Solved

How is an ISA server firewall rules configured

Posted on 2007-11-25
4
554 Views
Last Modified: 2008-11-17
How do I read the configuration setting for an ISA firewall.  Where is the deny statement for internet?
Is the ISA firewall a Bastion firewall?
0
Comment
Question by:mutec1
  • 2
4 Comments
 
LVL 7

Accepted Solution

by:
mcse2007 earned 400 total points
ID: 20348294
0
 
LVL 51

Assisted Solution

by:Keith Alabaster
Keith Alabaster earned 100 total points
ID: 20348589
ISA can be a Bastion Host if you want it to but it is more flexible if it is joined to the domain.

Unless you enter a deny statement yourself, the default rule (at the bottom) which is automatically created and can not be deleted, is a deny all statement.

You do not mention the version of ISA Server that you are running.
If it is ISA2000 then the deny rules are actioned before any of the allow rules. In ISA2004/2006, the firewall policy in the gui is read from top to bottom.

Keith
0
 
LVL 7

Expert Comment

by:mcse2007
ID: 20355471
keith, slow down you are embarrassing everyone below you from top 15 Experts :-)

0
 

Author Comment

by:mutec1
ID: 20355844
Thanks to all.
0

Featured Post

ScreenConnect 6.0 Free Trial

Discover new time-saving features in one game-changing release, ScreenConnect 6.0, based on partner feedback. New features include a redesigned UI, app configurations and chat acknowledgement to improve customer engagement!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
internal dns requests through isa 2004 6 721
TMG Migration to F5 1 2,579
2007 exchange behind ISA internal OWA working fine external 500 error 5 590
ActiveSync issues 16 149
ISA Server detected routes through the network adapter LAN that do not correlate with the network to which this network adapter belongs What does this mean and how can one go about correcting it? In simple terms, this error message indicates t…
Common practice undertaken by most system administrators is to document the configurations and final solutions of anything performed by them for their future use and reference. So here I am going to explain how to export ISA Server 2004 Firewall pol…
This video shows how to use Hyena, from SystemTools Software, to bulk import 100 user accounts from an external text file. View in 1080p for best video quality.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

832 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question