Best Practices


  • Deploy an ISA-secured perimeter network to isolate Internet-facing services from the rest of the internal network.

  • Get acquainted with the System Policy Editor, and understand what default System Policy rules are in place on the ISA server.

  • Use the Network Template Wizard for the initial configuration of a new ISA Server, but manually create networks and network rules for any changes that are made after the server goes into production.

  • Create access rules on the firewall only when there is a specific business need to do so. If there is not, deny the traffic by default.

  • Create networks in ISA to correspond with each network card that is connected to a logical grouping of subnets connected by network routers. Do not create individual networks for multiple subnets to which ISA is not directly connected.



    Microsoft Internet Security and Acceleration ISA Server 2004 Unleashed
    Microsoft Internet Security and Acceleration (ISA) Server 2004 Unleashed
    ISBN: 067232718X
    EAN: 2147483647
    Year: 2005
    Pages: 216
    Authors: Michael Noel

    flylib.com © 2008-2017.
    If you may any questions please contact us: flylib@qtcs.net