Solved

External Access to Share point, what's secure?

Posted on 2010-09-23
4
765 Views
Last Modified: 2016-10-25
Hi Guys,

We have ASA 5540, ISA, WISP, SQL, Netscaler and sharepoint, what's the best secure way to architect this with one AD and single sign on?

ASA has outside, inside "LAN", and DMZ .

AD, WISP, ISA, SQL and Sharepoint are on the LAN side.

Netscaler has one leg on the DMZ and one on LAN

Your help is greatly appreciated!
0
Comment
Question by:smartnet
  • 2
4 Comments
 
LVL 51

Accepted Solution

by:
Keith Alabaster earned 500 total points
Comment Utility
Quite straightforward as Sharepoint and SQL are inside as opposed to in the DMZ. You have not mentioned whether ISA is actually installed as the intetrnal firewall or just as a proxy server but I will assume ISA is joined to the internal domain in either case.

This link provides the TechNet article regarding publishing the majority of common applications - including Sharepoint-  securely through ISA 2006.
http://technet.microsoft.com/en-gb/library/bb794854.aspx

In summary though, using the ISA server publishing wizard is the normal, recognised approach using https bridging and certificates.

Keith
0
 

Author Comment

by:smartnet
Comment Utility
I think ISA is working as a proxy server rather than a firewall, do you recommend putting it in the DMZ, if so what about authentication??
0
 
LVL 51

Expert Comment

by:Keith Alabaster
Comment Utility
The recommendation is always to use ISA or FTMG as a firewall/proxy rather than just a proxy and to have ISA or FTMG as a member of the domain.

if ISA/FTMG only has one nic then it can ONLY be a proxy server.

You can use the LDAP connection options though in the general confiuration if you decide to install ISA solely as a proxy server in the DMZ.
0
 
LVL 10

Expert Comment

by:simonlimon
Comment Utility
It is much better for isa to be a member of the domain, if not you can't really have true sso as kerberos delegation is not possible... That would be the optimal way to publish a web page.
0

Featured Post

How does your email signature look on mobiles?

Do your employees use mobile devices to reply to emails? With mobile becoming increasingly important to the business world, it is in your best interest to make sure that your email signature looks great across all types of devices.

Join & Write a Comment

Suggested Solutions

These days socially coordinated efforts have turned into a critical requirement for enterprises.
Restoring deleted objects in Active Directory has been a standard feature in Active Directory for many years, yet some admins may not know what is available.
This tutorial will walk an individual through the steps necessary to configure their installation of BackupExec 2012 to use network shared disk space. Verify that the path to the shared storage is valid and that data can be written to that location:…
To efficiently enable the rotation of USB drives for backups, storage pools need to be created. This way no matter which USB drive is installed, the backups will successfully write without any administrative intervention. Multiple USB devices need t…

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now