نمایش نتایج: از شماره 1 تا 2 از مجموع 2
سپاس ها 1سپاس

موضوع: Configuring Sites for Direct Access

  
  1. #1
    نام حقيقي: 1234

    مدیر بازنشسته
    تاریخ عضویت
    Jul 2009
    محل سکونت
    5678
    نوشته
    5,634
    سپاسگزاری شده
    2513
    سپاسگزاری کرده
    272

    Configuring Sites for Direct Access

    کد:
    http://www.isaserver.org/articles/2004directaccessp1.html
    Part 1 – Configuring Direct Access for Web Proxy Connections

    One of the most common pieces of advice I give regarding ISA firewall access rules and firewall policy is "setup a split DNS and configure those sites for Direct Access". In the first part of a two-part series on Direct Access, I'll discuss what Direct Access is and how to Configure Direct Access for Web Proxy clients

    One of the best things I can hear from a new ISA firewall administrator who’s having problems accessing a Web site from behind an ISA firewall is "it worked when we were using a PIX". You have to ask yourself why they site worked when using a PIX. Was the PIX providing real security? Is "easy access" to all sites using all protocols your definition of security? If the ISA firewall blocks access to sites that you were previously able to reach without thinking about firewall configuration, then you need to take a long, hard look at the security and outbound access control your previous security solution provided.

    However, there will be times when you have problems accessing some sites from behind the ISA firewall. Not all Web site programmers or administrators are fully aware that many organizations use sophisticated, blended stateful packet inspection and proxy firewalls (like the ISA firewall) to protect their corporate assets. Because of this, connecting to their Web sites can be problematic. You’ll often find that these sites are Java based, but Java isn’t the only technology that falls victim to poor coding and implementation practices. For example, another common problem is seen with sites and applications that do not work correctly with authenticating Web proxies.
    When you run into this type of problematic site, the solution is to configure that site for Direct Access. Direct Access works a bit differently depending on the ISA client type you’re using:
    For Web Proxy client connections, Direct Access enables the client to use an alternate method to connect to the resource that bypasses the Web Proxy client configuration. The client system can use either its SecureNAT or Firewall client configuration to access the resource, with the Firewall client option being more secure
    For Firewall clients, Direct Access enables the host to bypass the Firewall client configuration to connect directly to a host that is on the same ISA firewall Network as the client making the request
    We’ll cover both types of Direct Access Configuration in this two part article. In part one (this article) we’ll discuss Direct Access configuration for Web Proxy clients.
    Direct Access for Web Proxy Clients

    You’ll likely find there are a few sites your clients can’t access when connecting to the site via the ISA firewall’s Web Proxy filter. By default, the ISA firewall’s HTTP Protocol Definition binds the HTTP Web Proxy filter to the HTTP protocol. This allows the ISA firewall to pass all Web (HTTP, HTTPS and HTTP-tunneled FTP) connections to the Web Proxy filter on the ISA firewall and benefit from the ISA firewall’s Web caching and deep HTTP application layer inspection feature set.
    While this is a good thing, you sometimes need to bypass the Web Proxy component to access sites that don’t work correctly with firewall’s Web Proxy filter. Let’s look at an example of how Direct Access can solve a connectivity issue with a site that does work correctly with a Web proxy firewall.
    Fist, we’ll assume that you’re running a high security environment and have installed the Firewall client on all client operating systems, and that you’ve configured all clients as Web Proxy clients (which can be done automatically during Firewall client installation). The problem is that you want to want to use Outlook Express to connect to your Hotmail account. You’ve created a simple firewall policy on the ISA firewall that includes the following rule set:
    1. Allow DNS outbound for all users
    2. Allow all protocols outbound access to all sites for authenticated users
    3. The default rule, what blocks all traffic moving through the ISA firewall
    This rule set looks like that in the figure below.

    Now we’ll configure the Firewall and Web Proxy client on the default Internal Network to connect to the Hotmail site using Outlook Express. When you try to access the site you’ll see the following error in the Outlook Express client.

    The error message includes the key phrase Proxy Authentication Required (The ISA Server requires authorization to full the request. Access to the Web Proxy service is denied). This demonstrates that the Outlook Express application does not work correctly with authenticating Web Proxy firewalls. The solution is to bypass the Web Proxy using Direct Access and enable the client system to leverage its Firewall client configuration to access the Hotmail Site.
    Note that this solution allows you to require authentication with the ISA firewall before access is allowed. The Firewall client enforces our high security requirements by sending credentials to the ISA firewall, even when the Web Proxy client configuration isn’t being used due to Direct Access. We do not want to remove our authentication requirements for outbound access, and we don’t need to. We just use the Firewall client configuration to access the site and our strong outbound access control firewall policy is enforced.

    We configure Direct Access in the Properties of the ISA firewall Network from which the request is received by the ISA firewall. For example, if you have four network interfaces installed on the ISA firewall that connect to the default External Network, the default Internal Network, a DMZ Network and a Services Network, and the client making the outbound request is located on the default Internal Network, then you need to configure the Direct Access settings in the Properties of the default Internal Network.
    To reach the Properties of the Network, open the Microsoft Internet Security and Acceleration Server 2004 management console and then expand the server name. Expand the Configuration node and click the Networks node. In the details pane, click the Networks tab and then double click the Internal Network.
    In the Internal Properties dialog box, click the Web Browser tab. On the Web Browser tab, click the Add button.

    In the Add Server dialog box, select the Domain or computer option and enter the name of the site that you want Direct Access to be used. In this example, one of the sites that we require Direct Access is the hotmail.com domain. Enter *.hotmail.com in the text box (the wildcard at the beginning of the URL will allow Direct Access to all servers in the Hotmail domain). Click OK.

    Repeat the process to add the following domains:
    *.msn.com
    *.passport.com
    *.passport.net
    Click Apply and then click OK in the Internal Properties dialog box. Click Apply to save the changes and update the firewall policy. Click OK in the Apply New Configuration dialog box.

    The new configuration information for the Firewall and Web Proxy clients is stored on the ISA firewall. By default, the Firewall and Web Proxy clients automatically update their configuration every six hours. You can force the clients to update their configuration immediately by restarting the client computer, or you can use the Firewall client application to force the update. This is one of the many reasons why you never want to hide the Firewall client icon in the system tray.
    Double click on the Firewall client icon in the system tray Click the Test Server button. This forces the Firewall client to pull the new configuration information from the ISA firewall. Click Close in the Testing ISA Server dialog box when the test completes, then click the Apply button in the Microsoft Firewall Client for ISA Server 2004 dialog box.

    Click the Web Browser tab. Confirm that there is a checkmark in the Enable Web browser automatic configuration checkbox and click Configure Now, and then click OK in the Web Browser Settings Update dialog box. Note that this autoconfiguration setting is not the same as the autoconfiguration setting in the browser’s Properties dialog box. The autoconfiguration settings in the browser’s Properties dialog box apply to wpad entries that enable the browser to automatically find the ISA firewall.
    Click Apply and then click OK in the Microsoft Firewall Client for ISA Server 2004 dialog box.

    You’ll now be able to connect when you open Outlook Express and access your e-mail from the Hotmail site. In the ISA firewall’s log file you can see that the connections are authenticated. You know that it’s the Firewall client making the connection instead of the Web proxy client because the URL shows the IP address of the Hotmail site and not the FQDN. You only see the FQDN in the log file when the Web Proxy client makes the connection. You can use third party utilities to get the URLs from the Firewall client connections.

    The great thing about Direct Access when the clients are configured as both Web Proxy and Firewall clients (which is what you should always do) is that even through we use Direct Access to bypass the Web proxy service on the ISA firewall, we don’t have to lower our security posture by removing authentication for outbound connections. The Firewall client picks up for the Web Proxy client and does the authentication heavy lifting.
    The same principles apply to any site that gives you problems because of incompatibility with the ISA firewall’s Web Proxy filter. Just enter the site’s name or IP address in the list of sites requiring Direct Access, and the Firewall or SecureNAT client configuration will take over.
    Note that if you haven’t deployed the Firewall client (which is the case for servers, which typically should not have the Firewall client installed), then you need to create an anonymous access rule that applies to the IP addresses of the clients on the ISA firewall Protected Network that need to use Direct Access to get to the problematic site.

    For example, suppose you have a crazy boss and he wants to run Outlook Express on a domain controller. You’ve told him it’s not a good idea to run client applications on servers. But he pays the bills so you have to do what he tells you to do. You don’t want to install the Firewall client on the domain controller, since a DC is a server. What you can do is add a rule allowing the domain controller anonymous access to the required sites.
    This solution requires:
    • A Domain Name Set for the sites you need to access
    • A Computer Set for the machines that don’t have the Firewall client installed
    • An Access Rule that allows the Computer Set access to the required protocols to the required sites
    The Domain Name Set would look like what appears in the figure below. The set includes the same sites that we configured for Web browser Direct Access for the Network from which the request arrives to the ISA firewall.

    The Computer Set would include the IP address of servers you want to access the approved site without authenticating to the ISA firewall. For example, for our boss who wants to use Outlook Express from the DC, the Computer Set would look like what appears in the figure below.

    The Access Rule allowing outbound access to the Hotmail site for the non-authenticating client would appear like that in the figure below. Note that you need to put this rule above any rule requiring authentication for the same protocols. In general, you should put your anonymous access rules above your authenticated access rules.

    Be aware that you will not get user information in the log files when you don’t require authentication. For this reason, I recommend that you enable anonymous outbound connections only when there are strong technical or political reasons for doing do.




    موضوعات مشابه:

  2. #2
    نام حقيقي: 1234

    مدیر بازنشسته
    تاریخ عضویت
    Jul 2009
    محل سکونت
    5678
    نوشته
    5,634
    سپاسگزاری شده
    2513
    سپاسگزاری کرده
    272
    کد:
    http://www.isaserver.org/articles/2004directaccessp2.html
    Part 2 – Configuring Direct Access for Firewall Clients and Publishing Scenarios

    In the first part of this two part series on configuring the ISA firewall to support Direct Access, we discussed how to configure the ISA firewall to support Direct Access for Web Proxy clients so that Web Proxy could access problematic Web sites. If you missed that article, check it out at Configuring Sites for Direct Access: Part 1 – Configuring Direct Access for Web Proxy Connections In this, part 2 of the series, we’ll talk about Direct Access for Firewall clients and we’ll also discuss how Direct Access is important in Web and Server Publishing scenarios.

    In this, part 2 of the series, we’ll talk about Direct Access for Firewall clients and we’ll also discuss how Direct Access is important in Web and Server Publishing scenarios. As a review, Direct Access works a bit differently based on the type of ISA client using the Direct Access configuration and the scenario you’re working with:
    For Web Proxy clients, Direct Access enables the Web Proxy client to connect to a resource through the ISA firewall via bypassing its Web Proxy client configuration. This allows the client computer to leverage its SecureNAT or Firewall client configuration to access the requested resource through the ISA firewall
    For Firewall clients, Direct Access enables the Firewall client computer to bypass its Firewall client configuration to connect directly to a host on the same ISA firewall Network on which the Firewall client computer is situated
    For both Web Proxy and Firewall clients, Direct Access enables the client to connect directly to published servers located on the same ISA firewall Network as the host making the request. This also requires that you have a split DNS.
    Let’s take a look at some examples to help illustrate these issues.
    In the figure below we have a server on the default ISA firewall’s Internal Network and we’ve published that server using with a Web or Server Publishing Rule. An external client connects to the published server via an IP address on the external interface of the ISA firewall and then the ISA firewall forwards the connection to the published server on the Internal Network. There are no problems here and Direct Access isn’t an issue.

    In the next figure we see an example of a loop back condition. We always want to avoid looping back through the ISA firewall to access resources on the same ISA firewall Network as the host making the request.
    In this example, the Firewall client computer on the default Internal Network makes a request to connect to the published Web server www.domain.com. The Firewall client resolves this name to the IP address on the external interface of the ISA firewall and attempts to loop back through the ISA firewall to access resources situated on the same ISA firewall Network as the client making the request (in this example, both the Firewall client making the request and the server are located on the default Internal Network).

    Problems with this configuration are:
    The Firewall client machine is resolving the name of the resource to which it wants to connect to the IP address on the external interface of the ISA firewall
    Connections to resources on the same ISA firewall Network loop back through the ISA firewall, which reduces the overall performance of the ISA firewall
    Connections that loop back through the ISA firewall may fail, or show inconsistent results and generate Help Desk calls
    Looping back through the ISA firewall to connect to resources on the same ISA firewall Network should be avoided at all costs. Jim Harrison refers to this condition as "isotropic bounce" http://www.isaserver.org/articles/14120_Errors_Discussion_and_Solution.html. Isotropism depends on directional independence, which clearly isn’t the case when dealing with IP networking and firewalls.

    The figure below shows how Direct Access solves the isotropic bounce problem. The Firewall (and Web Proxy client) is configured to use Direct Access to connect to resources on the same ISA firewall Network. The requesting client resolves the name to the actual IP address of the host on the default Internal Network and bypasses its Web Proxy and Firewall client configuration to connect directly to that resource, completely avoiding the ISA firewall.
    This configuration requires that we have a split DNS in place so that external and internal clients resolve the same name differently. When we have a split DNS in place, the external client resolves the name of the published resource, www.domain.com to the IP address on the external interface of the ISA firewall used to publish the server. Internal clients use the internal side of the split DNS to resolve the same name, www.domain.com, to the server’s internal IP address. This allows the Firewall and Web Proxy clients to leverage the Direct Access configuration to bypass the ISA firewall when connecting to resources located on the same ISA firewall Network.
    Note that the Firewall and Web Proxy clients need to be configured with a DNS server address in their TCP/IP interface configuration. In contrast to non-Direct Access scenarios, the Firewall and Web Proxy clients do not need to be configured with a DNS server address because the ISA firewall can perform "proxy" DNS services on behalf of Firewall and Web Proxy clients. However, the scenario where the Firewall and Web Proxy clients are not configured for Direct Access and not configured with an internal DNS server is limited to only the smallest of organizations that do not use Active Directory domains and do not host their own DNS services.

    I’ve done articles on the split DNS before, and I’ll do more in the future. If you want to see some of the previous work I’ve done with split DNS, check out http://www.isaserver.org/tutorials/You_Need_to_Create_a_Split_DNS.html I think I might have gone into too much detail in that article, so the next article I do on this subject will focus more on the small/medium sized business user.
    The key concept with Direct Access is that you bypass either the Web Proxy service or the entire ISA firewall itself based on the client’s requirements.
    Configuring Direct Access for Firewall Clients

    The Direct Access configuration for Firewall clients is done in the Properties of the Network from which the Firewall client connects to the ISA firewall. In this example, the Firewall clients and the resources are both connected to the default Internal Network. In this Microsoft Internet Security and Acceleration Server 2004 management console, expand the server name and then expand the Configuration node. Click on the Networks node. While on the Networks node, click the Networks tab in the details pane and then double click on the Internal Network.
    In the Internal Properties dialog box, click the Domains tab. On the Domains tab, click the Add button. In the Domain Properties dialog box, enter the domain name or the FQDN of the resource that you want to enable for Direct Access. In this example, we want to allow connections to all servers in domain.com to be via Direct Access. We use a wildcard at the beginning of the domain name to include all servers in the domain, as seen in the figure below. Click OK.

    The list of domains should include all domains you want Firewall clients to use Direct Access when connecting to servers in those domains. You also always want to include all your internal-only domains (Active Directory domains) in the list of Domain Names, so that that Firewall clients bypass their Firewall client configuration when connecting to resources in the same domain. Note that this can become a bit tricky when you span your Active Directory domain across multiple ISA firewall Networks. This is a special case and we discuss this in our book Configuring ISA Server 2004.
    You should also include all domains for which you have a split DNS configured. For example, if you have configured a split DNS for domain.com, mydomain.com, and newdomain.com, then you want to make sure that Firewall clients on the same Network that these servers are located on use Direct Access to connect to those servers, which allows them to bypass their Firewall client configuration to access these resources and not loop back through the ISA firewall to reach these servers.

    You can also leverage this list of domains configured on the Domains tab to enable Web Proxy clients to use Direct Access for these domains. Click on the Web browser tab. On the Web browser tab, put a checkmark in the Directly access computers specified in the Domain tab checkbox. Click Apply and then click OK. Click Apply to save the changes and update the firewall policy. Click OK in the Apply New Configuration dialog box.

    Remember to refresh the Firewall client and Web Proxy client configuration so that the changes take effect; otherwise, it can take up to six hours. Another important consideration when configuring Direct Access for Web Proxy clients is that they need to be configured to use the autoconfiguration script. The easiest way to do this is during installation of the Firewall client, but there are many other ways to automatically provision the Web Proxy client to use the autoconfiguration script. We spend a lot of time on this subject in Configuring ISA Server 2004, so check out chapter 5 for everything you want to know about ISA client provisioning and configuration.



    ARM سپاسگزاری کرده است.

کلمات کلیدی در جستجوها:

isa direct access

برچسب برای این موضوع

مجوز های ارسال و ویرایش

  • شما نمی توانید موضوع جدید ارسال کنید
  • شما نمی توانید به پست ها پاسخ دهید
  • شما نمی توانید فایل پیوست ضمیمه کنید
  • شما نمی توانید پست های خود را ویرایش کنید
  •