Microsoft Internet Security and Acceleration (ISA) Server 2004 Administrators Pocket Consultant (Pro-Administrators Pocket Consultant)

In this chapter, we focus on the Microsoft ISA Server firewall policy, specifically the system policy, firewall policy, and access rules. We explain how policies are processed and how you can easily export and import your policy configurations. The second half of the chapter focuses on publishing, allowing external sources to access your internal network resources securely and safely.

Understanding How ISA Server Processes Traffic

ISA Server inspects traffic by referring to three sets of rules in the order shown in Figure 8-1.

Figure 8-1: ISA Server processes network rules, system policy rules, and then firewall policy rules when inspecting network traffic. After the rules are processed, the network rules determine whether to route or NAT the traffic. Finally client-specific rules are processed.

Категории