Chapter 6. Deploying ISA Server Arrays with ISA Server 2004 Enterprise Edition
IN THIS CHAPTERUnderstanding ISA Server 2004 Enterprise EditionDeploying the Configuration Storage Server (CSS)Setting Up Enterprise Networks and PoliciesCreating and Configuring ArraysInstalling and Configuring ISA Enterprise ServersConfiguring Network Load Balancing and Cache Array Routing Protocol (CARP) SupportSummaryBest Practices
ISA Server 2004 is a remarkably adaptable, scalable system that provides for a variety of deployment scenarios for organizations of many sizes. The Standard version of ISA Server 2004, for example, can be deployed as an edge firewall, reverse-proxy server, content caching box, VPN server, or a combination of these roles. These capabilities satisfy the needs of many small to mid-sized organizations, but for those mid-sized to large organizations wanting to take advantage of those same features, Microsoft offers the Enterprise version of the software.The Enterprise version of ISA Server 2004 enables organizations to scale their ISA implementations outward, providing for redundancy through network load balancing and making it possible to create standardized security configurations. With the Enterprise Edition, all the capabilities of the Standard Edition are extended and made more manageable, enabling ISA to scale to deployments of multiple sizes.This chapter focuses on deployment scenarios involving the Enterprise version of ISA Server 2004. Differences between the Standard and Enterprise versions are discussed, and best practice design considerations for the Enterprise version are outlined. In addition, a step-by-step process for configuring a load-balanced ISA Server 2004 Enterprise environment are outlined.NOTEThe focus of this chapter is directly on those features of the Enterprise Edition that are different than the Standard, and that require different design and configuration. All other chapters in this book apply to the Standard Edition. The functionality in those chapters is the same as with the Enterprise Edition. Subsequently, if additional information on specific topics is desired, such as VPN support with the Enterprise Edition, the VPN chapters of this book should be referenced.