MCSE Training Kit 10070100227 ISA Server2000 [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

MCSE Training Kit 10070100227 ISA Server2000 [Electronic resources] - نسخه متنی

Thomas Lee

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
توضیحات
افزودن یادداشت جدید








Lesson 2 Troubleshooting Strategies in ISA Server


Successful troubleshooting requires a systematic approach. When you experience unexpected behavior in ISA Server, you can begin troubleshooting by determining whether the error is user-based or packet-based. The following lesson offers strategies for troubleshooting both types of connection problems.

After this lesson, you will be able to


Troubleshoot user-based access problems

Troubleshoot packet-based access problems

Troubleshoot VPN connections in ISA Server


Estimated lesson time: 30 minutes

Troubleshooting User Access

When user account access is intermittent or unavailable, the problem could be caused by overly restrictive user security, improperly configured rules, or inadequate authentication methods. Tools such as Ping and Tracert may function properly even in these conditions.

To troubleshoot user-based access problems, first check access policy rules. Make sure that users unable to establish a network connection have been granted proper permissions to connect to the site(s), content group(s), and protocol(s) in question through configured access policy rules.

If you have configured rules that are not being successfully applied to user sessions, verify that your array properties are configured to ask unauthenticated users for identification. Note also that if you create an allow-type access policy rule that is applied to specific users and groups, user sessions will be forced to authenticate with the ISA Server. On the other hand, if access is being denied to Web sessions when you want all Web sessions to remain anonymous, make sure that the array properties do not force anonymous users to authenticate themselves. In addition, delete any allow-type site and content rules or protocol rules that are applied to specific Windows 2000 users or groups.

Authentication

Your choice of authentication method for an ISA Server array can affect the users' ability to connect. Each authentication method is designed to accommodate specific network environments. If an incompatible authentication method is chosen for a network configuration, or if an authentication method is improperly configured, users will be denied access to the ISA Server computer and the network.

For example, the default authentication mode on an array is Integrated Windows authentication, but this authentication method cannot authenticate clients not running Windows operating systems. If you need to provide authenticated access for such clients in ISA Server, you must configure the array properties to use another authentication method. Similarly, Integrated Windows authentication is incompatible with Netscape browsers because Netscape cannot pass user credentials in NTLM format. Another limitation of Integrated Windows authentication in Windows 2000 is that can rely on the Kerberos V5 authentication protocol or its own challenge/response authentication protocol. However, in a pass-through authentication scenario, as shown in Figure 10.3, ISA Server does not support Kerberos V5 authentication because Kerberos V5 requires that the client be able to identify the authenticating server.


Figure 10.3 Pass-through authentication is not compatible with Kerberos V5

The alternative authentication methods available in ISA Server include Basic, Digest, and Client Certificate. Basic authentication is compatible with all client types. However, because when this method is used user names and passwords are sent over the network in clear, unencrypted format, it is not a sufficient method of security by itself. Digest authentication can be used only in Windows 2000 domains. With this method passwords are sent in clear but encrypted text. Client Certificate authentication uses an Secure Sockets Layer (SSL) channel for authentication and requires that the a client certificate be installed in the Microsoft Web Proxy Service certificate store on the ISA Server computer and that the certificate be mapped to the appropriate user account. ISA Server can present client certificates only in SSL bridging configurations.

Troubleshooting Packet-Based Access Problems

Access problems can be determined to be packet-based when network access fails for all users, or when IP-based utilities such as Ping or Tracert fail.

To troubleshoot packet-based access problems in ISA Server, begin by simplifying the network configuration as much as possible to create a testing environment.

To set up a network troubleshooting configuration


With packet filtering enabled, create a custom packet filter to allow any IP protocol to transmit in both directions.
Create a protocol rule to allow all IP traffic for any request, and ensure that you have a site and content rule allowing access to all sites and content groups.
Return all application filters and routing rules to default settings.
Verify that you have defined the local address table (LAT) as the range of internal ISA Server clients.
Enable IP Routing in the IP Packet Filters Properties dialog box.

The IP Routing option provides routing capabilities to protocols with secondary connections. This setting is especially important for perimeter network configurations. You can enable the IP Routing option either in the IP Packet Filters Properties dialog box in ISA Management or in the Routing and Remote Access console.


On the ISA Server computer, make sure that no default gateway is defined for the internal interface. However, make sure that a proper default gateway is specified on the external interface.
On the client computers for which you are trying to establish access, disable the Firewall Client software and assign the ISA Server computer as the default gateway.

Once you have configured ISA Server in this simplified way, restart the ISA Server services. If you still cannot gain access, reboot the ISA Server computer. If this does not fix the problem, the network problem may not be related to your ISA Server configuration. In this case, you should perform network troubleshooting as you would with any network, performing Network Monitor traces and reviewing Domain Name System (DNS), routing tables, alerts, reports, and logs as appropriate.

If you can establish Internet access with the simplified testing configuration, you can then reintroduce network elements one by one to determine the cause of the problem. For example, if you can establish Internet access from a given client computer, you can attempt to use specific Internet applications from that computer. If you encounter problems, you can assume that either the application has been improperly configured to use ISA Server as a proxy or that the application is not designed to use a proxy server. For applications that are not able to use a proxy server, you must configure the client for SecureNAT or run the Firewall Client software. After reconfiguring the client, note any changes in behavior. If you use the Firewall Client software and access fails when you enable automatic discovery, you can assume that automatic discovery is improperly configured. Proceed incrementally, fixing problems as they arise, until you have added all the network components required for your particular configuration.

VPN Network Considerations

In VPN Networks, begin troubleshooting by creating the simplified network configuration as outlined above. If you have already run the VPN wizards, you should verify first that the Routing and Remote Access service has been started. Next, make sure that you have configured the client as a secure network address translation (SecureNAT) client and not a Firewall client.

You should also verify that the Local ISA Server VPN Configuration wizard has created the appropriate demand-dial interfaces in Routing and Remote Access. This can be checked in the Routing Interfaces node, as shown in Figure 10.4.


Figure 10.4 Demand-dial interfaces in Routing and Remote Access

After this, verify that two IP packet filters have been created for each authentication protocol you have chosen for your VPN connection. For example, if you have configured your VPN to use either L2TP or PPTP, the Local ISA Server VPN Configuration wizard should have created and enabled four IP packet filters. (For L2TP, the wizard creates custom filters for ports 500 and 1701, and for PPTP, the wizard creates predefined filters for PPTP Call and PPTP Receive.)

If the appropriate interfaces and IP packet filters have been created, and if rebooting the computer does not help, it is recommended that you delete the IP packet filters created by the VPN wizards, disable Routing and Remote Access, and run the wizards again.

Additional Troubleshooting Notes

When you are troubleshooting errors in ISA Server, you can begin by consulting the following tables. The following tables summarize common problems and solutions relating to various aspects and functions of ISA Server.

Table 10.1 Troubleshooting Access Policy


































Problem
Possible Cause(s)
Possible Solution(s)

Clients cannot
browse external Web
sites.

Initially, ISA Server does
not allow any communication
to or from the Internet.
You can create rules that
will allow communication in
a manner consistent with
your corporate security policy.

Create protocol rules to
allow specific users to
use the protocols. Then
create site and content
rules that allow users
access to particular sites,
using the protocols specified
by the protocol
rules.

Check the browser settings
of the client to
ensure that the proxy
port is specified correctly.
The default port
for ISA Server is 8080.

Clients receive a 502
error every time they
try to browse the
Web.

Initially, ISA Server does
not allow any communication
to or from the Internet.
You can create IP packet
filters or rules that will
allow communication in a
manner consistent with
corporate security policy.

Some access policy rules
require authentication, but
no authentication methods
were configured for the listener.

Create protocol rules to
allow specific users to
use the protocols. Then
create site and content
rules that allow users
access to particular sites,
using the protocols specified
by the protocol
rules.

Select an authentication
method for the listener.
Clients will be allowed
access, in accordance
with configured rules, if
they can authenticate
using the method.

Clients cannot use
specific protocol,
such as HTTP, RealAudio,
or others.

Initially, ISA Server does
not allow any communication
to and from the Internet.
You can configure IP
packet filters or rules that
will allow use of particular
protocols.

Create protocol rules to
allow users to communicate
using the specified
protocols. Also check to
see whether a particular
protocol is not blocked
by a disabled application
filter.

After disabling a protocol
rule, clients can
still use the specified
protocol that is
allowed by the rule.

Existing client sessions are
not terminated when you
disable a protocol rule,
although new sessions will
not be opened. For example,
if a client is using a
RealAudio protocol, in
accordance with configured
rules, the session will
continue even after you
disable the protocol rule
allowing the access.

Disconnect the client
sessions.

Clients cannot use a
specific protocol definition,
although a
protocol rule has
been configured to
allow access.

If you disable an application
filter, all traffic that
uses the protocol definition
is blocked, even if protocol
rules seem to allow the
traffic.

Enable the application
filter. Create a protocol
rule that allows access to
the specific clients.


Table 10.2 Troubleshooting Authentication














Problem
Possible Cause(s)
Possible Solution(s)

ISA Server failed to
authenticate a
Netscape user.

ISA Server may have been
configured only to accept
Windows integrated
authentication. Netscape
browsers cannot pass user
credentials in NT LAN Manager
(NTLM) format.

You can configure ISA
Server to require other
authentication methods,
including Basic or Digest.


Table 10.3 Troubleshooting Caching



















Problem
Possible Cause(s)
Possible Solution(s)

Not all traffic is saved
to the ISA Server
cache.

ISA Server caches only
items that meet the caching
criteria.

When clients access
objects that can be
cached, network performance
seems to improve,
as the objects are
retrieved from the ISA
Server cache rather than
from the network. However,
if your clients are
commonly accessing
objects that are not
cached, you may not
perceive improved performance.

The Web Proxy service
will not start.

The cache contents file is
corrupted.

If the cache contents file
becomes corrupted for
whatever reason, the
Web Proxy service will
not be able to start. To
overcome this problem,
reconfigure the drives
allocated for caching.


Table 10.4 Troubleshooting Logging














Problem
Possible Cause(s)
Possible Solution(s)

The client authentication
(user names)
information cannot
be found in the log
file.

ISA Server does not always
require that clients authenticate
themselves. If clients
are not authenticated, they
are granted anonymous
access and their authentication
information is not
logged.

You can configure ISA
Server to always require
that Web Proxy clients
authenticate themselves,
by configuring
the incoming and outgoing
Web request properties.


Table 10.5 Troubleshooting Publishing


































Problem
Possible Cause(s)
Possible Solution(s)

Clients receive a 403
error every time they
try to access the
published Web
server.

Some access policy rule
requires authentication,
but no authentication
methods were configured
for the listener

Select an authentication
method for the listener.
Clients will be allowed
access, in accordance
with configured rules, if
they can authenticate
using the particular
method chosen.

External clients cannot
send mail via the
computer running
Microsoft Exchange
Server that is set up
as a Firewall client
behind the ISA
Server computer.

There is a port conflict
between a server publishing
rule and a Firewall client
configuration file.

If you published a mail
server in a Microsoft
Proxy Server 2.0 environment,
you had to
configure the mail server
as a Winsock Proxy client.
In this case, you created
a Wspclnt.ini file on
the mail server. With ISA
Server, publishing servers
do not require special
configuration, since they
are published as
SecureNAT clients.
Remove the Wspclnt.ini
file from the publishing
server. Then, in ISA Management,
run the Mail
Server Security wizard.

The Microsoft Exchange
Server may be unable to
bind to the SMTP port on
the ISA Server computer.

Be sure that there is no
other local service or
application running on
the ISA Server computer
that is binding to port 25
before the Exchange
Server.

The Exchange Server loses
its connection to the ISA
Server computer.

If the connection
between the ISA Server
computer and the
Exchange Server was
temporarily disrupted,
you must restart the
Exchange services so
that it will bind to the
necessary ports on the
ISA Server computer.

External clients cannot
send mail via the
Exchange Server,
which is set up as a
SecureNAT client,
behind the ISA
Server computer.

The server publishing rules
may not be configured correctly.

Check that the server
publishing rules are configured
so that the external
interface passes all
traffic on port 25 for
SMTP traffic and port 110
for Post Office Protocol 3
traffic to the correct IP
address and port on the
internal Exchange
Server.


Table 10.6 Troubleshooting Services














Problem
Possible Cause(s)
Possible Solution(s)

Services did not start
after installation
completed successfully.

If the LAT was configured
incorrectly and does not
include the internal network
adapter that communicates
with Active
Directory, the ISA Server
services cannot start.

Perform the following
steps to add the appropriate
entries to the LAT:
1. Stop ISA Server services
and packet filtering.
To do this, at a
command prompt, type
net stop mspfltext. 2.
Reconfigure the LAT.
Since you cannot run ISA
Management, you will
have to configure the
LAT using the ISA Server
Administration COM
objects. For more information
on how to do this,
see "Constructing the
Local Address Table" in
the
ISA Server Software
DevelopmentKit
. 3.
Reboot the computer.


Lesson Summary

A good way to begin troubleshooting an access problem in ISA Server is to determine whether the problem is user-based or packet-based. Access problems can be distinguished as user-based when connection ability varies among users, or when network resources are accessible from IP utilities such as Ping or Tracert but not through all user accounts. Access problems can be distinguished as packet-based when network access does not vary among users, or when you are unable to connect to a network resource using an IP utility.

To troubleshoot user-based access problems, you should check access policy rules to make sure that the proper users have been granted access to the proper sites, content groups, and protocols. In addition, if you want access policy rules configured for specific users and groups to apply to Web sessions, you should verify that your array properties have been configured to require authentication for outgoing Web requests. Finally, you should make sure that an authentication method has been properly configured for your array.

To troubleshoot packet-based access problems in ISA Server, begin by simplifying the network configuration as much as possible and then performing the access test. If you are still experiencing a network problem in a simplified test environment, the network problem might not be related to your ISA Server configuration. If it is unrelated to ISA Server, proceed to troubleshoot the configuration as you would with any network access problem. If you can establish Internet access with the simplified testing configuration, you can then reintroduce the elements of your network one by one until you can determine the cause of the problem. Additional troubleshooting considerations for VPN connections include verifying that VPN clients are configured as Secure NAT clients, that Routing And Remote Access is started, that the proper demand-dial interfaces are created for the VPN, and that two IP packet filters are enabled for each authentication protocol selected for the VPN.

/ 91