List of Figures
Chapter 1: Evolution of a Firewall: From Proxy 1.0 to ISA 2004Figure 1.1: Three Layers of Filtering with OSI NetworkingFigure 1.2: Distributed Caching Uses Multiple Servers at the Same Level of the Network.Figure 1.3: Hierarchical Caching Uses Multiple Web Proxy Servers at Different LevelsFigure 1.4: Hybrid Caching Combines Distributed and Hierarchical Caching MethodsFigure 1.5: Ring 1 represents the Internet edgeFigure 1.6: The Backbone EdgeFigure 1.7: The Asset Network EdgeFigure 1.8: Host-based Security RingChapter 2: Examining the ISA Server 2004 Feature Set
Figure 2.1: The ISA 2000 Interface - A Simple MMCFigure 2.2: The ISA Server 2004 Management GUI - A Handy Three-part Tabbed InterfaceFigure 2.3: The ISA Server 2003 Getting Started Guide - Installation Instructions and a Features Walk-throughFigure 2.4: Selecting the ISA Server Name - Left Pane Displays Getting Started PageFigure 2.5: The Dashboard - A Big Picture View of All Monitoring Areas at One GlanceFigure 2.6: The Alerts Tab Notifies You of Significant Events That Occur on the ISA ServerFigure 2.7: Using the Sessions Tab -View Information About Who Has Connected Through the ISA Server FirewallFigure 2.8: The Services Tab - Stop and Start ISA-related ServicesFigure 2.9: The Reports Tab - Generate Reports from the LogsFigure 2.10: The Connectivity Tab - Monitor Connectivity Status Between the ISA Server and a Specific Computer or URLFigure 2.11: The Logging Tab - Filter and Query Data in the ISA Log FilesFigure 2.12: Firewall Policy - Configure RulesFigure 2.13: New Access Wizard - Create New Access and Publishing RulesFigure 2.14: Virtual Private Networks Node to Configure VPNsFigure 2.15: The Networks Tab - Configure Networks, Network Sets, Network Rules and Web ChainingFigure 2.16: The Cache Subnode - Configure or Disable Caching on your ISA ServerFigure 2.17: The Add-ins Node - Configure Application and Web FiltersFigure 2.18: The General subnode is used for general administrative and advanced security tasksFigure 2.19: You can connect to multiple ISA Server firewalls simultaneously with the management consoleFigure 2.20: Use Connect To Dialog Box to Add Remote ISA Server to Management ConsoleFigure 2.21: Use System Policy Editor to Configure Remote Management ComputersFigure 2.22: Add A Computer, Address Range or Subnet to List of Remote Management ComputersFigure 2.23: With Terminal Services or the RDC Client, the ISA Servers Desktop Appears in the Desktop WindowFigure 2.24: Third-Party Vendors Provide Web Interfaces for ISA-based Firewall AppliancesFigure 2.25: ISA Server 2004 Makes it Easy to Create New Protocol DefinitionsFigure 2.26: ISA Server 2004 - Providing Great Flexibility in Defining Network ObjectsFigure 2.27: Changing the Order in which Access and Publishing Rules are ProcessedFigure 2.28: ISA 2004 Wizard for Publishing SSL Web SitesFigure 2.29: Cache Rules in ISA 2000Figure 2.30: Creating A Cache Rule in ISA Server 2004Figure 2.31: ISA Server 2004 - You can Select Not to Cache SSL ContentFigure 2.32: Monitor Logs in Real Time with ISA Server 2004Figure 2.33: The Sessions Feature - View All Active Connections Through the FirewallFigure 2.34: Configure Filters to Limit Query ResultsFigure 2.35: With ISA Server 2004, You Can Change the Time when the Log Summaries are GeneratedChapter 4: ISA 2004 Network Concepts and Preparing the Network Infrastructure
Figure 4.1: Ring 1: Internet EdgeFigure 4.2: Ring 2: The Backbone EdgeFigure 4.3: Ring 3 at the Asset Network EdgeFigure 4.4: Ring 4: Host-based SecurityFigure 4.5: Backbone and Asset NetworkFigure 4.6: DMZ Firewall SegmentFigure 4.7: Lab Network DetailsFigure 4.8: VMware Workstation WindowFigure 4.9: Guest Operating System PageFigure 4.10: Name the Virtual Machine PageFigure 4.11: Memory for the Virtual Machine PageFigure 4.12: Network Type PageFigure 4.13: Specify Disk Capacity PageFigure 4.14: Hardware Type PageFigure 4.15: The Hardware Type pageFigure 4.16: Selecting an .iso imageFigure 4.17: Starting the Virtual MachineFigure 4.18: Entering IP Addressing InformationFigure 4.19: Entering IP Addressing InformationFigure 4.20: Entering a WINS Server AddressFigure 4.21: Entering IP Addressing InformationFigure 4.22: ISA Firewall MultinetworkingFigure 4.23: Configuring a Web Proxy Listener on the Local Host NetworkFigure 4.24: Defining the Internal Network AddressesFigure 4.25: Adding Private Network AddressesFigure 4.26: Adding Addresses via the Routing TableFigure 4.27: Entering an Address RangeFigure 4.28: Entering Local DomainsFigure 4.29: Domain Extending Across Internal NetworksFigure 4.30: Configuring Domains for Web Proxy Direct AccessFigure 4.31: The Web Proxy tabFigure 4.32: Defining the Network TypeFigure 4.33: Selecting a Network AdapterFigure 4.34: The New Network Appears in the List of NetworksFigure 4.35: Defining a Route RelationshipFigure 4.36: Defining Network SetsFigure 4.37: Creating a New Network SetFigure 4.38: Creating a New Computer ObjectFigure 4.39: Creating a New Address Range Network ObjectFigure 4.40: Creating a new Subnet Network ObjectFigure 4.41: Creating a New Network Set Network ObjectFigure 4.42: Creating a new URL Set Network ObjectFigure 4.43: Creating a New Domain Name Set Network ObjectFigure 4.44: Viewing the New Domain Name SetFigure 4.45: Defining the IP addressesFigure 4.46: Selecting the Network AdapterFigure 4.47: Route Relationships in a Network behind a NetworkFigure 4.48: Network Diagram for Back Firewall TemplateFigure 4.49: Network Diagram for Edge Firewall TemplateFigure 4.50: Selecting a Firewall PolicyFigure 4.51: Defining the IP addressesFigure 4.52: Network Monitor Trace of DHCP ConversationFigure 4.53: Selecting the VPN protocolFigure 4.54: Back-end Network within a NetworkFigure 4.55: A SecureNAT Client Connecting to a Network within a NetworkFigure 4.56: Firewall Client Paths through Local and non-Local NetworksFigure 4.57: Log Files Showing Firewall Client and SecureNAT Client ConnectionsFigure 4.58: Using an Alternate Default Gateway Address for On Subnet HostsFigure 4.59: WebProxyChaining.vsdFigure 4.60: A Web-cached Array Configured for an OrganizationFigure 4.61: Configuring the Request ActionFigure 4.62: Routing to the Upstream Web ProxyFigure 4.63: Setting CredentialsChapter 5: ISA 2004 Client Types and Automating Client Provisioning
Figure 5.1: SecureNAT Simple Network ScenarioFigure 5.2: SecureNAT Complex Network ScenarioFigure 5.3: FTP Standard Mode Client/Server CommunicationsFigure 5.4: SecureNAT Loop BackFigure 5.5: A Split DNS Solves the SecureNAT ParadoxFigure 5.6: Firewall Name Resolution SequenceFigure 5.7: Firewall Client Connections to the ISA 2004 Firewall are Independent of the Default Gateway Configurations on Interposed RoutersFigure 5.8: Installing the Firewall Client Installation FilesFigure 5.9: Firewall Client IconFigure 5.10: The Internal Network Properties Dialog BoxFigure 5.11: The Domains TabFigure 5.12: The Domain Properties Dialog BoxFigure 5.13: The Firewall Client Configuration Dialog boxFigure 5.14: The Detecting ISA Server Dialog BoxFigure 5.15: The Detecting ISA Server Dialog BoxFigure 5.16: Firewall Client Packet TracesFigure 5.17: Firewall Client Configuration FilesFigure 5.18: The Define Firewall Client Settings linkFigure 5.19: The Firewall Client Settings Dialog BoxFigure 5.20: Apply Changes to Firewall ConfigurationFigure 5.21: The Authentication Dialog BoxFigure 5.22: The Authentication Dialog Box.Figure 5.23: The Add RADIUS Server Dialog Box.Figure 5.24: The Connections to other Access Servers Properties Dialog BoxFigure 5.25: Advanced SettingsFigure 5.26: Locating the Authorize CommandFigure 5.27: Configuring the DHCP Scope IP Address RangeFigure 5.28: Configuring the Default Domain Name for DHCP ClientsFigure 5.29: Viewing the Scope OptionsFigure 5.30: Selecting the Set Predefined Options CommandFigure 5.31: The Predefined Options and ValuesDialog BoxFigure 5.32: The Option Type Dialog BoxFigure 5.33: Predefined Options and Values Dialog BoxFigure 5.34: The Scope Options Dialog BoxFigure 5.35: Accessing the Internal Network Properties Dialog BoxFigure 5.36: Viewing the DHCPINFORM RequestFigure 5.37: Viewing the contents of the DHCPINFORM requestFigure 5.38: Viewing the WPAD DNS QueryFigure 5.39: Selecting the New Alias (CNAME) CommandFigure 5.40: The New Resource Record Dialog BoxFigure 5.41: New Resource Dialog BoxFigure 5.42: Viewing the DNS WPAD AliasFigure 5.43: The Identification Changes Dialog BoxFigure 5.44: The DNS Suffix and NetBIOS Computer Name Dialog BoxFigure 5.45: Viewing Scope OptionsFigure 5.46: DHCP client configurationFigure 5.47: Accessing the Internal Network Properties Dialog BoxFigure 5.48: Viewing DNS wpad Query RequestsFigure 5.49: Viewing the Details of a DNS wpad Query RequestFigure 5.50: Internal Properties Dialog Box.Figure 5.51: Web Browser Tab on the Internal Properties Dialog BoxFigure 5.52: The Add Server Dialog BoxFigure 5.53: Entering the Installer PathFigure 5.54: Choosing the Assigned OptionFigure 5.55: Managed SoftwareFigure 5.56: Logging OnChapter 6: Installing and Configuring the ISA Firewall Software
Figure 6.1: Network within a NetworkFigure 6.2: The Miracle of the Split-DNS InfrastructureFigure 6.3: The Advanced Settings Dialog BoxFigure 6.4: The Setup Type PageFigure 6.5: The Custom Setup PageFigure 6.6: The Internal Network Address PageFigure 6.7: The Select Network Adapter PageFigure 6.8: Warning Dialog Box Reminding You that the Routing Table must be Properly ConfiguredFigure 6.9: Internal Network Address RangesFigure 6.10: The Firewall Client Connection Settings PageFigure 6.11: Warning Dialog Box regarding a Potential System RestartFigure 6.12: The ISA Firewalls System Policy EditorFigure 6.13: The Internal Network Definition on the Unihomed ISA FirewallFigure 6.14: The Physical Relationships between the ISA Server 2004 Firewall and the Internal and External Networks.Figure 6.15: The Advanced Settings Dialog BoxFigure 6.16: The Forwarders TabFigure 6.17: The Reverse Lookup Zone Name PageFigure 6.18: The Zone File PageFigure 6.19: The Forwarders TabFigure 6.20: Disabling RecursionFigure 6.21: The Networking Services Dialog BoxFigure 6.22: The Custom Setup PageFigure 6.23: The Select Network Adapter PageFigure 6.24: The Add Protocols Dialog BoxFigure 6.25: The Protocols PageFigure 6.26: Selecting the Computer CommandFigure 6.27: Selecting the New Computer ObjectFigure 6.28: The Resulting Firewall PolicyFigure 6.29: The Internet Protocol (TCP/IP) Properties Dialog BoxFigure 6.30: DNS Queries in Network Monitor TraceFigure 6.31: DNS Domains Cached by the Caching-only DNS Server on the ISA FirewallFigure 6.32: The Connection Limits Dialog BoxFigure 6.33: Registry Key for DHCP Attack PreventionFigure 6.34: Network Monitor Capture of a DHCP Offer PacketFigure 6.35: An Invalid DHCP Offer AlertFigure 6.36: The Renew DHCP Addresses WarningChapter 7: Creating and Using ISA 2004 Firewall Access Policy
Figure 7.1: the Rule Action pageFigure 7.2: The Protocols pageFigure 7.3: the Add Protocols dialog boxFigure 7.4: the Add Network Entities dialog boxFigure 7.5: The User Sets pageFigure 7.6: The Action tabFigure 7.7: The Protocols tabFigure 7.8: the Source Ports dialog boxFigure 7.9: The From tabFigure 7.10: The To TabFigure 7.11: The Users tabFigure 7.12: The Schedule tabFigure 7.13: The Content Types tabFigure 7.14: The Configure RPC Protocol Policy Dialog BoxFigure 7.15: The Configures FTP Protocol Policy Dialog BoxFigure 7.16: The New URL Set Rule Element dialog boxFigure 7.17: The URL Sets listFigure 7.18: The New Domain Set Policy Element dialog boxFigure 7.19: the Domain Name Sets listFigure 7.20: Saving the informationFigure 7.21: Finishing the procedureFigure 7.22: URL Set entriesFigure 7.23: Domain Name Set PropertiesFigure 7.24: Help information for the isa_tpr.js scriptFigure 7.25: Running the isa_tpr.js script to add a port to the SSL tunnel port rangeFigure 7.26: Using Steven Soekrasnos .NET Tunnel Port Range extension applicationFigure 7.27: A 407 response is returned to the Web proxy clientFigure 7.28: Firewall Policy to block MSN MessengerFigure 7.29: The Signature dialog boxFigure 7.30: Log file entries showing the HTTP Security Filter blocking the MSN Messenger connectionFigure 7.31: The sample public address DMZ segmentFigure 7.32: Public access network allows for NAT hidingFigure 7.33: New Network WizardFigure 7.34: The Select Network Adapters dialog boxFigure 7.35: the New Server Publishing Rule WizardFigure 7.36: Selecting IP addresses that will listen for requestsFigure 7.37: The New Computer Rule ElementFigure 7.38: The New Access Rule WizardFigure 7.39: The Firewall PolicyFigure 7.40: Commands supported by the SMTP serverFigure 7.41: Results of nslookup commandFigure 7.42: Log monitor entriesFigure 7.43: Basic network configuration for trihomed DMZFigure 7.44: Configuring the Network RelationshipFigure 7.45: Creating a new Protocol DefinitionsFigure 7.46: Configure the Primary Connection for the Protocol DefinitionFigure 7.47: Firewall PolicyFigure 7.48: Log file entries showing communications between member server and domain controllerChapter 8: Publishing Network Services with ISA 2004 Firewalls
Figure 8.1: The Select Rule Action PageFigure 8.2: The Define Website to Publish PageFigure 8.3: HTTP Headers Seen on the External Interface of the ISA FirewallFigure 8.4: HTTP Headers Seen on the Published Web Server when Original Host Header is not ForwardedFigure 8.5: HTTP Headers Seen on the Published Web Server when Forwarding the Original Host HeaderFigure 8.6: The Public Name Details PageFigure 8.7: The IP Addresses PageFigure 8.8: The External Network Listener IP Selection Dialog BoxFigure 8.9: The Port Specification PageFigure 8.10: The Preferences TabFigure 8.11: The Authentication Dialog BoxFigure 8.12: Tthe Advanced Settings Dialog BoxFigure 8.13: The User Sets PageFigure 8.14: The General Tab.Figure 8.15: The Action TabFigure 8.16: The From TabFigure 8.17: The To TabFigure 8.18: The Traffic TabFigure 8.19: The Listener TabFigure 8.20: The Public Name TabFigure 8.21: The Paths TabFigure 8.22: The Path Mapping Dialog BoxFigure 8.23: Redirecting to the Web Root Using a PathFigure 8.24: Mapping the OWA Web Site Root to the Exchange FolderFigure 8.25: The Bridging TabFigure 8.26: The Users TabFigure 8.27: The Schedule TabFigure 8.28: The Link Translation TabFigure 8.29: SSL-to-SSL bridgingFigure 8.30: The Publishing Mode PageFigure 8.31: The Select Rule Action PageFigure 8.32: The Bridging Mode PageFigure 8.33: The Define Website to Publish PageFigure 8.34: The Public Name Details PageFigure 8.35: The Select Web Listener PageFigure 8.36: The IP Addresses PageFigure 8.37: The External Network Listener IP Selection PageFigure 8.38: The Port Specification PageFigure 8.39: The Select Certificate Dialog BoxFigure 8.40: The Certificate Appears on the Port Specification PageFigure 8.41: The Select Web Listener PageFigure 8.42: The Select Protocol PageFigure 8.43: The General TabFigure 8.44: The Action TabFigure 8.45: The Traffic TabFigure 8.46: The From TabFigure 8.47: The To TabFigure 8.48: The Networks TabFigure 8.49: The Schedule TabFigure 8.50: The New/Edit Protocol Connection dialog boxFigure 8.51: The new HTTP Server Protocol DefinitionFigure 8.52: The Select Access Type PageFigure 8.53: The Select Services PageFigure 8.54: The Specify the Web Mail Server pageFigure 8.55: The Public Name Details PageFigure 8.56: The Select Services PageFigure 8.57: Firewall Policy after Running the Mail Server Publishing WizardFigure 8.58: The Configure Exchange RPC Policy Dialog BoxChapter 9: Creating Remote Access and Site-to-Site VPNs with ISA Firewalls
Figure 9.1: The Enable VPN Client Access linkFigure 9.2: The General TabFigure 9.3: The Groups TabFigure 9.4: The Protocols TabFigure 9.5: The User Mapping tabFigure 9.6: Select and Configure Access Networks OptionsFigure 9.7: The Address Assignment TabFigure 9.8: A Network Warning Dialog Box.Figure 9.9: The Name Resolution Dialog BoxFigure 9.10: The Authentication TabFigure 9.11: Virtual Private Networks PropertiesFigure 9.12: The Add Network Entities Dialog BoxFigure 9.13: VPN Client PolicyFigure 9.14: The account dial-in tabFigure 9.15: Controlling permission via Remote Access PolicyFigure 9.16: The Groups TabFigure 9.17: Details of PPTP connectionFigure 9.18: L2TP/IPSec Connection DetailsFigure 9.19: The Monitor VPN Clients LinkFigure 9.20: The ISA Firewall DashboardFigure 9.21: Log File Entries for the VPN Client ConnectionFigure 9.22: The Authentication TabFigure 9.23: Enter a pre-shared key on the L2TP/IPSec clientFigure 9.24: Viewing IPSec Information in the IPSec MMCFigure 9.25: Selecting the VPN ProtocolFigure 9.26: Setting Dial-in CredentialsFigure 9.27: Configuring the IP Address Range for the Remote Site NetworkFigure 9.28: The Network Relationship PageFigure 9.29: The Protocols pageFigure 9.30: The Resulting Firewall PolicyFigure 9.31: Demand Dial Interface Configuration on Local and Remote SitesFigure 9.32: Configure Dial-in CredentialsFigure 9.33: The New Network RuleFigure 9.34: The Resulting Firewall PolicyFigure 9.35: Restarting the Routing and Remote Access ServiceFigure 9.36: The Dial-in TabFigure 9.37: Configuring System PolicyFigure 9.38: The Show/Hide System Policy Rules ButtonFigure 9.39: The Advanced Certificate Request PageFigure 9.40: The Store Certificate in the Local Computer Certificate Store OptionFigure 9.41: The Certificate Path TabFigure 9.42: Configuring System PolicyFigure 9.43: Adding the Application Name columnFigure 9.44: Viewing the L2TP/IPSecFigure 9.45: Configuring the Shared SecretFigure 9.46: The Authentication Method PageFigure 9.47: The Smart Card or other Certificate Properties Dialog BoxFigure 9.48: The Policy Encrypted LevelFigure 9.49: Changing the Dial-in PermissionsFigure 9.50: The Raise Domain Functional LevelFigure 9.51: Controlling Access via Remote Access PolicyFigure 9.52: Remote Access Policy PropertiesFigure 9.53: Enabling the VPN ProtocolsFigure 9.54 Figure 9.55: The Add RADIUS Server Dialog BoxFigure 9.56: RADIUS Server Dialog BoxFigure 9.57: The resulting firewall policyFigure 9.58: Event Viewer EntryFigure 9.59: Log-On Request DetailsFigure 9.60: Log File Entries for VPN RADIUS AuthenticationFigure 9.61: VPN Session Appears in Sessions SectionFigure 9.62: RADIUS Messages in Network Monitor TraceFigure 9.63: Setting EAP AuthenticationFigure 9.64: Warning about User Mapping and EAPFigure 9.65: Enabling User Mapping for EAP AuthenticationFigure 9.66: The Security TabFigure 9.67: Enabling EAP AuthenticationFigure 9.68: The Smart Card or other Certificate Properties Dialog BoxFigure 9.69: Selecting the User Certificate for EAP User AuthenticationFigure 9.70 Figure 9.71: The ISA Virtual Private Network (VPN) Identification pageFigure 9.72: The Two-way Communication PageFigure 9.73: The Options tab on the Demand-dial Interfaces Properties Dialog Box.Figure 9.74: The Remote Authentication PageFigure 9.75: The Network Relationship PageFigure 9.76: The Resulting Firewall PolicyFigure 9.77: Log File Entries from Ping and SMTP ConnectionsFigure 9.78: Warning Regarding VPN Quarantine and VPN Client AccessFigure 9.79: The Quarantine Tab on the Quarantined VPN Client Properties PageChapter 10: ISA 2004 Stateful Inspection and Application Layer Filtering
Figure 10.1: The Custom Setup Dialog BoxFigure 10.2: The System Policy EditorFigure 10.3: The Message Screener Credentials Dialog BoxFigure 10.4: The SMTP FilterFigure 10.5: The SMTP Filter Properties Dialog BoxFigure 10.6: The User / Domains TabFigure 10.7: The Mail Attachment Rule Dialog BoxFigure 10.8: The Mail Attachment Rule Dialog BoxFigure 10.9: The SMTP Commands TabFigure 10.10: The Log TabFigure 10.11: The Options Dialog BoxFigure 10.12: The DNS Attacks TabFigure 10.13: The SOCKS V4 Filter Properties Dialog BoxFigure 10.14: The Call Control TabFigure 10.15: The Networks TabFigure 10.16: The General TabFigure 10.17: The Methods TabFigure 10.18: The Methods Dialog BoxFigure 10.19: The Extensions TabFigure 10.20: The Extensions Dialog BoxFigure 10.21: The Headers TabFigure 10.22: The Header Dialog BoxFigure 10.23: The Server Header OptionFigure 10.24: The Via HeaderFigure 10.25: The Signatures TabFigure 10.26: Example SignaturesFigure 10.27: Log File Entries Showing the HTTP Security Filter Blocking a ConnectionFigure 10.28: Successful Import Dialog BoxFigure 10.29: Successful Import Dialog BoxFigure 10.30: The Display Filter Dialog BoxFigure 10.31: The Expression Dialog BoxFigure 10.32: The Network Monitor Display WindowFigure 10.33: The Signature Dialog BoxFigure 10.34: Network Monitor Display Showing Kazaa Request HeadersFigure 10.35: Add/Edit Dictionary Text BoxFigure 10.36: Link Translation Tab in Web Publishing Rule PropertiesFigure 10.37: The HTTP Properties Dialog BoxFigure 10.38: The HTTP Properties Dialog Box and RSA SecurID TabFigure 10.39: The Manage Domain Configuration Dialog BoxFigure 10.40: The OWA Forms-Based Authentication Dialog BoxFigure 10.41: The Common Attacks TabFigure 10.42: TCP Uses a Three-Way Handshake to Establish a Connection between Client and ServerFigure 10.43: The DNS Attacks TabFigure 10.44: The IP Options TabFigure 10.45: The IP Fragments TabFigure 10.46: The IP Fragment Filter Warning Dialog BoxChapter 11: Accelerating Web Performance with ISA 2004 Caching Capabilities
Figure 11.1: How Distributed Caching WorksFigure 11.2: How Hierarchical Caching WorksFigure 11.3: A Hybrid Caching ArchitectureFigure 11.4: Setting Maximum Cache SizeFigure 11.5: Configuring Which Content to CacheFigure 11.6: Creating a New Cache Rule with the WizardFigure 11.7: Selecting Destinations to which the Cache Rule will ApplyFigure 11.8: Configuring When to Store Content in CacheFigure 11.9: Limiting the Size of Objects to be Cached and Caching SSL ResponsesFigure 11.10: Enabling HTTP Caching and Setting TTL ConfigurationFigure 11.11: Enabling FTP Caching and Setting the TTL ConfigurationFigure 11.12: Modifying an Existing Cache RuleFigure 11.13: Configuring Exceptions to the Destination Network EntitiesFigure 11.14: Successfully exporting cache rules to an XML fileFigure 11.15: Selecting an Import FileFigure 11.16: Making Configuration Changes AutomaticallyFigure 11.17: Enabling Web Proxy ClientsFigure 11.18: Enabling the System Policy Configuration GroupFigure 11.19: Starting or Stopping the Job Scheduler Service from the ISA ConsoleFigure 11.20: Starting or Stopping the Job Scheduler Service from the Computer Management ConsoleFigure 11.21: Specifying Content Download DetailsFigure 11.22: Configuring Content CachingFigure 11.23: The New Job Appears in the Content Download Jobs ListFigure 11.24: Modifying the Job ScheduleChapter 12: Using ISA Server 2004s Monitoring, Logging, and Reporting Tools
Figure 12.1: The Dashboard on an ISA Server 2004 Standard Edition ComputerFigure 12.2: Rolling up Dashboard sectionsFigure 12.3: Default Connectivity Status Prior to Creating Connectivity VerifiersFigure 12.4: Connectivity Status Shown After Creation of Connectivity VerifierFigure 12.5: The Services Section of the ISA Server 2004 DashboardFigure 12.6: The Reports Section of the ISA Server 2004 DashboardFigure 12.7: Event Viewer Logs Show the Firewall Service Events Displayed on the DashboardFigure 12.8: The Sessions section of the ISA Server 2004 Dashboard (Standard Edition)Figure 12.9: The System Performance Section of the ISA Server 2004 DashboardFigure 12.10: ISA Server Performance Monitor with Default CountersFigure 12.11: The Alerts Properties Dialog BoxFigure 12.12: The New Alert Configuration WizardFigure 12.13: Selecting Events and Conditions to Trigger an AlertFigure 12.14: Assigning a Category and Selecting a Severity Level for your New AlertFigure 12.15: Defining Actions to be Performed when the Alert is TriggeredFigure 12.16: Sending E-Mail Notification MessagesFigure 12.17: Running a Program when an Alert is TriggeredFigure 12.18: Stopping or Starting a Service when an Alert is TriggeredFigure 12.19: Completing the New Alert WizardFigure 12.20: New Alerts Show Up in the Alerts Definitions WindowFigure 12.21: Modifying an Alert to Specify Time ThresholdsFigure 12.22: Viewing Alerts that have been TriggeredFigure 12.23: Event Viewer Application Log Entry Showing Information Displayed in Alerts WindowsFigure 12.24: Entering Connectivity Verification DetailsFigure 12.25: Enabling a Rule to allow HTTP/HTTPS RequestsFigure 12.26: The New Connectivity VerifierFigure 12.27: Modifying Properties of a Connectivity VerifierFigure 12.28: Monitoring Connectivity from the DashboardFigure 12.29: Connectivity Problems Displayed on DashboardFigure 12.30: The Connectivity Tab Shows Which Server Has a ProblemFigure 12.31: Viewing Current SessionsFigure 12.32: Setting Filter CriteriaFigure 12.33: Specifying Multiple Filtering CriteriaFigure 12.34: Result of FilteringFigure 12.35: Stopping and Starting ServicesFigure 12.36: Configuring Logging SeparatelyFigure 12.37: Configuring Log Storage FormatFigure 12.38: Configuring MSDE Database LoggingFigure 12.39: The Log Viewer with Default FilterFigure 12.40: Editing a Log FilterFigure 12.41: Saving Log Viewer Data by Copying to the ClipboardFigure 12.42: The Reports DisplayFigure 12.43: Configuring Report ContentFigure 12.44: Configuring Report PublishingFigure 12.45: Generating the Report Upon Completion of the WizardFigure 12.46: Creating Report JobsFigure 12.47: Scheduling the Report JobFigure 12.48: Editing the Report Job PropertiesFigure 12.49: Configuring the Log SummaryFigure 12.50: Viewing Reports