Automating Installation of the Firewall Client
The Firewall client software can be installed on virtually any 32-bit version of Windows except Windows 95. There are a number of compelling reasons for installing the Firewall client software on all machines that supports its installation:
The Firewall client allows you to create user/group-based access controls for all TCP and UDP protocols. This is in contrast to the Web Proxy client configuration, which only supports HTTP, HTTPS and FTP.
The Firewall client has access to all TCP and UDP protocols, including those requiring secondary connections. In contrast, the SecureNAT client does not support application protocols that require secondary connections unless there is an application filter to support it.
The Firewall client provides much better performance than the SecureNAT client.
The Firewall client sends application information to the ISA 2004 firewall service; this allows the Firewall service logs to collect application usage information and helps you determine which applications users are using to access Internet sites and services.
The Firewall client sends user information to the Firewall service; this enables the ISA 2004 firewall to control access based on user account and record user information in the Firewall service's access logs. This information can be extracted and put into report form.
With these features, the Firewall client provides a level of functionality, security and access control that no other firewall in its class can match. For this reason, we always recommend that you install the Firewall client on any machine supporting the Firewall client software.
However, because the Firewall client configuration requires the Firewall client software to be installed, many firewall administrators are hesitant to avail themselves of the full feature set provided by the Firewall client. Many ISA 2004 firewall administrators don't have the time or the resources to 'touch' (visit) each authorized computer on the corporate network in order to install the Firewall client software.
The solution to this problem is to automate the installation of the Firewall client. There are two methods that you can use. These methods require no additional software purchase and can greatly simplify the installation of the Firewall client software on large numbers of computers on the corporate network. These methods are:
Group Policy-based software installation and management
Silent installation script
In the following section, we will discuss these methods, as well as some key ISA Server client configuration settings you should make in the ISA Management console.
Configuring Firewall Client and Web Proxy Client Configuration in the ISA Management Console
There are a few configuration options you should set for the Firewall client before you configure a Group Policy or a silent installation script to install the Firewall client software. These settings, made at the Microsoft Internet Security and Acceleration Server 2004 management console, determine issues such as Firewall client autodiscovery behavior and whether (and how) the Web browser is configured during installation of the Firewall client.
Perform the following steps on the ISA 2004 firewall to configure these settings:
In the Microsoft Internet Security and Acceleration Server 2004 management console, expand the server name, and then expand the Configuration node.
Click the Networks node, and then click Networks on the Details tab. Right-click the Internal network, and click Properties.
In the Internal Properties dialog box, click the Firewall Client tab.
On the Firewall Client tab, put a checkmark in the Enable Firewall client support for this network check box. In the Firewall client configuration frame, enter the name of the ISA 2004 firewall computer in the ISA Server name or IP address text box. The default setting is the computer name. However, you should replace the computer (NetBIOS) name with the fully-qualified domain name of the ISA 2004 firewall. When you replace the computer name with the FQDN, the Firewall client machines can use DNS to correctly resolve the name of the ISA 2004 firewall. This will avoid one of the most common troubleshooting issues with Firewall client connectivity. Make sure there is an entry for this name in your Internal network's DNS server.
The Web Proxy client configuration settings are available in the Web browser configuration on the Firewall client computer frame. These settings will automatically configure the Web browser as a Web Proxy client. Note that you can change the settings later, and the Web browsers will automatically update themselves with the new settings.
The Automatically detect settings option allows the Web browser to detect the Web Proxy and configure itself based on the settings you configure on the Web Browser tab of the Internal Properties dialog box, shown in Figure 5.50.

Figure 5.50: Internal Properties Dialog Box.
The Use automatic configuration script option allows you to assign a proxy autoconfiguration file (PAC) address to the Web browser. The Web browser will then query the location you specify or use the default location; the default location is on the ISA 2004 firewall. Note that when you use the default location, you obtain the same information you would receive if you had configured the Web browser to use the Automatically detect settings option. The Use default URL option automatically configures the browser to connect to the ISA 2004 firewall for autoconfiguration information. You can use the Use custom URL if you want to create your own PAC file that overrides the settings on the automatically-generated file at the ISA 2004 firewall. You can find more information on PAC files and proxy client autoconfiguration files in Using Automatic Configuration and Automatic Proxy at www.microsoft.com/resources/documentation/ie/5/all/reskit/en-us/part5/ch21auto.mspx
The Use a Web Proxy server option allows you to configure the Web browser to use the ISA 2004 as its Web Proxy, but without the benefits of the autoconfiguration script information. This setting provides higher performance than the SecureNAT client configuration, but you do not benefit from the settings contained in the autoconfiguration script. The most important configuration settings in the autoconfiguration script include site names and addresses that should be used for Direct Access. For this reason, you should avoid this option unless you do not wish to use Direct Access to bypass the Web Proxy service to access selected Web sites.
Click the Web Browser tab, as shown in Figure 5.51. There are several settings in this dialog box that configure the Web Proxy clients via the autoconfiguration script. Note that in order for these options to take effect, you must configure the Web Proxy clients to use the autoconfiguration script either via autodiscovery and autoconfiguration or via a manual setting for the location of the autoconfiguration script.

Figure 5.51: Web Browser Tab on the Internal Properties Dialog Box
The Bypass proxy for Web server in this network option allows the Web browser to use Direct Access to directly connect to servers that are accessible via a single label name. For example, if the user accesses a Web server on the Internal network using the URL http://SERVER1, the Web Proxy client browser will not send the request to the ISA 2004 firewall. Instead, the Web browser will directly connect to the SERVER1 machine. This reduces the load on the ISA 2004 firewall and prevents users from looping back through the ISA 2004 firewall to access Internal network resources. Note that the Bypass proxy for Web server in this network setting does not mean the browser will bypass the Web Proxy for accessing internal IP addresses. It will bypass the Web Proxy only when using a single label name when connecting to the resource.
The Directly access computers specified in the Domains tab option allows you to configure Direct Access to machines contained in the Domains tab. The Domains tab contains a collection of domain names that are used by the Firewall client to determine which hosts are part of the Internal network and bypass the ISA 2004 firewall when contacting hosts that are part of the same domain. The Web Proxy client can also use the domain on this list for Direct Access. We recommend that you always select this option as it will reduce the load on the ISA 2004 firewall by preventing Web Proxy clients from looping back through the firewall to access Internal network resources. In addition, this setting is a pivotal component of a split DNS infrastructure.
The Directly access these servers or domains list is a list of computer addresses or domain names that you can configure for Direct Access. Click the Add button.
In the Add Server dialog box shown in Figure 5.52, you can select the IP address within this range option, and then enter an IP address or IP address range of machines that you want to Directly Access. You also have the option to select the Domain or computer option and enter the computer name or the FQDN of the machine that you want to access via Direct Access. A common domain name to enter for Direct Access is the msn.com domain, because this domain, along with the passport.com and the hotmail.com domains must be configured for Direct Access to simplify Web Proxy client connections to the Microsoft Hotmail site.

Figure 5.52: The Add Server Dialog Box
If the ISA firewall is unavailable, use this backup route to connect to the Internet option allows machines configured as Web Proxy clients to use other means to connect to the Internet. Typically, this means that the Web Proxy client will leverage its SecureNAT or Firewall client configuration to connect to the Internet. If the machine is not configured as a SecureNAT and/or Firewall client, then no access will be allowed if the Web Proxy service becomes unavailable.
Click Apply, and then click OK, after making the changes to the configuration in the Internal Properties dialog box.
Click Apply to save the changes and update the firewall policy.
At this point the Firewall and Web Proxy client configuration is ready, and you can install the Firewall client on machines behind the ISA 2004 firewall and have these settings automatically configured on them.
Group Policy Software Installation
You might not wish to install the Firewall client on all machines. For example, domain controllers and published servers should not be configured as Firewall clients. You can gain granular control over Group Policy-based software installation by creating an organizational unit for Firewall clients and then configuring an Organization Unit (OU) group policy object to install the Firewall client only on computers belonging to that OU.
Perform the following steps on the domain controller to create the OU, and then configure software installation and management to install the Firewall client on machines belonging to the OU:
Click Start, and select the Administrative Tools menu. Click Active Directory Users and Computers. Right-click on your domain name, and click Organizational Unit.
In the New Object - Organizational Unit dialog box, enter a name for the OU in the Name text box. In this example, we will call the OU FWCLIENTS. Click OK.
Click on the Computers node in the left pane of the console. Right-click your client computer, and click the Move command.
In the Move dialog box, click the FWCLIENTS OU, and click OK.
Click on the FWCLIENTS OU. You should see the computer you moved into this OU.
Right-click the FWCLIENTS OU, and click the Properties command.
Click the Group Policy tab in the FWCLIENTS dialog box. Click the New button to create a New Group Policy Object. Select the New Group Policy Object and click Edit.
Expand the Computer Configuration node, and then expand the Software Settings node. Right-click on Software installation, point to New and click Package.
In the Open text box, type the path to the Firewall client's Microsoft installer package (.msi file) in the File name text box. In this example, the path is:
\\isa2\mspclnt\MS_FWC.MSI
Where isa2 is the NetBIOS name of the ISA 2004 firewall computer or the name of the file server hosting the Firewall client installation files; mspclnt is the name of the share on the ISA 2004 firewall computer that contains the Firewall client installation files, and MS_FWC.MSI is the name of the Firewall client Microsoft installer package. Click Open after entering the path.
In the Deploy Software dialog box, select the Assigned option (see Figure 5.54) and click OK. Notice that you do not have the Published option when installing software using the Computer Configuration node. The software is installed before the user logs on. This is critical because only local administrators can install the Firewall client software. In contrast, you can assign software to machines and the software will install when no other user is logged onto the machine. Click OK.

Figure 5.53: Entering the Installer Path

Figure 5.54: Choosing the Assigned Option
The new managed software package appears in the right pane of the console. All machines in the OU will have the Firewall client software installed when they are restarted. You can also manage the Firewall client software from here, as shown in Figure 5.55.

Figure 5.55: Managed Software
Close the Group Policy Object Editor and the Active Directory Users and Computers console.
When you restart the machines in the FWCLIENTS OU, you will see the log-on dialog box (Figure 5.56) provide information about how managed software is being installed on the Windows client operating system.

Figure 5.56: Logging On
Silent Installation Script
Another useful method for installing the Firewall client software is to use a silent installation script. This method is useful when the logged-on user is a member of the local administrator's group. The silent installation script does not expose the user to any dialog boxes, and the user does not need to make decisions during the installation process.
Open notepad; copy the following line into the new text document, and save the file as 'fwcinstall.cmd': msiexec /i \\ISA2\mspclnt\MS_FWC.msi /qn /l*v c:\mspclnt_i.log
The \\ISA2 entry is the computer name of the ISA 2004 firewall computer and will vary for each installation location. The rest of the line can be used exactly as listed above. Users can then go to a Web page, or click a link in an email message pointing them to this batch file. The process is very simple and only requires the user to click the link to run the script and from our experience with users and e-mail worms, we know they have no problems double clicking on exectuables. You could also place the .cmd file on a corporate Web site and send a message to users to visit the site and run the command. The installation is completely transparent, and the only thing the user will see is a momentary command prompt window and the Firewall client icon in the system tray when the procedure is completed.
Warning | The user must be a member of the local Administrator's group to install the Firewall client software. If the user is not a member of the local Administrator's group, the software installation will fail. You can get around this problem by assigning the Firewall client software to machines. The software is installed before user log-on, so there are no issues with who the logged-on user is at the time of installation. |
Systems Management Server (SMS)
Organizations using Systems Management Server (SMS) 2003 can use the software distribution feature of SMS to deploy the Firewall client software. The Software distribution routine in SMS 2003 provides the ability to deploy Windows Installer (.msi) files to any computer that is assigned to the SMS environment in a manner similar to the Active Directory Group Policy software management feature. Do the following to deploy the Firewall client using SMS 2003:
Create a collection that includes all the machines on which you want the Firewall client installed. An SMS collection is a group of network objects, such as computers or users, which are treated as an SMS management group. You can configure requirements such as IP address, hardware configuration, or add clients directly by name to group all computers that require the Firewall client software.
Create a package by importing the Firewall client Windows file (MS_FWC.msi). The Windows Installer file automatically includes a variety of attended and unattended installation options that can be used on a per-system or per-user basis. Programs are also created to uninstall the client. The per-system programs are configured to install the client with administrative rights whether or not the user is logged on. The per-user programs install the client using the credentials of the logged-on user. This provides an advantage over the Group Policy method, which does not allow you to temporarily elevate privileges to install the Firewall client application.
Create an SMS advertisement, which specifies the target collection and program to install. In order to control deployment, you can schedule a time for the program to be advertised to collection members.