Chapter 8. Configuring Microsoft ISA Server Firewall Policy

In this chapter, we focus on the Microsoft ISA Server firewall policy, specifically the system policy, firewall policy, and access rules. We explain how policies are processed and how you can easily export and import your policy configurations. The second half of the chapter focuses on publishing, allowing external sources to access your internal network resources securely and safely.

Understanding How ISA Server Processes Traffic

ISA Server inspects traffic by referring to three sets of rules in the order shown in Figure 8-1.

ISA Server processes network rules, system policy rules, and then firewall policy rules when inspecting network traffic. After the rules are processed, the network rules determine whether to route or NAT the traffic. Finally client-specific rules are processed.

Figure 8-1. ISA Server processes network rules, system policy rules, ...

Get Microsoft® Internet Security and Acceleration (ISA) Server 2004 Administrator's Pocket Consultant now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.