نمایش نتایج: از شماره 1 تا 3 از مجموع 3

موضوع: ISA Clients

  
  1. #1
    نام حقيقي: 1234

    مدیر بازنشسته
    تاریخ عضویت
    Jul 2009
    محل سکونت
    5678
    نوشته
    5,634
    سپاسگزاری شده
    2513
    سپاسگزاری کرده
    272

    ISA Clients

    کد:
    http://www.isaserver.org/tutorials/ISA_Clients__Part_1__General_ISA_Server_Configuration.html
    Part 1 : General ISA Server Configuration


    ISA server can support three client types; SecureNAT, Web Proxy and Firewall. How well it supports them depends on the infrastructure you provide for ISA to work within. Since ISA operates in conjunction with Windows 2000, you should provide both internal and external DNS servers. That way, ISA can use its favorite name resolution for all names and it and its clients will be all the happier for it. DNS options for ISA server are outlined in this article.
    If you’re looking for a tutorial on how to set up the ISA server before you install ISA, then you want this article.
    Note: all screen shots in this article are made using the ISA Management MMC in Advanced mode.


    Definitions:

    • Auto-detection – This is a feature of ISA (WPAD) that allows Internet Explorer (v 5.0 or higher) browsers to configure themselves to operate properly with the ISA server.
    • DNS - Domain Name Services; the services residing on a computer that are able to answer a name resolution query. How they answer that query depends on many settings for that server.
    • FQDN – Fully Qualified Domain Name; this is a computer name that indicates its logical association by virtue of the domain structure associated with the name. For instance, www.microsoft.com indicates a host named “www” that lives in the domain “microsoft” under the top-level domain “com”. These names are always separated by dots “.” and are also known as “dotted decimal”.
    • GUID – Globally Unique IDentifier; this is a very large number that is guaranteed to be unique. ISA uses these to identify various aspects of its configuration.
    • LAT host – This is a computer that operates in the subnet that is defined in the LAT. All traffic to and from this host is NAT-ed through the ISA
    • NetBIOS name – See “unqualified name”
    • Record – This is an entry in a DNS zone that represents a single element, such as a host, a mail server or even another zone.
      Secondary Protocol – Any protocol used by an application that differs from the one used to make the initial (primary) connection through the ISA is considered a secondary protocol.
    • TTL – Time-to-live; indicates how long (in seconds) a name record may live in the requester’s name cache before it must be refreshed
      Unqualified name – This is a host name without the form. Also known as the NetBIOS, or WINS name.
    • WINS – Windows Internet Name Services; this is a name resolution service similar to DNS, except that it deals strictly with NetBIOS (unqualified) names
    • WPAD – Windows Proxy Auto Detection; a feature of ISA that is supported in Internet Explorer 5.0 and higher. When configured properly, it enables IE to configure itself dynamically.

    ISA Operating Modes:

    • Cache – This is the least capable mode, since only the Web Proxy and optionally, the caching services are installed and running. This is also the only mode in which ISA can operate with a single NIC. Only Web Proxy clients are supported in this mode, sine a LAT is needed for ISA to understand SecureNAT and Firewall Clients. This is also the only mode that cannot support the H.323 Gatekeeper service.
    • Firewall – This is a combination of Firewall and Web Proxy services, without the Web Cache service. All of the main features of ISA are available here and all client types are supported. ISA must have at least two NICs to operate in this mode; one external, one internal (LAT).
    • Integrated – This is the full-blown, all-out, feature-packed installation; Web Proxy, Firewall and Web Caching are all together having a great big packet-munching party just for your pleasure. The only real difference between this and Firewall mode is the Web Caching service.
      ISA Clients:
    • SecureNAT – This a LAT host that has a default route through the network to the ISA as its only means of Internet communication. In a simple network (no routers), this client has the ISA primary internal IP as its default gateway. In a complex (routed) network, this gets a bit tricky.
    • Firewall – This is a LAT host that has the ISA Firewall client software installed, enabled and the application is using it.
      Web Proxy – This is simply an application (IE or other web-enabled application) on a LAT host that uses proxy requests to the ISA outbound web listener IP and port to reach the Internet

    ISA Server Configuration:
    ISA client functionality is heavily dependent on proper configuration of the ISA server itself. If the ISA has difficulty resolving hostnames or reaching the Internet, so will the clients. Test your ISA repeatedly during installation and setup. That way, you’ll know that any change in behavior was probably a result of your last actions.

    • Outgoing Web Requests Listener – In order for ISA to function as a Web proxy, the Web proxy service (w3proxy) has to be running and the Outbound Web Requests Listener has to be configured and enabled. To see and change this setup, open the ISA Management MMC and drill down to Servers and Arrays, . Right-click and select Properties. Click the Outgoing Web Requests tab and you’ll be rewarded with something like this:

    By default, ISA enables the proxy service on all of the ISA internal IPs at port 8080 (including 127.0.0.1; the localhost IP), regardless of operating (Firewall, Integrated, Cache) mode. That port is used because the ISA Auto Discovery functionality operates at port 80 on all of the ISA internal IPs. To disable the Outgoing Web Requests listener, simply select Configure listeners individually per IP address and don’t select any IPs to listen on.
    • Auto Discovery listener – This is one of the great heartaches for folks trying to run IIS and ISA on the same server, even when they limit IIS to the internal IPs. Since no two applications or services may claim the same TCP/IP resources, it becomes a race and the loser gets denied. This is also the source of the dreaded WPAD functionality. Click on Auto Discovery and you’ll see the default settings:

    If you don’t need or want Auto Discovery, then just uncheck Publish automatic discovery information. That will free up port 80 on the internal IPs.
    Note that ISA can function as a Web proxy server using only one NIC. The only ISA operating mode that supports single-NIC operation is Cache Mode.
    • Site and Content Rules – This is where we control HTTP and FTP content that passes through the Web Proxy service. By default, ISA creates a single “Allow rule” that allows any request to pass. You can play all sorts of allow / deny games in here, but be very careful; you can create conflicting rules that will leave your ISA totally blocked.


    • Protocol Rules – This is just one of many areas of control within the mind of ISA, but the most easily overlooked. At the bare minimum, you have to allow HTTP and HTTPS in order to have web access for your LAT hosts. There are many more protocols, but without those, you can’t browse the web. You can see that I’ve defined a great many protocol rules for my LAT hosts to use; some of which are custom definitions.


    • IP Routing - Next, we make sure that all SecureNAT client traffic flows unimpeded (given the proper rule sets, of course). ISA has a setting called “Enable IP Routing” that is disabled by default. When enabled, this setting allows ISA to pass ICMP (pings) traffic from the LAT to the Internet.
      Open the ISA Management MMC and drill down to IP Packet Filtering. Right-click on it, choose Properties and you’ll be greeted with the following dialog:

    The setting we’re interested in is “Enable IP routing”. By enabling this, we allow ISA to use “kernel mode data pumping” to pass traffic. This is explained in KB article Q297347.
    • HTTP Redirector – This is where we exercise control over the Firewall and SecureNAT requests for web services. Open the ISA Management MMC to Servers and Arrays, Extensions, Application Filters. Right-click on HTTP Redirector Filter and select Properties. Select the Options tab and you’ll have this:

    Here, we can decide how SecureNAT and Firewall client web requests are handled. If you want to force all users through the Web proxy service, then Redirect to local Web Proxy service is your desired choice. You’ll notice that this option also provides us the ability to allow bypassing the Web proxy service should it be unresponsive. This has the benefit of allowing SecureNAT and Firewall clients to still reach the Internet, but it also allows them to bypass the Web Proxy filtering.
    Send to requested Web Server allows SecureNAT and Firewall web requests to bypass the Web proxy service all the time. This obviates the use of browser proxy settings fir Firewall and SecureNAT clients.
    Reject HTTP requests from Firewall and SecureNAT clients allows you to force the Web proxy settings on your users. No browser settings, no web.
    • Local Domain Table – This is critical information for both IE and the Firewall client. Any domain that is entered here causes two things to happen:
      1. Web Proxy and Firewall clients resolve that domain name themselves (not via the related ISA service), if they have a DNS server to query
      2. Web Proxy clients make their requests directly to any server in that domain, ignoring ISA proxy services.


    • Name Resolution – The correct IP settings for your ISA server are absolutely critical. At the very least, you have to provide a DNS server for ISA to resolve external FQDN on behalf of Web Proxy and Firewall clients, and you should provide an internal DNS server for the internal network as well. ISA lives on a W2K server and W2K prefers DNS to any other name resolution scheme. Relying on WINS or NetBIOS broadcast name resolution (yuck!) is a sure recipe for intermittent troubles later on.
      ISA provides for its own DNS lookups by creating a DNS Lookup Packet Filter. Make sure you leave this enabled, or ISA may not resolve external names correctly.
    • Web Proxy and Firewall DNS cache:
      The Web Proxy and Firewall services provide very basic DNS “services” that are totally dependent on the DNS settings made in the ISA IP configurations. They will resolve FQDN requests for Web and Firewall clients using the DNS servers as defined in the ISA IP configuration. Errors here will make name resolution an unholy mess for your Web and Firewall clients. Make sure your ISA server can resolve names properly and quickly!
      The really interesting part is that they have the unique ability to totally ignore the TTL normally associated with the DNS record received from a DNS server. By default, all records held by the Web Proxy and Firewall DNS caches have a TTL of 6 hours, regardless of the actual TTL associated with the record! Needless to say, this can wreak havoc on your client’s name resolution; not to mention any DNS-related testing you may be performing.
      What can we do about this? Plenty. There are two entries in the registry (or Active Directory for Enterprise arrays) for each service in each array that define the size of the DNS cache and the default record TTL. They are:
    • Web Proxy:
      HKLM\SOFTWARE\Microsoft\Fpc\Arrays\{Array GUID}\ArrayPolicy\WebProxy
      "msFPCDnsCacheSize"=dword:00000bb8
      "msFPCDnsCacheTtl"=dword:00005460
    • Firewall:
      HKLM\SOFTWARE\Microsoft\Fpc\Arrays\{Array GUID}\ArrayPolicy\Proxy-WSP
      "msFPCDnsCacheSize"=dword:00000bb8
      "msFPCDnsCacheTtl"=dword:00005460
      Note:
      for Enterprise Arrays, you have to use Active Directory Users and Computers in Advanced view mode, and drill down to System, Microsoft, FPC, Arrays, {Array GUID}, Array policy, etc...

    The values are displayed in hexadecimal, but the windows calculator can convert this for you if you set it to “scientific” mode. What they translate to is a default DNS cache of 3K bytes each that allows each record to live for 21,600 seconds (6 hours). While this may seem like an efficient way to make Internet name resolution really zippy for the Web and Firewall clients, it’s also a great way to lock them into some bad data for a very long time. Plus, a “DNS server” that fails to observe the record TTL is non RFC-compliant.
    Let’s fix this, shall we?

    1. The msFPCDnsCacheSize tells each service how large the name cache is. If you enter 0 in this value, the next registry value is ignored and the service stashes no names. Let’s change this to 0. Now, every name request from a client will be freshly resolved from a real DNS server and the TTL will be correct for that record.
    2. The msFPCDnsCacheTtl tells the service how long (in seconds) to hold each record it receives. If you allowed any value other than 0 in the previous entry, the value entered here is used. If the previous registry value is 0, this value is ignored
    3. Now restart the web and firewall services so they can pick up the new settings.

    Web Proxy and Firewall Client Configuration options:
    As the Client Configuration options are specific to the Web Proxy and Firewall Clients, these will be detailed in the articles for those clients




    موضوعات مشابه:

  2. #2
    نام حقيقي: 1234

    مدیر بازنشسته
    تاریخ عضویت
    Jul 2009
    محل سکونت
    5678
    نوشته
    5,634
    سپاسگزاری شده
    2513
    سپاسگزاری کرده
    272
    کد:
    http://www.isaserver.org/tutorials/ISA_Clients__Part_2_SecureNAT_and_Web_Proxy_Client.html

    Part 2: SecureNAT and Web Proxy Client


    The question of "what kind of client is it?" is a relatively simple one if you ignore the associated questions of "what is it doing?" and "what does ISA provide for that request?", but we're not going to do that.

    There are three distinct types of ISA clients; SecureNAT, Firewall and Web. Each client type is more a concept than a fact, meaning that it depends on how the LAT host and ISA Server are configured and what the LAT host is trying to do than anything else. Consequently, it's more accurate to think of them in terms of "client request" than "client".

    It's entirely possible (and even desirable in some cases) for a LAT host to be configured as a SecureNAT, Firewall and Web client all at the same time. It's the request and how it's being made to ISA that determines what kind of client the LAT host is at the time. If you think that's confusing, read on…

    Definitions:

    • Auto-detection - This is a feature of ISA (WPAD) that allows certain LAT hosts and Internet Explorer (v 5.0 or higher) to configure themselves to operate properly with the ISA server.
    • DNS - Domain Name Services; the services residing on a computer that are able to answer a name resolution query. How they answer that query depends on many settings for that server.
    • FQDN - Fully Qualified Domain Name; this is a computer name that indicates its logical association by virtue of the domain structure associated with the name. For instance, www.microsoft.com indicates a host named "www" that lives in the domain "microsoft" under the top-level domain "com". These names are always separated by dots "." and are also known as "dotted decimal".
    • GUID - Globally Unique IDentifier; this is a very large number that is guaranteed to be unique. ISA uses these to identify various aspects of its configuration.
    • LAT host - This is a computer that operates in the subnet that is defined in the LAT. All traffic to and from this host is NAT-ed through the ISA
      NetBIOS name - See "unqualified name"
    • Record - This is an entry in a DNS zone that represents a single element, such as a host, a mail server or even another zone.
      Secondary Protocol - Any protocol used by an application that differs from the one used to make the initial (primary) connection through the ISA is considered a secondary protocol.
    • TTL - Time-to-live; indicates how long (in seconds) a name record may live in the requester's name cache before it must be refreshed
    • Unqualified name - This is a host name without the form. Also known as the NetBIOS or WINS name.
    • WINS - Windows Internet Name Services; this is a name resolution service similar to DNS, except that it deals strictly with NetBIOS (unqualified) names
    • WPAD - Windows Proxy Auto Detection; a feature of ISA that is supported in Internet Explorer 5.0 and higher. When configured properly, it enables IE to configure itself dynamically.

    ISA Operating Modes:

    • Cache - This is the least capable mode, since only the Web Proxy and optionally, the caching services are installed and running. This is also the only mode in which ISA can operate with a single NIC. Only Web Proxy clients are supported in this mode, sine a LAT is needed for ISA to understand SecureNAT and Firewall Clients. This is also the only mode that cannot support the H.323 Gatekeeper service.
    • Firewall - This is a combination of Firewall and Web Proxy services, without the Web Cache service. All of the main features of ISA are available here and all client types are supported. ISA must have at least two NICs to operate in this mode; one external, one internal (LAT).
    • Integrated - This is the full-blown, all-out, feature-packed installation; Web Proxy, Firewall and Web Caching are all together having a great big packet-munching party just for your pleasure. The only real difference between this and Firewall mode is the Web Caching service.

    ISA Clients:

    • SecureNAT - This a LAT host that has a default route through the network to the ISA as its only means of Internet communication. In a simple network (no routers), this client has the ISA primary internal IP as its default gateway. In a complex (routed) network, this gets tricky.
    • Firewall - This is a LAT host that has the ISA Firewall client software installed and enabled
    • Web - This is simply an application (IE or other web-enabled application) on a LAT host that uses proxy requests to the ISA outbound web listener IP and port to reach the Internet


      Feature Comparison



    Notes:

    1. Any application running on a LAT host can be a Web Proxy client if:
      a. The application (browser, FTP client, etc.) is CERN-compatible, that is, it understands the proper method of making a proxy request
      b. It provides a means for you to specify the name or IP address AND the port to use for proxy requests
    2. ISA auto-detection for Web Proxy clients is limited to Internet Explorer version 5.0 and later and is very sensitive to internal name resolution issues
    3. ISA auto-detection for Firewall clients is very sensitive to configuration issues, especially name resolution settings
    4. Limited to HTTP, HTTPS and FTP download only
    5. Can use any simple protocol (no secondary connections) according to the Protocol and Site and Content rules defined in ISA
    6. Can use all protocols not specifically denied by ISA

    SecureNAT Client:
    This client can be running any operating system that understands TCP/IP networking and is the simplest of all to configure; merely place the primary internal IP of the ISA server in the default gateway of the client's IP settings, configure the proper protocol definitions and rules in the ISA and you're off to the races...Or are you? Here are some things that affect SecureNAT client functionality:

    • ISA server operating mode(s) that supports this client - Firewall, Integrated. Note that Cache mode is not listed here. That's because SecureNAT clients need to use ISA as a router and that functionality just doesn't exist in cache mode, regardless of how many NICs you throw at the ISA server. The Firewall service has to be installed and running on the ISA before a SecureNAT client gets out.
    • ISA Server Client Configuration options:
      Other than the "Enable IP routing" setting, there aren't any, really… The SecureNAT client is a unique beast in that ISA has no specific knowledge of it, except in the context of the IP address and protocol it uses. ISA either allows the protocol that the SecureNAT client wants to use, or the traffic never flows. To set a W2K client for proper SecureNAT functionality, right-click My Network Places, select Properties. Right-click Local Area Network (assuming you only have one) and select Properties. Scroll down to Internet protocol (TCP/IP), select it and click the Properties button. You'll see something like this:


    • The entries found here are the minimum required for any client to function in a TCP/IP network; the key point here is that for SecureNAT functionality, the ISA must be the default route to the Internet for this client. If you're operating in a routed network, then read this article. All these settings can be assigned using DHCP, if desired.

    • Name Resolution - The correct IP settings for your SecureNAT client are completely dependent on the environment in which it lives. Name resolution for Internet requests is a primary consideration here, since this type of client request doesn't use the ISA Web Proxy or Firewall services' DNS "feature". You have to either provide an internal DNS server that can resolve Internet names, or allow the SecureNAT client to make its own resolution requests through ISA. Either way, ISA has to allow those requests to the Internet.
      Create a protocol rule called "Internet DNS" (or George, if you prefer) that allows both DNS Query and DNS Zone Transfer protocols.
      Using the isaserver.org tutorial as a guide, create a protocol rule that allows DNS Query and DNS Zone Transfer protocols. Don't select the Server versions of these protocols; they're only for server publishing and have no bearing on outbound requests.
    • User Authentication - SecureNAT clients cannot authenticate to ISA at all. If ISA requires authentication for the request being made by the client, the user will either see an authentication popup or a failure to connect, depending on the application or service making the request and the authentication technique applied to the request.
    • Protocol availability - SecureNAT clients can only use those protocols that are:
      1. Simple protocols (no secondary connections)
      2. Listed in Policy Elements, Protocol definitions
      3. Allowed in Access Policy, Protocol Rules
      4. Not restricted by user or group through Access Policy, Site and Content Rules
    • Web Proxy Client:
      This is one that creates confusion for many folks, since it's not the LAT host configuration as much as the request made by the application it runs that makes it a Web Proxy client. The host itself can be a SecureNAT client, Firewall Client, or both; it doesn't matter. If the application makes a proper proxy request to the ISA server Web proxy service, it's a Web Proxy client and is subject to the rules and limitations of that service.
    • ISA server operating mode(s) that supports this client - All
    • ISA Server Client Configuration options:
      Open the ISA MMC and drill down to Client Configuration. Right-click Web Browser and select Properties; select the Direct Access tab and you'll have the following dialog. Here is where we define some of the IE settings that invisibly change the settings normally found in the Connection tab of IE. All of the data here is sent to IE as a Jscript if it makes a request to ISA using either the http:///array.dll?Get.Routing.Script or http:///wpad.dat request.


    • Bypass proxy for local addresses - this does exactly what it sounds like; it instructs IE to directly contact the desired resource if it is considered "local". "Local" is defined as any domain in the LDT or any unqualified name request. For instance, http://thatserver would be considered local, while http://thatserver.domain.tld would be considered local ONLY IF the domain was listed in the LDT.
    • Directly access computers specified in the Local Domain table (LDT) - this setting, if unchecked, allows IE to make proxy requests for LDT-based servers, while maintaining the "local" setting for unqualified requests. Since this would be a waste of ISA's time and resources, keep this checked.
    • Directly access these servers or domains: - this setting allows you to specify specific servers or domains that should be directly accessed as exceptions to the first two rules. If the domain is an external one, IE expects to operate as a SecureNAT or Firewall client for this request.

    Now select the Backup Route tab. This setting allows IE to use an alternate means to reach the Internet if the primary ISA server is unresponsive. There are two options:

    • Direct Access - this allows IE to make requests as a SecureNAT or Firewall client, assuming that the network infrastructure has been built to accommodate that.
    • Alternative ISA Server - this allows ISA to use a secondary ISA if the primary fails. This ISA server must exist, of course, and using the primary as the secondary is a waste of time, since the primary has to be unresponsive for this option to be considered by IE.
    • Client application settings - Since Internet Explorer is the most common Web Proxy client, we'll use it for our example. We'll start with the main connectivity settings; you get there by either right-clicking the Internet Explorer icon on the desktop and selecting Properties, or if IE is already running, you select Tools, Internet Options. From there, select the Connections tab and then click the LAN Settings button. There are four basic options here:


    • Automatic Configuration - the settings made here are used first, making web access a chore if you've either misconfigured ISA or DNS.
    • Automatically detect settings - this is completely dependent on the Auto Discovery feature being enabled, and also having the WPAD entry in the internal DNS zone. If you don't have internal DNS or DHCP with option 252 defined, turn this off. Also, if you're using a version of IE older than 5.0, or any other browser, this isn't going to work. Remember, the client can't use the ISA Auto Detection feature until it can resolve the ISA server name to begin with.
    • Use automatic configuration script - This allows the browser to query the ISA server for a Jscript that will allow it to configure itself for proper operation with the ISA server. The data that comes as part of the script is derived from the settings found in the LDT and the Web Proxy Client Configuration options.
    • Proxy Server - the settings made here are used only if the automatic settings fail or there are none entered.
    • Use a proxy server for your LAN (These settings will not apply to dial-up or VPN connections) - note the disclaimer for this setting. Here's what bites many an unwitting ISA user when they're using a VPN connection behind an ISA. There is a whole other set of settings for each dial-up or VPN connection that allows IE to use whatever proxy services may be available there.
    • Use automatic configuration script - This allows the browser to query the ISA server for a Jscript that will allow it to configure itself for proper operation with the ISA server. The data that comes as part of the script is derived from the settings found in the LDT and the Web Proxy Client Configuration options.
    • Internet Explorer on the ISA Server may also function as a Web proxy client by making the following settings in IE Properties, Connections, LAN Settings:

    This has the effect of causing IE to look to the local machine to make proxy requests. Since ISA binds the Outgoing Web Requests listener to all internal IP addresses and localhost resolves to a valid IP (127.0.0.1, an internal IP), it will serve IE as if it were a LAT host. Notice that we're still able to use the Use automatic configuration script just like any other LAT host and the best part is that it will work!
    It is also possible to allow the ISA server IE web access by removing the proxy settings and defining a packet filter that allows TCP-80 outbound, but you also lose logging for those connections when you do that. This can make troubleshooting difficult. On the other hand, it also bypasses the Web Proxy DNS functionality, making it a useful troubleshooting technique. The scenario should dictate which option you choose.
    • Name Resolution - By default, the Web Proxy service offers simple DNS functionality to Web proxy clients. By default, Web proxy clients use this functionality. As long as the ISA server can resolve Internet names, the client application can, too. Bear in mind, though that this functionality does not extend to unqualified names; they are resolved by the LAT host using whatever mechanisms are available to it.
    • User Authentication - Web Proxy clients are able to authenticate to the ISA server using Integrated (NTLM), Basic (HTTP) or Digest (W2K AD only) authentication. Only Windows clients can use Digest authentication, since it depends on W2K AD functionality.
    • Protocol availability - Web Proxy clients can only use HTTP, HTTPS, Gopher and FTP download only protocols and they must be allowed in Access Policy, Protocol Rules
    • Content availability - Determined by the rules defined in Access Policy, Site and Content Rules







  3. #3
    نام حقيقي: 1234

    مدیر بازنشسته
    تاریخ عضویت
    Jul 2009
    محل سکونت
    5678
    نوشته
    5,634
    سپاسگزاری شده
    2513
    سپاسگزاری کرده
    272
    کد:
    http://www.isaserver.org/tutorials/ISA_Clients__Part_3_The_Firewall_Client.html
    Part 3: The Firewall Client



    The question of “what kind of client is it?” is a relatively simple one if you ignore the associated questions of “what is it doing?” and “what does ISA provide for that request?”, but we’re not going to do that.
    There are three distinct types of ISA clients; SecureNAT, Firewall and Web. Each client type is more a concept than a fact, meaning that it depends on how the LAT host and ISA Server are configured and what the LAT host is trying to do than anything else. Consequently, it’s more accurate to think of them in terms of “client request” than “client”.
    It’s entirely possible (and even desirable in some cases) for a LAT host to be configured as a SecureNAT, Firewall and Web client all at the same time. It’s the request and how it’s being made to ISA that determines what kind of client the LAT host is at the time. If you think that’s confusing, read on…

    Definitions:
    Auto-detection – This is a feature of ISA (WPAD) that allows certain LAT hosts and Internet Explorer (v 5.0 or higher) to configure themselves to operate properly with the ISA server.
    DNS - Domain Name Services; the services residing on a computer that are able to answer a name resolution query. How they answer that query depends on many settings for that server.
    FQDN – Fully Qualified Domain Name; this is a computer name that indicates its logical association by virtue of the domain structure associated with the name. For instance, www.microsoft.com indicates a host named “www” that lives in the domain “microsoft” under the top-level domain “com”. These names are always separated by dots “.” and are also known as “dotted decimal”.
    FWC – Firewall Client; what I use in this article to indicate the FWC software on the LAT host itself
    GUID – Globally Unique IDentifier; this is a very large number that is guaranteed to be unique. ISA uses these to identify various aspects of its configuration.
    LAT host – This is a computer that operates in the subnet that is defined in the LAT. All traffic to and from this host is NAT-ed through the ISA
    NetBIOS name – See “unqualified name”
    Record – This is an entry in a DNS zone that represents a single element, such as a host, a mail server or even another zone.
    Secondary Protocol – Any protocol used by an application that differs from the one used to make the initial (primary) connection through the ISA is considered a secondary protocol.
    TTL – Time-to-live; indicates how long (in seconds) a name record may live in the requester’s name cache before it must be refreshed
    Unqualified name – This is a host name without the form. Also known as the NetBIOS, or WINS name.
    VIP – Virtual IP; this is a valid IP address that is assigned to either an NLB cluster or a hardware load-sharing device.
    WINS – Windows Internet Name Services; this is a name resolution service similar to DNS, except that it deals strictly with NetBIOS (unqualified) names
    WPAD – Windows Proxy Auto Detection; a feature of ISA that is supported in Internet Explorer 5.0 and higher. When configured properly, it enables IE to configure itself dynamically.
    WSPAD – Windows Sockets Proxy Auto Detection; this is the P2 legacy file that was replaced in ISA with mspclnt.ini. It still works for P2 legacy server publishing.
    ISA Operating Modes:
    Cache – This is the least capable mode, since only the Web Proxy and optionally, the caching services are installed and running. This is also the only mode in which ISA can operate with a single NIC. Only Web Proxy clients are supported in this mode, since a LAT is needed for ISA to understand SecureNAT and FWCs. This is also the only mode that cannot support the H.323 Gatekeeper service.
    Firewall – This is a combination of Firewall and Web Proxy services, without the Web Cache service. All of the main features of ISA are available here and all client types are supported. ISA must have at least two NICs to operate in this mode; one external, one internal (LAT).
    Integrated – This is the full-blown, all-out, feature-packed installation; Web Proxy, Firewall and Web Caching are all together having a great big packet-munching party just for your pleasure. The only real difference between this and Firewall mode is the Web Caching service.

    ISA Clients:
    SecureNAT – This a LAT host that has a default route through the network to the ISA as its only means of Internet communication. In a simple network (no routers), this client has the ISA primary internal IP as its default gateway. In a complex (routed) network, this gets tricky.
    Firewall – This is a LAT host that has the ISA FWC installed and enabled and the application is making Winsock requests through it. If the app doesn’t use the FWC software, it’s not a Firewall
    Web – This is simply an application (IE or other web-enabled application) on a LAT host that uses proxy requests to the ISA outbound web listener IP and port to reach the Internet.
    Feature Comparison



    Notes:

    1. Any application running on a LAT host can be a Web Proxy client if:
      a. The application (browser, FTP client, etc.) is CERN-compatible, that is, it understands the proper method of making a proxy request
      b. It provides a means for you to specify the name or IP address AND the port to use for proxy requests
    2. ISA auto-detection for Web Proxy clients is limited to Internet Explorer version 5.0 and later and is very sensitive to internal name resolution issues
    3. ISA auto-detection for FWC’s is very sensitive to configuration issues, especially name resolution settings
    4. Limited to HTTP, HTTPS and FTP download only
    5. Can use any simple protocol (no secondary connections) according to the Protocol and Site and Content rules defined in ISA
    6. Can use all protocols not specifically denied by ISA

    Firewall Client:
    This client is the most capable of all, because it has the unique ability to decide on a “per-application” basis how it will act and what information the application has to operate with. Additionally, it is the only client that is able to use secondary protocols. It’s the need for secondary protocols that make the FWC necessary for apps like Instant Messaging, streaming media, FTP, etc. This is also the most difficult client for most folks to get their minds around, since it is so “application-configuration” dependent.

    • ISA server operating mode(s) that supports this client – Firewall, Integrated. Note that Cache mode is omitted. This is because Cache mode does not install the Firewall service, which is required for Firewall and SecureNAT clients’ functionality.
    • Name Resolution – This gets really interesting, because there isn’t a “right answer” for how Firewall Clients resolve names. They can use the ISA Firewall service DNS functionality or they can act like SecureNAT clients and resolve qualified names themselves. It depends on the settings in the Client Applications section (discussed later). Either way, they always resolve unqualified names without using the ISA server firewall service.

    • User Authentication – Firewall Clients, like Web Proxy clients, can authenticate to the ISA server, providing the credentials of the interactively logged-on user, or as specified using CredTool.exe.
    • Protocol availability – Firewall Clients can use those protocols that are:
      1. allowed in Access Policy, Protocol Rules
      2. not site-limited by Site and Content Rules
      3. defined as having secondary connections
    • Configuration Files – two files combine on the Lat host at \Program Files\Microsoft Firewall Client\internal_setup\ to define the settings for the FWC software and how it responds to Winsock requests from applications and services:
      mspclnt.ini; this file contains the bulk of the configuration data and is representative of the contents of wspad.dat
      msplat.ini; it contains all entries made in Network Configuration, Local Address Table, and resides separately on the client to maintain compatibility with the Proxy-2 form of the wspcfg.dat file. This file also contains two other subnets:
      224.0.0.0-255.255.255.254 this is the standard multicast subnet. Since ISA doesn’t pass multicast traffic, this has to be defined as local.
      127.0.0.0-127.255.255.255 this is the standard “localhost” address set. None of the addresses in this range are valid outside the host that’s running TCP/IP, so they should never be seen by ISA.
      Both of these files are sent to the ISA server during FWC installation. When the user clicks the Update Now button on the FWC configuration dialog, these steps occur:

      1. The FWC makes a call to http:///wspad.dat to obtain the settings that are saved as mspclnt.ini if the “Enable ISA Firewall automatic discovery in Firewall Client” checkbox is selected.

      2. The FWC then makes a connection to the ISA at TCP-1745 to obtain the data for msplat.ini and another grab at the data for mspclnt.ini at the same time.
      Bear in mind that weak internal name resolution can cause this process to be painfully slow or cause it to fail altogether.

    • ISA Server Settings – There are quite a few settings in ISA that apply to the FWC. If you’re interested in settings made at the client itself, then I’ll refer you to this article. What we’re interested in here is how to create settings that allow the FWC to operate properly with ISA and specific applications function properly as a FWC app.
      • The first place to go iso Client Cnfiguration, Firewall Client. It’s here that all the settings are made to change how the client app and ISA interact through the FWC software:


    If you double-click on Firewall Client, you’ll see the following “properties” dialog:
    Here is where you can make or break ISA FWC functionality. Everything you enter here determines the default settings for the FWC when it’s installed on the LAT host, as well as the data passed when the FWC asks for a refresh from ISA.

    • DNS name: the NetBIOS name of the ISA server is entered for you by default. Unless you’re implementing a DNS round-robin scheme for internal load balancing or something similar, leave it alone. It’s where the FWC software seeks out its settings, so unless you know for certain that the name entered here doesn’t suit your scenario, leave it alone! You can change this at the client, but the ISA-owned setting is passed in the wspad.dat when the FWC refreshes its settings.
    • IP address: You can enter the IP address of the ISA server if you either don’t have any internal name resolution services (WINS, DNS).
    • Enable ISA Firewall automatic discovery in Firewall Client – this setting doesn’t control whether or not the FWC is allowed to auto-detect the ISA server, just whether or not it’s configured to do so by default. This setting is also changeable at the client itself.
      • Now click on the “Application Settings tab; here is where you make or break your Winsock-compatible applications with ISA Server FWC


    What we’re not going to do here is duplicate the efforts of the ISA documentation team. There are some really good explanations in the section labeled Configuring Firewall client settings. What I do intend to do is expand on some of the less-than-clear areas of those explanations and give you some idea how they affect real-world issues. Dig out your help files, boys and girls; we’re gonna use ‘em today.
    Open your ISA help and seek out the section titled Firewall client application settings. You’ll notice the reference to the wspcfg.ini file; it and the mspclnt.ini files are essentially the same thing, since they contain the same data. The difference between them is how they’re used.

    - mspclnt.ini; the help covers the purpose and uses of this quite well, except that a very useful section is missing; [Common Configuration] (we’ll get to that later when we go over the individual application settings).
    - wspcfg.ini; this file is specific to the Proxy 2 form of server publishing, where the proxy client software had to be installed n the published server. It also serves to maintain compatibility with the Proxy 2 client, since it wouldn’t understand hot to ask for or use the mspclnt.ini.. Since ISA normally requires that all server-published services reside on a SecureNAT host, this publishing technique is required if the published server cannot be a SecureNAT client.
    Each application defined in the FWC app settings gets its own subheading as [Application_Name]. The name of the application is derived from the name it reports to the OS while it’s running. For instance, Outlook Express identifies itself to the OS as “msimn.exe” and MSN Instant Messenger appears as “msmsgs.exe”. This information is critical if you expect to see any change in FWC behavior with respect to your app based on the following settings. If you have any doubt as to how the app identifies itself, open Task Manager and watch the applications tab as you start your program. Generally, it’ll be the name of the executable as it appears in Windows Explorer.

    • Disable; to be clear, this setting disables the FWC for the specified app, not that the specified app is denied TCP/IP functionality. In other words, the FWC doesn’t exist as far as this app is concerned and the app or service has direct communications with Winsock if it desires.
    • NameResolution; as stated in the help, this setting defines what the default name resolution behavior is for the FWC client app. This only applies to qualified names (DNS names, or FQDN). Unqualified names (NetBIOS or WINS names) are always resolved by the LAT host TCP/IP stack.
    • LocalBind(Tc/Ud)pPorts; this setting defines a list or range of ports that are bound at the LAT host at 0.0.0.0:. This binding can be thought of as “global”, since it effectively binds to any IP owned by the LAT host. Under some circumstances, this can become an implicit RemoteBind operation if a packet is sent immediately after the bind operation.
    • RemoteBind(Tc/Ud)pPorts; this setting defines a list or range of ports that the app binds to on the ISA server at 0.0.0.0:. This also binds the same port to the LAT host at 0.0.0.0: and establishes a communications link between them. Kewl, huh?
    • ServerBindTcpPorts; this setting is the same as RemoteBind, except that it allows multiple external connections through ISA to the client. This is effectively the same as server-publishing that TCP port to the LAT host as if the LAT host were a SecureNAT client. Note that there is no ServerBindUdpPorts. This is because UDP is “connectionless”; it’s just a data stream. Consequently, there is no gain to defining that port as “ServerBound”.
    • ProxyBindIp; this setting is pretty clearly explained. Essentially, it “reserves” an IP/port combination for a particular client. The thing to bear in mind when choosing this option is that it:
      • is a universal setting that applies to TCP and UDP ports at the same time.
      • precludes another app or service using that IP/port combination.
        These are important points because you can’t see that these connections exist in the ISA MMC Monitoring, Sessions window. Trying to publish a server on the same IP/port pair under these circumstances can cause much hair loss.

    • KillOldSession; this is pretty clear; only one session is allowed for any given service or app from a single client if this is defined as “1”
    • Persistent; the opposite of KillOldSession, this allows a bind to remain active even if the service or app loses communications with the ISA. This allows it to “reclaim” its previous connection if it crashed.
    • ForceProxy; this setting forces a particular app to use only one ISA server, even if NLB or other load-balancing technique is being used. Using this setting, you can guarantee that any traffic to/from this service or app will always be seen by a particular ISA server. Obviously, if you only have one ISA, this setting is pretty useless.
    • ForceCredentials; this setting allows the service or app to communicate with ISA using the credentials specified for that app or service using the CredTool.exe. This allows you to specify “must authenticate” for all protocols and still have your published server operate normally. Details of CredTool.exe will be detailed later
    • NameResolutionForLocalHost; this setting defines how the FWC reports the IP address of the LAT host to the requesting app for a GHBN Winsock call. Many times, a Winsock-compatible application needs to know its own IP address so that it can provide that information to another client, to establish a connection between them. If the app running on a LAT host reports an internal IP to the remote client, then no communication can take place. If the FWC reports the ISA external IP and all other settings support that communication, then the two apps can chat all day long.
    • ControlChannel; this setting defines whether the client app uses UDP or TCP to control the session with ISA.

    You may have noticed while reading carefully in this section of the ISA help, that [Common Configuration] is stated as one of the places the FWC looks to for information. If you’re even more observant, you’ll also notice that it doesn’t exist in mspclnt.ini by default. When you enter an application name and that application is unknown to ISA, a new section is created in the ISA version of mspclnt.ini as [AppName]. This is also how you would create the [Common Configuration] section; by entering “Common Configuration” in the Application Name as shown below:
    You may have noticed that I’ve used the NameResolution=L entry here. Why would he do that, you may ask? ..it’s OK; you can, I don’t mind… What this setting will do is cause the FWC to refer to the LAT host DNS client service for any and all FQDN resolution requests except where specified differently for a particular app or service in the mspclnt.ini file. If you have a solid DNS-based name resolution structure (NetBIOS broadcasts don’t count), then this setting will help you avoid the FWC DNS cache of death as mentioned in part one of these articles. I highly recommend using this setting (hint-hint). It can also mean the difference between an ISA event log full of 14120 errors and a peaceful ISA server (another article, RSN).
    Now open your ISA help and seek the section titled Configuring Firewall client settings. This is the section that defines the basic functionality for the FWC and is presented as the first part of mspclnt.ini.

    • Master Config; this is pretty clear, so I won’t waste your time
    • Server IP Address(es); The two possible entries here; Name and Addr1 are mutually exclusive; only one of them will exist in this section. Here is where you can support firewall load-balancing via DNS round-robin or NLB across an array by using a “global name” or “global IP address” for all servers in the array. Actually setting that up is a subject for another article, though.
    • Common; Lots of entries here that have everything to do with how ISA and the FWC LAT host cooperate. Most of these entries can be changed in the ISA MMC, but some require manual editing of the ISA mspclnt.ini file.
      • Port – under normal circumstances, there should never be a reason to change this value. Don’t play with it unless you absolutely have to or unless you have more hair than you need.
      • Configuration Refresh Time – Also clear in the help. If you make lots of changes over a short period of time, you may want to tweak this setting. You may also wish to experiment with a non-production server so as not to anger the boss and your coworkers.
      • Re-check Inaccessible Server Time (Minutes) – also clear in the help; part of the configuration recheck settings.
      • Set Browsers To Use Proxy – this is actually a setting derived from the Web Browser section of Client Configuration and does exactly what the help says.
      • Configuration URL – also derived from the Web Browser section of Client Configuration
      • Local Domains – this is from data entered in the LDT, but can be modified manually. As stated in the help, these names are resolved locally and the servers contacted without using the ISA as a proxy
      • WWW-Proxy – also derived from the Web Browser section of Client Configuration
      • WebProxyPort – this is derived from the HTTP port setting in the Outbound Web Requests tab of the Server or array properties.
      • Set Browsers to use Auto Config – also part of the Web Browser section of Client Configuration
      • AutoDetect ISA Servers – this value is based on the FWC Enable ISA Firewall automatic discovery in Firewall Client setting.
      • Set Browsers to use Auto Detect – also part of the Web Browser section of Client Configuration, but differs from Auto Config in that this is the WPAD part of ISA

    • LAT Host Settings – not many things I can cover here that aren’t already covered in this article. I will take on a short trip through the CredTool.exe application, as promised, though

    CredTool.exe; is a totally useful little app that allows you to run a service or app in the context of a particular user, but only for purposes of interacting with ISA via the Firewall Client. This means that any call made to ISA by the FWC on behalf of the application or service does so with the credentials you specify when you run the tool. It’s a nice piece of functionality to have around when you need to lock everything through the ISA to user / group permissions. Here’s how you use it…
    Open a command window and “cd” to \program files\microsoft firewall client. From here, you can run “credtool /?” and be rewarded with a listing of the options and what they do for you.
    D:\Program Files\Microsoft Firewall Client>credtool /?
    Bad parameters
    Usage:
    CREDTOOL [-r|-w|-d] -n appname [-c User Domain Password]
    -r reads the credentials
    -w writes, or stores the credentials
    -d deletes the credentials
    -n appname specifies the name of the application executable
    file without the extension
    -c user domain password specifies the account credentials

    For example, if we want the DNS service to be a firewall client-published app because our network doesn’t allow us to use SecureNAT, we would install the Firewall client on the server and copy the mspclnt.ini to the folder where dns.exe lives (%Systeroot%\system32 by default) as wspcfg.ini.
    Then, we would change folders to \program files\microsoft firewall client and run credtool.exe with the following parameters (replace UserName, DomainName and PassWord with appropriate user credentials):
    D:\Program Files\Microsoft Firewall Client>credtool -w -n dns -c UserName DomainName PassWord
    Write credentials for [dns]
    User: [UserName]
    Domain: [DomainName]
    Password: [PassWord]

    The credentials are then applied to any request made to the ISA only on behalf of this service, allowing all protocols to be user-authentication controlled.
    Note: the “DomainName” section must be specified. If you don’t operate a domain (NT4 or W2K AD), then you must specify the machine name where the user account resides. Since ISA must hold all user accounts in non-domain (Workgroup) environment, you should use the ISA server NetBIOS name as the “DomainName”.
    To remove or read the credentials assigned to a given app or service, you need only specify the operation (-w or –r) and the app name (-n) without the credentials. For instance:
    D:\Program Files\Microsoft Firewall Client>credtool -r -n dns
    Read credentials for [dns]
    User: [UserName]
    Domain: [DomainName]
    Password: [**********]

    ..reveals the UserName and Domain used by the dns service. Notice that the password is hidden to prevent improper use




کلمات کلیدی در جستجوها:

hidden ghbn window

ghbn hidden window

after remove tmg nlb slow script array.dllwhat is hidden ghbn windowhidden GHBN Window task0Active Directory does not exist or cannot be contactedwhat is a hidden ghbn windowtmg client slow automatic configuration scripttmg exclude securenat reportsuse automatic configuration script slow tmg 2010fwc traffic exception tmglink-local multicast name resolution tmg 2010tmg automatic configuration script by-pass the client local host ip of 127.0.0.1tmg 2010 securenat clients in workgrouptmg serverbindtcpportstmg conflict web listener 80 wpad.dattmg is blocking link-local multicast name resolutionconfigure udp wspcfg.ini tmg clientuse automatic configuration scriptnetbios name service denied connection tmg web proxy client fwc client difference link-local multicast name resolution tmgTMG allow Link-local multicast name resolutionlink-local multicast tmg 2010

برچسب برای این موضوع

مجوز های ارسال و ویرایش

  • شما نمی توانید موضوع جدید ارسال کنید
  • شما نمی توانید به پست ها پاسخ دهید
  • شما نمی توانید فایل پیوست ضمیمه کنید
  • شما نمی توانید پست های خود را ویرایش کنید
  •