Implementing a Secure ISA Server

Download Report

Transcript Implementing a Secure ISA Server

Implementing a Secure ISA
Server
Roberta Bragg
Step One
Read Step Ten before actually doing
any of these steps!
Step Two – Planning
 What do you want? A firewall? A caching
server? Both?
 Single server? DMZ? Array?
 Amount of traffic?
 What needs to pass through?
 Machine sizing
Step Three- Network
Preparations
 Network addresses
 Routers
 Insure internal DNS for internal network
clients
 External DNS for ISA Server
 Changes required to network configuration?
Clients?
Step Four – Install Clean W2K
 Separate drives/partition system data from firewall
 Customization - Uncheck all options!
– Accessories
– IIS
 Custom networking – only TCP/IP
 External Card:
– Disable DNS automatic registration
– Disable windows networking
– Disable NetBIOS over TCP/IP
 Internal Card – as appropriate for your network
 Workgroup not domain*
Step Five – Pre-ISA Install
 Edit




%systemroot%\inf\sysoc.inf
and remove the ‘hide’ keyword
where it appears
Use Add/Remove to remove
Fax, Image View, Pinball, Word
Pad – be careful here!
Check Routing Table
Clean Certificate Store –
remove unnecessary certificates
Disable services that get
installed by default & are not
needed
 Apply Service
Pack/patches
 SO, what services do you need?
–
–
–
–
–
–
–
–
DNS client
Eventlog
Logical disk manager
Plug and play
Protected storage
Security accounts manager
Telephony
And maybe :
• IPSec policy agent
• Network connections
manager
• Remote procedure call
• Remote registry service
• Run as
Step Six – ISA Installation
 Install only services you need
– Do not install H.323 unless going to use!
 Install onto other partition from OS
 If this is Enterprise
– select administrative array/enterprise policies as per
your organization administrative policy
– only allow publishing if in DMZ
– Enable packet filtering
 Configure LAT so only has addresses in internal
network
Step Seven – After Install Test
Basic Connectivity
 Ensure LAT only contains addresses from
internal network
 Connection to Internet?
– Check default site and content rule
– Add Protocol rule
 REMOVE TEST!
Step Eight – Secure ISA
 Set file /folder/ share permissions
– Mspclnt share: Authenticated Users Read
– Inheritance: not allowed from parent folder, apply
settings to folder, subfolders, files
– Installation Directory, Clients directory, Urlcache:
• Administrators, Creator/Owner, System – Full Control
– Clients – Authenticated Users Read & Execute
 Tweak then apply security template
– Follow guidelines for secure configuration
– Of especial importance
• Limit accounts in local database
• Use strong passwords
Step Nine – Configure and Roll
Out
 Configure client access as per plan
 Configure packet filters/intrusion detection
as per plan
– Do not enable ip routing unless –DMZ 3homed firewall/mail server publishing
 Test
 Configure Reporting/Monitoring
 Install and Configure Clients
Step Ten
 Never, never, never accept on faith any
advice from a security guru, government
agency, book, Microsoft document,
SearchWin2000 chat.
 Your network, server, use, requirements
may differ
TEST