Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

ISA 2004

Posted on 2006-07-19
4
Medium Priority
?
366 Views
Last Modified: 2013-11-16
Is there a "standard" set of policies that allows ISA 2004 to function in a basic edge firewall configuration?  I am new at this and I'm concerned that I am missing critical policies or perhaps opening ISA up to much.

Wes
0
Comment
Question by:hmcnasty
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
4 Comments
 
LVL 51

Accepted Solution

by:
Keith Alabaster earned 2000 total points
ID: 17145395
No such thing really. By selecting the edge firewall template you can select whether you want to start with restricted or full access but the default policy allows all outgoing, blocks all incoming. The default policy does not, by default, allow outgoing traffic from the local host (ISA server itself).

If you can explain what you are looking to achive I can likely assist with the necessary policies.
For example,

Allow all web traffic (http & https) for all users except for web sites in the *.sex.com domain
Allow all outgoing DNS and SMTP traffic
Deny all traffic to ip address x.y.z.d

Allow incoming email to the exchange server
Allow Outlook web access etc etc

0
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 17173517
Any update?
0
 

Author Comment

by:hmcnasty
ID: 17178538
Yeah,  it was this same as the other  on my other segment.  Since I had  ISA on my domain box it messed everything up.  I seem to have it ok now but I'm sure I'll have some questions.
0
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 17179002
Well done; you'll soon be an ISA guru :
0

Featured Post

Free Tool: Subnet Calculator

The subnet calculator helps you design networks by taking an IP address and network mask and returning information such as network, broadcast address, and host range.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Wikipedia defines 'Script Kiddies' in this informal way: "In hacker culture, a script kiddie, occasionally script bunny, skiddie, script kitty, script-running juvenile (SRJ), or similar, is a derogatory term used to describe those who use scripts or…
The DROP (Spamhaus Don't Route Or Peer List) is a small list of IP address ranges that have been stolen or hijacked from their rightful owners. The DROP list is not a DNS based list.  It is designed to be downloaded as a file, with primary intention…
This course is ideal for IT System Administrators working with VMware vSphere and its associated products in their company infrastructure. This course teaches you how to install and maintain this virtualization technology to store data, prevent vuln…
In this video, Percona Solutions Engineer Barrett Chambers discusses some of the basic syntax differences between MySQL and MongoDB. To learn more check out our webinar on MongoDB administration for MySQL DBA: https://www.percona.com/resources/we…
Suggested Courses

722 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question