O'Reilly logo

Microsoft® Internet Security and Acceleration (ISA) Server 2004 Administrator's Pocket Consultant by Jason Ballard, Bud Ratliff

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 8. Configuring Microsoft ISA Server Firewall Policy

In this chapter, we focus on the Microsoft ISA Server firewall policy, specifically the system policy, firewall policy, and access rules. We explain how policies are processed and how you can easily export and import your policy configurations. The second half of the chapter focuses on publishing, allowing external sources to access your internal network resources securely and safely.

Understanding How ISA Server Processes Traffic

ISA Server inspects traffic by referring to three sets of rules in the order shown in Figure 8-1.

ISA Server processes network rules, system policy rules, and then firewall policy rules when inspecting network traffic. After the rules are processed, the network rules determine whether to route or NAT the traffic. Finally client-specific rules are processed.

Figure 8-1. ISA Server processes network rules, system policy rules, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required