Solved

How is an ISA server firewall rules configured

Posted on 2007-11-25
4
556 Views
Last Modified: 2008-11-17
How do I read the configuration setting for an ISA firewall.  Where is the deny statement for internet?
Is the ISA firewall a Bastion firewall?
0
Comment
Question by:mutec1
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 7

Accepted Solution

by:
mcse2007 earned 400 total points
ID: 20348294
0
 
LVL 51

Assisted Solution

by:Keith Alabaster
Keith Alabaster earned 100 total points
ID: 20348589
ISA can be a Bastion Host if you want it to but it is more flexible if it is joined to the domain.

Unless you enter a deny statement yourself, the default rule (at the bottom) which is automatically created and can not be deleted, is a deny all statement.

You do not mention the version of ISA Server that you are running.
If it is ISA2000 then the deny rules are actioned before any of the allow rules. In ISA2004/2006, the firewall policy in the gui is read from top to bottom.

Keith
0
 
LVL 7

Expert Comment

by:mcse2007
ID: 20355471
keith, slow down you are embarrassing everyone below you from top 15 Experts :-)

0
 

Author Comment

by:mutec1
ID: 20355844
Thanks to all.
0

Featured Post

Free Tool: ZipGrep

ZipGrep is a utility that can list and search zip (.war, .ear, .jar, etc) archives for text patterns, without the need to extract the archive's contents.

One of a set of tools we're offering as a way to say thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Forefront Threat Management Gateway 2010 or FTMG comes with some very neat troubleshooting tools built-in when trying to identify what is actually happening behind the scenes within the product when traffic is passing through its interfaces. To the …
Common practice undertaken by most system administrators is to document the configurations and final solutions of anything performed by them for their future use and reference. So here I am going to explain how to export ISA Server 2004 Firewall pol…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

726 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question