Solved

Which service of ISA2006 is the one i should restart?

Posted on 2008-06-10
5
2,862 Views
Last Modified: 2013-11-16
I set up an ISA 2006 firewall and proxy server on our testing environment. I noticed that there are four services running for ISA2006, they are:
1. Microsoft Firewall
2. Microsoft ISA Server Control
3. Microsoft ISA Server Job Scheduler
4. Microsoft ISA Server Storage

My question is if i want to restart ISA2006 service, which one should i choose to restart. In other words, which one is the most fundamental one. I know on exchange server, there is a service named exchange admin service i can use to restart all exchange related services.

Besides, would you guys give me a simple explaination of these four services, or a link to instroduce these four ISA2006 services.

Thank you in advance.
ISA2006ServicesList.bmp
0
Comment
Question by:Jason Yu
  • 3
  • 2
5 Comments
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 21755519
Firewall service is the normal one to restart,

Firewall service - this is the traditional service that runs the proxy itself.

Control Service - Controls the ISA server policy etc

Job Scheduler   - Things that you have automated in ISA - you can schediule to pull down web sites to rebuild your cache at periodic times, setting up the schedule in ISA of when people are allowed to use the services etc

Server Storage  - CSS - the central repository of where the ISA Enterprise configs are held

Keith
0
 

Author Comment

by:Jason Yu
ID: 21756160
Thank you, do you have any more resource about these services.

Besides, how to improve my ISA firewall operation skill, i think you are an expert on ISA firewall.

Comparing to hardware firewall, i think ISA 2006 software firewall is more powerful and functional, do you agree with it.

Also, i want to know, comparing to CISCO's PIX and ASA firewall, which one is hard to set up. I didn't have opportunity to use CISCO's firewall products, i only used Juniper's and sonic wall's hardware firewall.

Thank you for your timely reply.
0
 
LVL 51

Accepted Solution

by:
Keith Alabaster earned 500 total points
ID: 21756975
Do the MS training courses, read the MS Press ISA2004 manuals or check this link out. 9There are no 2006 manuals as it is too similar to 2004 in method of operation. Download the evaluation versions from the MS Web site and build a test box using Virtual PC. No better way to learn.
http://technet.microsoft.com/en-us/library/bb898433(TechNet.10).aspx

No, I don't agree. All firewalls have their weaknesses and strengths and each product should be selected on its merits to meet a specirfic set of requirements. The Cisco PIX and the ISA2004/2006 firewall both meet the EAL4+ independent accreditation - the nest there is. ISA is also a fantastic proxy server also and this generally swings it for me. Only used the ASA box once and, personally, did not like it. Still a good unit though according to reports.

They are all easy to setup out of the box if you are suitably trained or knowledgeable in the respective technologies. These are all specialist products and to get the best out of them requires an understanding of what they do and how they operate.

If you do it properly and document/model what you want to achieve first on paper, then in a test environment before putting into a production environment, then it is quite straightforward.
0
 

Author Comment

by:Jason Yu
ID: 21780813
Thank you very much for your explaination.
0
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 21780983
Thanks :)
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

If you are like regular user of computer nowadays, a good bet that your home computer is on right now, all exposed to world of Internet to be exploited by somebody you do not know and you never will. Internet security issues has been getting worse d…
Forefront Threat Management Gateway 2010 or FTMG comes with some very neat troubleshooting tools built-in when trying to identify what is actually happening behind the scenes within the product when traffic is passing through its interfaces. To the …
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

760 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now