Modifying ISA


ISA comes preconfigured with all the necessary settings to operate a generic installation of SBS 2003. However, because many businesses don't fit exactly into the generic model, modifying ISA's configuration is necessary.

Understanding Application and Web Filters

It is not an understatement to say that application filters are the real strength of ISA. Back in the day, router/firewall administrators were accused of not caring about anything above layer 3 in the OSI model, where packets are routed. Application filters allow ISA to inspect packets at layer 7 where the data resides. Being able to inspect the contents is a huge advantage giving ISA the capability to prevent a wide range of attacks by filtering out contents that don't adhere to standards. Most attacks count on the fact that firewalls in place today aren't intelligent. All they know is open or closed. ISA on the other hand checks the packet to see whether it matches the expected configuration and also whether this type of data is allowed on your network at all.

To see the application filters, expand Configuration and then click on Add-ins. There are no configuration options in the filters themselves except to enable or disable them. By default all the filters are enabled except the H.323 and the SMTP filters (see Figure 24.7). The configuration of each of these filters actually comes in the specific rule definition as is described later in this chapter in the section "Allowing FTP Upload and Download to External Servers."

Figure 24.7. ISA application filters


Web filters are similar to application filters in that they are simply enabled or disabled in this section. Web and application filters allow advanced security configurations of the features that they control and both application and web filters can be extended by third-party developers.

Anatomy of a Firewall Policy

The Firewall Policy in ISA 2004 Server is made up of both System Policies and user-specified policies called Firewall Policy Rules. There are about an equal number of each in the default configuration. Both types of policies are required for ISA to work for SBS and are created for you when you run the Connect to the Internet Wizard.

System Policies can be changed only through the System Policy editor, whereas Firewall Policy Rules can be edited directly. During day-to-day administration, you will most often deal with Firewall Policy Rules and not the System Policy.

Firewall Policy Rules are made up of several components: access rules, protocol definitions, user set, schedule, domain name set, URL sets, and content filters. (see Figure 24.8) You can pick and choose which of these components are needed for your new rule. The best way to learn how to create a new policy is to look at the existing policies. To facilitate this, ISA 2004 has a new feature that allows you to copy a rule. To copy a rule, right-click on the rule that you want to copy and select Copy, then right-click and select Paste to paste the copied rule into the Firewall Policy. The copied rule is called Rule Name (1), where Rule Name is the name of the original rule. Rename the copy and then begin your configuration changes. This feature can be a real time-saver.

Figure 24.8. There are many options for refining a Firewall Policy Rule. Each tab contains options for fine tuning.


If you have created rules in ISA 2000, you'll notice that you can now define each component as you configure the rule instead of configuring each item individually and then creating the rule last. This feature is also a great timesaver.

Opening a Port

Opening a port is an antiquated term that really has no place in ISA management. In pinhole type firewalls/routers there are buttons that allow you to open or close ports. Sometimes they allow you to specify which protocol the port will be used for, but often this is predefined too. The problem with this type of security is that it is nondiscriminate. If the port is open, data is welcome to come in or leave from your network through this hole. If the port is closed, it isn't. ISA rules are concerned with the port as well but go much further in keeping the keys to your network. ISA checks to see whether the proper protocol is being used, who is welcome and who isn't, which direction the data is flowing, what kind of data it is, whether it is the right time of day to allow this, and so on. In short, there is no opening of ports. ISA administrators configure Firewall Policy Rules.


Components of a Firewall Policy Rule

Understanding firewall policy isn't rocket science. At first it appears intimidating because there are so many options. In reality, the options allow the administrator an unprecedented amount of flexibility and control. A brief description of each component follows.

  • Access rulesThe simplest definition of an access rule is that it allows clients on the source network to access a destination network. Together access rules make up Firewall Policy, and they can be seen listed in order in the Firewall Policy. Access rules are processed in order from 1 on up. Keeping your access rules in order is important from two standpoints: security and performance. Obviously, the closer to the top an access rule is in the list the faster the response time will be. From a security standpoint, when ISA gets to an access rule that allows your request, it is granted, even if another rule farther down the list would have prevented it.

  • Protocol definitionsProtocol definitions define how ISA should handle traffic from particular protocols. ISA management contains many predefined protocols. You can also add your own.

  • User setUser sets are groups of users to which a rule applies. ISA is Active Directory aware so a user set can consist of Active Directory users.

  • ScheduleSchedules let you determine when a rule will be in force.

  • Content filterA content filter specifies which types of files the rule applies to.

  • Domain name and URL setsA domain name set is similar to a URL set. Whereas a URL set contains a group of dissimilar URLs, a domain name set specifies an entire domain. Rules can be applied against either of these sets.




Microsoft Small Business Server 2003 Unleashed
Microsoft Small Business Server 2003 Unleashed
ISBN: 0672328054
EAN: 2147483647
Year: 2005
Pages: 253

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net