packet Packet headers and application content are inspected Application Layer Content MSNBC - MSNBC Front Page <link rel="stylesheet" IP Header Source Address, Dest. Address, TTL, Checksum TCP Header Sequence Number Source Port, Destination Port, Checksum Forwarding decisions based on content –Only legitimate and allowed traffic is processed Internet Expected HTTP Traffic Unexpected HTTP Traffic Attacks Non-HTTP Traffic Corporate Network
27
What’s new in ISA 2004?
28
Updated security architecture Advanced Protection Application layer security designed to protect Microsoft applications Deep content inspection Enhanced, customizable HTTP protocol filters Comprehensive and flexible policies Stateful routing for all IP protocols Enhanced Exchange Server Integration Support for Outlook RPC over HTTP Enhanced Outlook Web Access security Easy to use configuration wizards Fully integrated VPN Unified firewall -- VPN filtering Site-to-site IPsec Tunnel Mode support Network access quarantine Secure Internet Information Server and SPS SSL Bridging for IIS and SPS Easy to use Web publishing wizards AD, RADIUS, SecurID authentication
29
New management tools and UI Ease of Use Efficient and cost effective network security Multi-network architecture Unlimited network definitions and types Firewall policy applied to all traffic Per network routing relationships Network templates and wizards Wizard simplifies routing configuration Easy setup for common network topologies Easily customized for sophisticated scenarios Visual policy editor Firewall policy with single, ordered rule-base Drag and drop editing, scenario-driven wizards XML-based configuration import and export Enhanced trouble-shooting Monitoring dashboard Real-time log viewer Content sensitive task panes
30
Commitment to integration Fast, Secure Access Empowers you to connect users to relevant information on your network in a cost efficient manner Enhanced architecture High speed data transport Utilizes latest Windows and PC hardware High speed application filtering platform Web cache Updated policy rules Serve content locally Pre-fetch content during low activity periods Internet access control User- and group-based Web usage policy Extensible by third parties Comprehensive authentication New support for RADIUS and RSA SecurID User- and group-based access policy Third-party extensibility
31
Sample Scenarios
32
Scenario: Securely make email available to outside employees
33
Solution: Outlook over RPC, OMA, Virtual Private Networking
34
Scenario: Control Internet access and protect clients from malicious Internet traffic
35
Solution: Content filtering, scheduled access, firewall client
36
Scenario: Ensure fast access to the most frequently used web content
37
Solution: Web Proxy
38
Call to Action Give ISA 2004 a try Consider buying SBS Premium instead of SBS Standard. If managing hardware firewalls, CHECK FOR FIRMWARE UPDATES.
39
For more information: Amy’s ISA in SBS blog: http://isainsbs.blogspot.com ISA Server Resource site http://www.isaserver.org Dana’s security blog: http://silverstr.ufies.org Firewall Dashboard http://www.scorpionsoft.com Dana Epp Microsoft Security MVP
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.