Presentation is loading. Please wait.

Presentation is loading. Please wait.

How to create DNS rule that allow internal network clients DNS access Right click on Firewall Policy ->New- >Access Rule Right click on Firewall.

Similar presentations


Presentation on theme: "How to create DNS rule that allow internal network clients DNS access Right click on Firewall Policy ->New- >Access Rule Right click on Firewall."— Presentation transcript:

1

2

3

4

5

6

7 How to create DNS rule that allow internal network clients DNS access Right click on Firewall Policy ->New- >Access Rule Right click on Firewall Policy ->New- >Access Rule In the welcome to the new access rule wizard page, enter DNS from Internal Network in the access policy rule name text box-> next In the welcome to the new access rule wizard page, enter DNS from Internal Network in the access policy rule name text box-> next On the protocol page, selected protocols option, and click next On the protocol page, selected protocols option, and click next

8

9

10

11 Configure HTTP Policy Configure HTTP Policy To control over what users can access via HTTP protocol To control over what users can access via HTTP protocol To prevent access to windows executable files To prevent access to windows executable files

12

13 Put check

14

15 Advantages 1. Windows Integration Microsoft Active Directory. Microsoft Active Directory. Scalable and centralized administration of Windows Users and Groups, ISA Access Policies, and ISA Server Configuration information. Networking and Security Features. Networking and Security Features. Take advantage of Windows networking features such as: - VPN (Virtual Private Networking) - QOS (Quality of Service) Windows Technologies and Windows-based Applications. Windows Technologies and Windows-based Applications. - Authentication - Event logs - Microsoft Management Console (MMC) administration tool.

16 Cont. 2. Integrated Firewall and Web Cache Management Unified Policy and Access Control. Unified Policy and Access Control. ISA Server manages Internet access consistently with access control policies, and access restrictions placed on the firewall are applied to the Web cache server as well. Unified Management. Unified Management. Administrators use a single management interface for both firewall and Web caching. The firewall and Web cache share the same logging, reporting, and alerting services of ISA Server.

17 Cont. 3. Scaling Up and Scaling Out for the Enterprise Tiered Policy Management. Tiered Policy Management. Provides tiered policies that allow servers to have local array policies while inheriting enterprise-wide policies. Scale Up Performance. Scale Up Performance. ISA utilizes the extra processing power to boost performance. (ISA Server Standard Edition supports a maximum of four processors). Scale Out Performance. Scale Out Performance. P rovide fault-tolerance, high availability, efficiency, and performance through clustering of multiple ISA Server machines.

18 Cont. 4. Lower Cost of Ownership Integrated Services. Integrated Services. Integrates services such as firewall, Web cache, basic Integrates services such as firewall, Web cache, basic intrusion detection, reporting, VPN, and bandwidth intrusion detection, reporting, VPN, and bandwidth management into a single product. management into a single product. Leverage Existing Windows Skills/ Works with What You Have. Leverage Existing Windows Skills/ Works with What You Have. Rather than learning a new user interface (UI) or tool set, administrators can leverage their current Windows knowledge and skills and focus on security issues and policy definition Allowing administrators to work with their existing computing platforms.

19 EXAMPLE ISA Server provides with some helpful capabilities that allow the user to easily monitor ISA Server and client usage; it protects the network from intruders and content that is not allowed. ISA Server provides with some helpful capabilities that allow the user to easily monitor ISA Server and client usage; it protects the network from intruders and content that is not allowed.

20 Testimonial American Red Cross (Atlanta, GA) American Red Cross (Atlanta, GA) "The ease of setting up rules from Site and Content to Protocol Rules the product is great. I am able to control access to specific web sites and redirect as needed.“ City of Lakeland ( Lakeland, FL) City of Lakeland ( Lakeland, FL) "Upgraded from Proxy [Server] 2.0...Firewall—Very flexible, powerful, and secure. Memory caching—very fast.“ Capital Access Network, Inc (Kennesaw, GA) Capital Access Network, Inc (Kennesaw, GA) "We needed a reliable firewall/VPN product at a reasonable price for a small business...[ISA Server ]Basically delivers high-priced firewall performance at a competitive cost.“ http://www.microsoft.com/isaserver/evaluation/testimonial/testimonials.asp

21 Features Enterprise Firewall Security Enterprise Firewall Security Web Caching Server Web Caching Server Intuitive Firewall Management Intuitive Firewall Management Extensible Platform Extensible Platform

22 Enterprise Firewall Security Multilayered Firewall Security Multilayered Firewall Security Stateful Inspection Stateful Inspection Smart Application Filtering Smart Application Filtering Secure Server Publishing Secure Server Publishing Intrusion Detection Intrusion Detection Integrated Virtual Private Networking Integrated Virtual Private Networking Firewall Transparency Firewall Transparency Strong User Authentication Strong User Authentication SSL-to-SSL Bridging SSL-to-SSL Bridging

23 Web Caching Server High-Performance Web Caching High-Performance Web Caching Intelligent Caching Intelligent Caching Scheduled Caching Scheduled Caching

24 Intuitive Firewall Management Policy-Based Access Control Policy-Based Access Control Simplified Management Simplified Management Active Directory Integration Active Directory Integration Graphical Task pads and Configuration Wizards Graphical Task pads and Configuration Wizards Remote Management Remote Management Logging, Reporting, and Alerting Logging, Reporting, and Alerting User-Level Management User-Level Management

25 Extensible Platform Broad Application Support Broad Application Support Broad Vendor Support Broad Vendor Support Extensive SDK Extensive SDK


Download ppt "How to create DNS rule that allow internal network clients DNS access Right click on Firewall Policy ->New- >Access Rule Right click on Firewall."

Similar presentations


Ads by Google