I have a perfectly good guest installation of ISA 2006 Server on my Hyper-V server and would like opinions on the security of this setup please.
Server setup - Windows 2008 Hyper-V Server host system with 4 NIC's:
NIC 1 and NIC 2 are connected to the LAN with internal IP addresses. These are used for a number of guest servers running on the Hyper-V server.
NIC 3 is connected to the DMZ port on the Juniper Firewall (the main hardware firewall) with a DMZ IP address. This NIC is used by the ISA Server guest only.
NIC 4 is connected to the internal LAN with an internal IP address. This NIC is used by the ISA Server only.
Internet --> Juniper Firewall Untrust port (main hardware firewall) --> Juniper Policy directs traffic to the DMZ port on the Juniper Firewall --> DMZ NIC of Hyper-V guest ISA Server --> ISA Server policy --> internal LAN NIC of Hyper-V guest ISA Server --> internal LAN
Basically, I know that this setup is secure if the ISA Server were to be a stand alone server / member server (ie: not hosted on Hyper-V). But I need to know if the other guest servers on the Hyper-V server are secure, because the ISA Server is also a guest on the same Hyper-V host server.
The ISA Server is used mainly for OWA Publishing and VPN Access.
Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.
When working with Microsoft SCVMM (System Center Virtual Machine Manager) in a Hyper-V virtualization environment, we have run across scenarios in which the failed migration of a VM from one host to another may leave the VM in a failed state. Specif…
RemoteFX is already in use today, but you're probably not aware of it. With the advent of Windows 2012 and Windows 8, RDP has gotten a whole lot better due to the fact that RDP now uses even more RemoteFX technologies to make desktop …
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
The Email Laundry PDF encryption service allows companies to send confidential encrypted emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…