<span class="chapter-titlelabel">Chapter 6: </span> Installing and Configuring the ISA Firewall Software - Dr. Tom Shinderamp;#039;s Configuring ISA Server 1002004 [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Dr. Tom Shinderamp;#039;s Configuring ISA Server 1002004 [Electronic resources] - نسخه متنی

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
توضیحات
افزودن یادداشت جدید








Chapter 6: Installing and Configuring the ISA Firewall Software



Pre-installation Tasks and Considerations



There are several key pre-installation and tasks and considerations you need to address before installing the ISA firewall software. These include:





  • System Requirements





  • Configuring the Routing Table





  • DNS Server Placement





  • Configuring the ISA Firewall's Network Interfaces





  • Unattended Installation





  • Installation via a Terminal Services Administration Mode Session





System Requirements



The following are requirements for installing the ISA firewall software:





  • Intel or AMD system with a 550 megahertz (MHz) or higher processor





  • Windows 2000 or Windows Server 2003 operating system





  • A minimum of 256 megabytes (MB) of memory; a practical minimum of 512 MB of memory for non-Web caching systems, and 1000 MB for Web-caching ISA firewalls





  • At least one network adapter; two or more network adapters are required to obtain stateful filtering and stateful application-layer inspection firewall functionality





  • An additional network adapter for each network connected to the ISA Server computer





  • One local hard-disk partition that is formatted with the NTFS file system, and at least 150 MB of available hard disk space (this is exclusive of hard-disk space you want to use for caching)





  • Additional disk space, which ideally is on a separate spindle, if you plan on using the ISA firewall's Web-caching feature





Special installation issues if you plan on installing the ISA firewall software on Windows 2000 include:





  • Windows 2000 Service Pack 4 (SP4), or later, must be installed.





  • Internet Explorer 6, or later, must be installed.





  • If you are using the Windows 2000 SP4 slipstream, you must also install the hotfix specified in article 821887, 'Events for Authorization Roles Are Not Logged in the Security Log When You Configure Auditing for Windows 2000 Authorization Manager Runtime,' in the Microsoft Knowledge Base at http://support.microsoft.com/default.aspx?scid=kb;en-us;821887.





  • You cannot configure the L2TP IPSec pre-shared key.





  • VPN Quarantine is not supported when using RADIUS policy.





  • All ISA Server services run using the local system account.





Another important consideration is capacity planning. While the above reflects minimal system requirements for installing and running the ISA firewall software, the ideal configuration is obtained when you size the hardware to optimize the ISA firewall software performance for your site. Table 6.1 provides basic guidelines regarding processor, memory, disk space and network adapter requirements based on Internet link speed.































Table 6.1: Basic Processor, Memory, Disk Space and Network Adapter Requirements Based on Link Speed


Internet




Up to 7.5 Mbps




Up to 25 Mbps




Up to 45 Mbps




Notes




Processors




1




1




2




Processor type




Pentium III 550 MHz (or higher)




Pentium 4 2.0 - 3.0 GHz




Xeon 2.0 - 3.0 GHz




You can use other processors with comparable power that emulate the IA-32 instruction set. In deployments requiring only stateful filtering ('stateful packet inspection' - that is, when there is no need for higher security stateful application-layer inspection), the Pentium 4 and Xeon processor recommendations reach LAN wire speeds.




Memory




256 M B




512 M B




1 GB




With Web caching enabled, these requirements may be increased by approximately 256-512 MB.




Disk space




150 M B




2.5 GB




5 GB




This is exclusive of hard-disk space you need to use for caching and logging.




Network adapter




10/100 Mbps




10/100 Mbps




100/1000 Mbps




These are the requirements for the network adapters not connected to the Internet.




Concurrent Remote-hardaccess VPN connections




150




700




850




The Standard Edition of the ISA firewall supports a coded maximum of 1000 concurrent VPN connections.





For an exceptionally thorough and comprehensive discussion on ISA firewall performance optimization and sizing, please refer to the Microsoft document ISA Server 2004 Performance Best Practices at www.microsoft.com/technet/prodtechnol/isa/2004/plan/bestpractices.mspx.



Configuring the Routing Table



The routing table on the ISA firewall machine should be configured before you install the ISA firewall software. The routing table should include routes to all networks that are not local to the ISA firewall's network interfaces. These routing table entries are required because the ISA firewall can have only a single default gateway. Normally, the default gateway is configured on the network interface that is used for the External Network. Therefore, if you have an internal or or other Network that contains multiple subnets, you should configure routing table entries that ensure the ISA firewall can communicate with the computers and other IP devices on the appropriate subnets. The network interface with the default gateway is the one used to connect to the Internet, either direction or via upstream routers.


The routing table entries are critical to support the ISA firewall's 'network-within-a-Network' scenarios. A network within a Network is a network ID located behind a NIC on the ISA firewall that is a non-local network.


For example, Figure 6.1 is an example of a simple network-within-a-Network scenario.




Figure 6.1: Network within a Network


This small organization's IP addressing scheme uses two network IDs for the corporate network: 192.168.1.0/24 and 192.168.2.0/24. The network local to the ISA firewall's internal interface is 192.168.1.0/24. The network remote from the ISA firewall's internal interface is 192.168.2.0/24. A corporate network router separates the network and routes packets between these two network IDs.


The ISA firewall's networking model includes both of these networks as part of the same Network (Note: A capital 'N' indicates an ISA firewall-defined network). You would naturally assume that the 192.168.1.0/24 would be an ISA-defined Network since it includes an entire network ID, but you might also assume that network ID 192.168.2.0/24 would be defined as a second ISA firewall-defined Network. That would be incorrect because the ISA firewall's Network model includes all networks (all IP addresses) reachable from a specific interface on the ISA firewall as being part of the same network.


The rationale behind this is that hosts on the same ISA-defined Network do not use the ISA firewall to mediate communications between themselves. It makes no sense for the ISA firewall to mediate communications between hosts on networks IDs 192.168.1.0/24 and 192.168.2.0/24, as this would require hosts to loop back through the firewall to reach hosts to which they should directly communicate.


In this example, there should be a routing table entry on the ISA firewall indicating that in order to reach network ID 192.168.2.0/24, the connection must be forwarded to IP address 192.168.2.1 on the corporate router. You can use either the RRAS console or the command line ROUTE and netsh commands to add the routing table entry.


The ISA firewall must know the route to each internal network ID. If you find that connections are not being correctly forwarded by the ISA firewall to hosts on the corporate network, confirm that there are routing table entries on the ISA firewall indicating the correct gateway for each of those network IDs.







Tip


You can greatly simplify your ISA firewall Network definitions and routing table entries by creating a well-designed IP addressing infrastructure with proper subnet design that allows for route summarization.




DNS Server Placement



DNS server and host name resolution issues represent the most common ISA firewall connectivity problems. Name resolution for both corporate network and Internet hosts must be performed correctly. If the company's name resolution infrastructure isn't properly configured, one of the first victims of the flawed name resolution design will be the ISA firewall.


The ISA firewall must be able to correctly resolve both corporate and Internet DNS names. The ISA firewall performs name resolution for both Web Proxy and Firewall clients. If the firewall cannot perform name resolution correctly, Internet connectivity for both Web Proxy and Firewall clients will fail.


Correct name resolution for corporate network resources is also critical because the ISA firewall must be able to correctly resolve names for corporate network resources published via Web Publishing rules. For example, when you create a secure-SSL Web Publishing Rule, the ISA firewall must be able to correctly forward incoming connection requests to the FQDN used for the common name on the Web site certificate bound to the published Web server on the corporate network.


The ideal name resolution infrastructure is the split DNS. The split-DNS infrastructure allows external hosts to resolve names to publicly-accessible addresses and corporate network hosts to resolve names to privately-accessible addresses. Figure 6.2 depicts how a split-DNS infrastructure works to enhance name resolution for hosts inside your corporate network, as well as those that roam between the corporate network and remote locations on the Internet.




Figure 6.2: The Miracle of the Split-DNS Infrastructure





  1. A user at a remote location needs to access resources on the corporate Web server, www.msfirewall.org. The www.msfirewall.org Web server is hosted on an ISA firewall-Protected Network and published using an ISA firewall Web Publishing Rule. The remote user sends a request to www.msfirewall.org, and the name is resolved by the public DNS server authoritative for the msfirewall.org domain. The name is resolved to an IP address on the external interface of the ISA firewall used by the Web listener designated in the Web Publishing Rule.





  2. The remote Web client sends the request to the IP address on the external interface used by the Web Publishing Rules Web listener.





  3. The ISA firewall resolves the name www.msfirewall.org to the actual IP address bound to the www.msfirewall.org Web site on the corporate network by querying the Internal network DNS server authoritative for the msfirewall.org domain.





  4. The ISA firewall forwards the connection to the actual IP address bound to the www.msfirewall.org Web site on the corporate network.





  5. A host on the corporate network needs to access resources on the www.msfirewall.org Web site. The corporate user sends a request to the corporate DNS server that is authoritative for the msfirewall.org domain. The corporate DNS server resolves the name www.msfirewall.org to the actual IP address bound to the www.msfirewall.org Web site on the corporate network.





  6. The Web client on the corporate network connects directly to the www.msfirewall.org Web server. The Web client doesn't loop back to reach the www.msfirewall.org Web site on the corporate network because Web Proxy clients are configured for direct access to resources on the msfirewall.org domain.





The split-DNS infrastructure provides transparent access to resources for users regardless of their location. Users can move between the corporate network and remote locations and use the same name to reach the same corporate resources. They don't need to reconfigure their mail clients, news clients, and other applications because the same name is used to access the resources regardless of location. Any organization needing to support users that roam between the corporate network and remote locations should implement a split DNS infrastructure.


Requirements for the split-DNS infrastructure include:





  • A DNS server authoritative for the domain that resolves names for resources for that domain to the internal addresses used to access those resources





  • A DNS server authoritative for the domain that resolves names for resources in that domain to the publicly-accessible addresses used to access those resources





  • Remote users must be assigned DNS server addresses that forward requests for the domain to a public DNS server. This is easily accomplished using DHCP.





  • Corporate users must be assigned DNS server addresses that forward requests for the domain to the private DNS server. This is easily accomplished using DHCP.





  • The ISA firewall must be able to resolve names of published resources and all other resources hosted on a ISA firewall-Protected Network to the private address used to access that resource.





Most organizations that use the ISA firewall will have one or more internal DNS servers. At least one of those DNS servers should be configured to resolve both internal and Internet host names, and the ISA firewall should be configured to use that DNS server. If you have an internal network DNS server, you should never configure the ISA firewall's interfaces to use an external DNS server. This is a common mistake and can lead to slow or failed name resolution attempts.







Tip


Check out Jim Harrison's article Designing An ISA Server Solution on a Complex Network at http://isaserver.org/tutorials/Designing_An_ISA_Server_Solution_on_a_Complex_Networkl for information on network designs supporting ISA firewalls.




Configuring the ISA Firewall's Network Interfaces



Perhaps one of the least understood ISA firewall configuration issues is how to correctly configure the IP addressing information on the ISA firewall's network interfaces. The reason for this is that name resolution issues have the potential for being complex, and fledging firewall administrators are often too busy to get lost in the details of DNS host name and NetBIOS name resolution.


There are two main networks interface configuration scenarios:





  • An established name-resolution infrastructure on the corporate network protected by the ISA firewall





  • No established name-resolution infrastructure on the corporate network protected by the ISA firewall





Tables 6.2 and 6.3 show the correct IP addressing information for both these scenarios in dual-homed ISA firewalls.

















































Table 6.2: Established Corporate Network Name-Resolution Infrastructure


Parameters




Internal Interface




External Interface




Client for Microsoft Networks




Enabled




Disabled




File and Print Sharing for Microsoft Networks




Enabled only if the ISA firewall hosts the Firewall client share




Disabled




Network Monitor Driver




Enabled when Network Monitor is installed on the ISA firewall (recommended)




Enabled when Network Monitor is installed on the ISA firewall (recommended)




Internet Protocol (TCP/IP)


IP address




Enabled


Valid IP address on the netnetwork the internal interface is connected to




Enabled


Valid IP address on the work the external interface is connected to. Public or private depending on your network infrastructure




Subnet mask




Valid subnet mask on the network the internal interinterface is connected to




Valid subnet mask on the network the external face is connected to




Default gateway




NONE. Never configure a default gateway on any internal or DMZ interface on the ISA firewall.




IP address of upstream router (either corporate or ISP depending on next hop) allowing access to the Internet




Preferred DNS server




Internal DNS server that can resolve both internal and Internet host names




NONE. Do not enter a DNS server address on the external interface of the ISA firewall




Alternate DNS server




A second internal DNS server that can resolve both internal and Internet host names




NONE. Do not enter a DNS server address on the external interface of the ISA firewall.




Register this connection's addresses in DNS




Disabled. You should manually create entries on the Internal network DNS server to allow clients to resolve the name of the ISA firewall's internal interface.




Disabled




WINS




Enter an IP address for one more Internal network DNS server.


Especially helpful for VPN clients who want to browse Internal network servers using NetBIOS name/browser service




NONE




WINS NetBIOS setting




Top of interface list




Disable NetBIOS over TCP/IP




Interface order




Default




Under internal interface















































Table 6.3: No Established Corporate Network Name-Resolution Infrastructure


Parameters




Internal Interface




External Interface




Client for Microsoft Networks




Enabled




Disabled




File and Print Sharing for Microsoft Networks




Enabled only if the ISA firewall hosts the Firewall client share




Disabled




Network Monitor Driver




Enabled when Network Monitor is installed on the ISA firewall (recommended)




Enabled when Network Monitor is installed on the ISA firewall (recommended)




Internet Protocol (TCP/IP)




Enabled




Enabled




Default gateway




NONE. Never configure a gateway on any internal or DMZ interface on the ISA firewall




IP address of upstream router (either corporate or ISP depending on next hop) allowing access to the Internet. May be assigned by ISP via DHCP




Preferred DNS server




External DNS server that can resolve Internet host names. Typically your ISP's DNS Server.


Note: If the external interface uses DHCP to obtain IP addressing information, do not enter a DNS server on the ISA firewall's internal interface.




None, unless assigned by ISP via DHCP.




Alternate DNS server




A second external DNS server that can resolve Internet host names Note: If the external interface uses DHCP to obtain IP addressing information from your ISP, do not enter a DNS server on the ISA firewall's internal interface.




NONE. Do not enter a DNS server address on the external interface of the ISA firewall unless assigned via DHCP by ISP.




Register this connection's addresses in DNS




Disabled




Disabled




WINS




NONE




NONE




WINS NetBIOS setting




Default




Disable NetBIOS over TCP/IP




Interface order




Top of interface list Note: If the external interface of the ISA firewall uses DHCP to obtain IP addressing information from your ISP, then do not move the internal interface to the top of the list.




Top of interface list if using ISP DHCP server to assign DNS server addresses




You should already be familiar with configuring IP addressing information for Windows Server interfaces. However, you may not be aware of how to change the interface order. The interface order is used to determine what name server addresses should be used preferentially.







Tip


You can track which interface is connected to what Network by renaming your network interfaces in the Network and dial-up connections user interface. Right-click on the network interface, and click rename. Enter the new name for the interface. For example, on a simple trihomed ISA firewall, we often name the interfaces LAN, WAN, and DMZ.




Perform the following steps to change the interface order:





  1. Right-click My Network Places on the desktop, and click Properties.





  2. In the Network and Dial-up Connections window, click the Advanced menu, then click Advanced Settings.





  3. In the Advanced Settings dialog box (Figure 6.3), click the internal interface in the list of Connections on the Adapters and Bindings tab. After selecting the internal interface, click the up-arrow to move the internal interface to the top of the list of interfaces.




    Figure 6.3: The Advanced Settings Dialog Box





  4. Click OK in the Advanced Settings dialog box.





Unattended Installation



You can perform an unattended installation of the ISA firewall to simplify provisioning multiple ISA firewalls using a common installation and configuration scheme. The unintended installation depends on the proper configuration of the msiund.ini file, which contains the configuration information used by ISA firewall setup in unattended mode.







Tip


Make a special note of the last entry in Table 6.4, which shows how you can include a pre-built ISA firewall policy in your unattended installation. This allows you to automate ISA firewall installation and configuration for thousands of ISA firewalls by running a simple command line entry.




The default msisaund.ini file is located on the ISA Server 2004 CD in the \FPC directory. Table 6.4 contains the salient entries and values that are configured in the msisaund.ini file.





































Table 6.4: Entries and Values in the msisaund.ini File


Entry




Description




PIDKEY


INTERNALNETRANGES




Specifies the product key


Specifies the range of addresses in the Internal Network. Msisaund.ini must specify at least one Internet Protocol (IP) address. Otherwise, Setup fails. The syntax is:


N From1-To1,From2-To2,... FromN-ToN, where N is the number of ranges, and FromI to ToI are the starting and ending addresses in each range.




InstallDir={install_directory}




Specifies the installation directory for ISA Server. If not specified, it defaults to the first disk drive with enough space. The syntax is:


Drive:\Folder


The default folder is:


%Program Files%\Microsoft ISA Server




COMPANYNAME=Company_Name




Specifies the name of the company installing the product




DONOTDELLOGS = {0|1}




If set to 1, log files on the computer are not deleted. The default is 0.




DONOTDELCACHE = {0|1}




If set to 1, cache files on the computer are not deleted. The default is 0.




ADDLOCAL= {MSFirewall_ Management},{MSFirewall_ Services},{Message_Screener}, {Publish_Share_Directory}, {MSDE}




Specifies a list of components (delimited by commas) that should be installed on the computer.To install all the components, set ADDLOCAL=ALL.




REMOVE={MSFirewall_ Management},{MSFirewall_ Services},{Message_Screener}, {Publish_Share_Directory}, {MSDE}




Specifies a list of components (delimited by commas) that should be removed from the computer.To remove all the components, set REMOVE=ALL.




IMPORT_CONFIG_FILE = Importfile.xml




Specifies a configuration file to import




Perform the following steps to effect the unattended installation of the ISA firewall:





  1. Modify the Msisaund.ini file.





  2. At a command prompt, enter



    PathToISASetup\Setup.exe [/[X|R]] /V" /q[b|n]
    FULLPATHANSWERFILE=\"PathToINIFile\MSISAUND.INI\"
    PathToISASetup





The path to the ISA Server 2004 installation files. The path may be the root folder of the ISA Server CD-ROM or a shared folder on your network that contains the ISA Server files.



/Q [b|n]


Performs quiet unattended setup. If you specify b, a progress bar indicates the setup process. If you specify n, no dialog boxes are displayed.



/R


Performs unattended reinstallation



/X


Performs unattended uninstallation



PathToINIFile


The path to the folder containing the unattended installation information


Issues related to unattended installation of the ISA firewall include:





  • You must be a member of the Administrators group to perform an unattended installation.





  • You cannot perform an unattended installation on a computer with ISA Server 2000 installed.





  • The INTERNALNETRANGES property in Msisaund.ini must specify at least one Internet Protocol (IP) address range that includes one of the IP addresses of your ISA Server computer. Otherwise, Setup fails.





  • A sample answer file (Msisaund.ini) is provided on the CD, in the FPC folder.





  • For example, CD\FPC\setup.exe /v' /qn FULLPATHANSWERFILE=\'C:\MSISAUND.INI\'' performs an unattended installation of ISA Server, using the Msisaund.ini file located in c:\.





  • The MSDE component which is installed when you install the Advanced logging feature is not properly installed when you remotely install the ISA firewall using Terminal Services in application server mode. Use Terminal Services in administration mode to properly install MSDE.





Installation via a Terminal Services Administration Mode Session



You can install the ISA firewall via an Admin mode Terminal services connection. After installing is complete, a System Policy rule is configured to allow RDP connections only from the IP address of the machine that was connected during the ISA firewall software installation. This is in contrast to the default System Policy setting when installing the ISA firewall software at the console, where any host on the Internal Network can initiate an RDP connection to the ISA firewalls Internal interface.


/ 145