Solved

How is an ISA server firewall rules configured

Posted on 2007-11-25
4
555 Views
Last Modified: 2008-11-17
How do I read the configuration setting for an ISA firewall.  Where is the deny statement for internet?
Is the ISA firewall a Bastion firewall?
0
Comment
Question by:mutec1
  • 2
4 Comments
 
LVL 7

Accepted Solution

by:
mcse2007 earned 400 total points
ID: 20348294
0
 
LVL 51

Assisted Solution

by:Keith Alabaster
Keith Alabaster earned 100 total points
ID: 20348589
ISA can be a Bastion Host if you want it to but it is more flexible if it is joined to the domain.

Unless you enter a deny statement yourself, the default rule (at the bottom) which is automatically created and can not be deleted, is a deny all statement.

You do not mention the version of ISA Server that you are running.
If it is ISA2000 then the deny rules are actioned before any of the allow rules. In ISA2004/2006, the firewall policy in the gui is read from top to bottom.

Keith
0
 
LVL 7

Expert Comment

by:mcse2007
ID: 20355471
keith, slow down you are embarrassing everyone below you from top 15 Experts :-)

0
 

Author Comment

by:mutec1
ID: 20355844
Thanks to all.
0

Featured Post

Free Tool: Postgres Monitoring System

A PHP and Perl based system to collect and display usage statistics from PostgreSQL databases.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Microsoft's ISA Server has been its pre-eminent security product for about a decade and is still regarded amongst the well-informed as one of the best software firewalls and application gateways ever released, by any manufacturer. ISA Server has bee…
So the following errors occurs in 2 ways that I am aware of at this stage, and you receive one of the following error messages: ERROR 1. When trying to save a rule: No Web listener is specified for the Web publishing rule Autodiscovery Publishin…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
Although Jacob Bernoulli (1654-1705) has been credited as the creator of "Binomial Distribution Table", Gottfried Leibniz (1646-1716) did his dissertation on the subject in 1666; Leibniz you may recall is the co-inventor of "Calculus" and beat Isaac…

839 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question