ISA 2006 on Hyper-V

Posted on 2011-02-17
Last Modified: 2012-05-11

I have a perfectly good guest installation of ISA 2006 Server on my Hyper-V server and would like opinions on the security of this setup please.

Server setup - Windows 2008 Hyper-V Server host system with 4 NIC's:

NIC 1 and NIC 2 are connected to the LAN with internal IP addresses.  These are used for a number of guest servers running on the Hyper-V server.
NIC 3 is connected to the DMZ port on the Juniper Firewall (the main hardware firewall) with a DMZ IP address.  This NIC is used by the ISA Server guest only.
NIC 4 is connected to the internal LAN with an internal IP address.  This NIC is used by the ISA Server only.

Network setup:

Internet -->  Juniper Firewall Untrust port (main hardware firewall) --> Juniper Policy directs traffic to the DMZ port on the Juniper Firewall --> DMZ NIC of Hyper-V guest ISA Server --> ISA Server policy --> internal LAN NIC of Hyper-V guest ISA Server --> internal LAN

Basically, I know that this setup is secure if the ISA Server were to be a stand alone server / member server (ie: not hosted on Hyper-V).  But I need to know if the other guest servers on the Hyper-V server are secure, because the ISA Server is also a guest on the same Hyper-V host server.

The ISA Server is used mainly for OWA Publishing and VPN Access.

Question by:Pifco1

Expert Comment

ID: 34915218
Chapter 3 seems relevant to your needs, check it out.
LVL 23

Expert Comment

by:Suliman Abu Kharroub
ID: 34915222
Obviusely, the physical host machine could not be secured with ISA, as a result VHD files ( VMs Virtual hard disks) will not be secured too, which may effect these VMs if someone grant access (hack) your physical server.

For gust VMs as long as the VMs accessed the internet throw ISA server they are secured by ISA server.
LVL 51

Expert Comment

by:Keith Alabaster
ID: 34915296
Totallydown to your connections but as you have described it, it is secure and supported.

Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

LVL 29

Accepted Solution

pwindell earned 250 total points
ID: 34916545

Virtualize your ISA or Forefront TMG servers (Jim Harrison)
LVL 51

Expert Comment

by:Keith Alabaster
ID: 34916788
Win some lose some :)
LVL 29

Expert Comment

ID: 34917986
Win what? lose what?
I thought Jim says they same thing as those documents.  Some people just like to see it as a video :-)
LVL 29

Expert Comment

ID: 34918058
Aw,..I see,..he gave me the point,...I didn't know he did that.

Author Comment

ID: 34918189
I can select whichever answer I find most useful to my question, thanks.

But if you have to know the reason:
pwindell sent the link with the video, this was a good video, I enjoyed watching it, however on the link he sent was also this:

See KB article 957006 which states ISA (and other) products are officially supported on Hyper-V.

Which in turn directs you to a MS Technet article on:

Microsoft Internet Security and Acceleration (ISA) Server
Microsoft ISA Server is supported. For more information about support for ISA Server, visit the following Microsoft website:

So that answered my initial question:

But I need to know if the other guest servers on the Hyper-V server are secure, because the ISA Server is also a guest on the same Hyper-V host server.
LVL 29

Expert Comment

ID: 34918297
Jim deals with that later toward the end of the video when dscussing the unbinding and the diabling of Nics.  In the end the only nic that needs to be enabled and have TCP/IP bound to it would be the Hyper-V Management interface on the Management Network that does not even physically touch any other LAN.  That is too much over-kill for me personally, but it definately gets the job done.  You just have to make sure that all your Virtual Switches and Virtual Networks with Hyper-V are correctly configure before you start unbinding TCP/IP and disabling the Physical Nics.
LVL 29

Expert Comment

ID: 34918362
If it were me I would probably only do that with the External Nic and leave the others alone,...then again I might just give the External Nic a bogus IP# that would not "work" and forget it.
LVL 51

Expert Comment

by:Keith Alabaster
ID: 34918993
Your question, your points to do with as you wish.

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Allow Traffic through Forefront TMG 14 128
Phisical to Virtual machine creation 8 47
Hyper-V virtual switch setup 2 70
Identity Access Management Depolyment 2 138
Guide: Build a Hyper-V Cluster Introduction We all know that Hyper-V is a cost effective solution (see, and now we want to take advantage of it, right?  Unfortunately, hardware fails, leading to dow…
Introduction Windows 2012 is here - it is upon us, and I hope that like me, you will upgrade your Hyper-V to the new version which has been promised to be a lot more stable, flexible and powerful than its predecessor in Windows 2008 R2.  Setting up…
In an interesting question ( here at Experts Exchange, a member asked how to split a single image into multiple images. The primary usage for this is to place many photographs on a flatbed scanner…
I've attached the XLSM Excel spreadsheet I used in the video and also text files containing the macros used below.…

830 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question