Solved

ISA server on a virtual machine

Posted on 2010-11-12
4
632 Views
Last Modified: 2012-08-14
Folks

Planing to install ISA server on a VM and deploy exchange server behind it.

Wondering if ISA server VM needs  dedicated network interfaces for internal and external networks  ... any ideas ?
0
Comment
Question by:akhalighi
4 Comments
 
LVL 15

Expert Comment

by:GreatVargas
Comment Utility
It does not need dedicated NIC's, but for security reasons you can dedicate a NIC for the external network. Also you need that a physical NIC has physical and dedicated access to a DMZ or external network
0
 
LVL 49

Expert Comment

by:Akhater
Comment Utility
the external NIC of ISA needs to be dedicated, the internal one can be shared
0
 

Assisted Solution

by:bryant_buckland
bryant_buckland earned 50 total points
Comment Utility
We have our ISA Server setup with a DMZ dedicated network and then another virtual NIC for the internal.  For best security practices you really want it like this.  You could NAT from the outside firewall to the internal interface and then port forward on a separate internal IP on the same virtual NIC, but you are really defeating the security aspect of ISA to a great degree by doing this.  You can also trunk all traffic to the ESX host/Hyper V host on one physical NIC and then still add separate virtual adapters as well if the case is your host does not have separate NIC's.  In our case our host has one physical connection for the console, one for our external network (non-trunked/non-vlan tagged) and then another NIC for all the internal production VLAN tagged networks.
0
 
LVL 29

Accepted Solution

by:
pwindell earned 75 total points
Comment Utility
Virtualize your ISA or Forefront TMG servers (Video, Jim Harrison)
http://technet.microsoft.com/en-us/edge/virtualize-your-isa-or-forefront-tmg-servers.aspx
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

We are happy to announce a brand new addition to our line of acclaimed email signature management products – CodeTwo Email Signatures for Office 365.
Local Continuous Replication is a cost effective and quick way of backing up Exchange server data. The following article describes the steps required to configure Local Continuous Replication. Also, the article tells you how to restore from a backup…
In this video we show how to create a Shared Mailbox in Exchange 2013. We show this process by using the Exchange Admin Center. Log into Exchange Admin Center.: First we need to log into the Exchange Admin Center. Navigate to the Recipients >> Sha…
In this Micro Video tutorial you will learn the basics about Database Availability Groups and How to configure one using a live Exchange Server Environment. The video tutorial explains the basics of the Exchange server Database Availability grou…

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

9 Experts available now in Live!

Get 1:1 Help Now