Firewall Chaining


Whereas Web chaining specifically addresses requests to upstream servers from Web proxy clients, firewall chaining defines how requests from both firewall clients and SecureNAT clients to upstream servers should be handled.

To configure firewall chaining, follow these steps:

  1. In the console tree, expand the server name, expand Configuration, and then click Networks.

  2. In the details pane, click the Web Chaining tab.

  3. In the task pane, click the Tasks tab. Under Related Tasks, click Define Firewall Chaining Properties.

  4. On the Firewall Chaining Properties dialog box, as shown in Figure 9-4, you can specify how requests are forwarded to the upstream server.

    • Use The Primary Connection This option uses the ISA Server computer's primary connection to retrieve the requested data.

    • Chain To This Computer Connect to a specified ISA Server computer (to prevent name resolution problems and speed performance, enter an IP address rather than a host name). You can also specify an account used to authenticate with the specified ISA Server computer.

  5. Click OK when you have made the changes to the Web chaining rule. If you did make changes, you have to apply the changes by clicking Apply in the details pane.

image from book
Figure 9-4: This Properties dialog box lets you configure how requests are routed to the upstream server.




Microsoft Internet Security and Acceleration ISA Server 2004 Administrator's Pocket Consultant
Microsoft Internet Security and Acceleration (ISA) Server 2004 Administrators Pocket Consultant (Pro-Administrators Pocket Consultant)
ISBN: 0735621888
EAN: 2147483647
Year: 2006
Pages: 173

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net