How to install configure ISA 2004, so it can allow all inbound access the internet and send email from exchange

Posted on 2009-02-18
Last Modified: 2012-05-06
How to install configure ISA 2004, so it can allow all inbound access the internet and send email from exchange, as well as enable VPN client.
basic only I dont want complicated config.
Question by:ssalim1
    LVL 15

    Expert Comment

    ummm create rules to allow all outbound access for your internal network, which will allow internet access and SMTP mail access out from exchange
    Then enable VPN (with PPTP or L2TP.... but if you want simple, PPTP is the way to go)
    LVL 2

    Expert Comment

    Dont forget that before any of the firewall rules will be applied you must create a network rule establishing a NAT relationship between the internal and external networks.
    LVL 51

    Expert Comment

    by:Keith Alabaster
    No offence but that is not accurate. If the ISA has been installed as a backend firewall then the network relationship between internal and external is route - not nat. In addition, many installations provide the NAT condition on their external routers. The default installation for a frontend ISA will be NAT automatically.

    LVL 2

    Expert Comment

    You are correct, a route relationship is used in many cases.  when the question posted "basic only I don't want complicated config" i figured that he would not be having back to back firewalls, so I made an assumption that he would be using NAT.  I use a public addressed DMZ on ISA that utilizes route relations, but I would start to consider those more complicated setups.
    LVL 2

    Accepted Solution

    Oops, hit submit a little to soon.  I just wanted to say that the point of my original comment was to not forget about the Network Rules.  I have seen a lot of new ISA users have problems because they setup firewall policies without having the network rules in place first. Without the network rules being in place properly, the firewall policies will not accomplish anything.

    Author Comment

    duplicated question

    Featured Post

    Why You Should Analyze Threat Actor TTPs

    After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

    Join & Write a Comment

    Suggested Solutions

    ISA Server detected routes through the network adapter LAN that do not correlate with the network to which this network adapter belongs What does this mean and how can one go about correcting it? In simple terms, this error message indicates t…
    There are several problems reported according slow link speeds or poor performance in TMG 2010, UAG 2010 or ISA 2006. I want to collect here some of the common issues together to give a brief overview what can be the reason. Nevertheless, not all of…
    Excel styles will make formatting consistent and let you apply and change formatting faster. In this tutorial, you'll learn how to use Excel's built-in styles, how to modify styles, and how to create your own. You'll also learn how to use your custo…
    Access reports are powerful and flexible. Learn how to create a query and then a grouped report using the wizard. Modify the report design after the wizard is done to make it look better. There will be another video to explain how to put the final p…

    734 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    22 Experts available now in Live!

    Get 1:1 Help Now