Anda di halaman 1dari 26

What is ISA Server:-

ISA server is a upgraded version of Microsoft proxy server 2.0 with inbuilt FIREWALL

PROXY

FIREWALL

Proxy server :- Its a server


which emulates as a web server

Internet

Client
192.168.1.1

Proxy Server

192.168.1.2

HACKING : - Taking over your resources or attempt to bring down your server

Types of ATTACK: 1. Foot printing:- The way to know the OS and IP of server 2. Scanning:- Scanning system for bugs and loopholes 3. DOS Attacks: - Denial Of Service 4. Exploits: - Writing scripts to bring down server 5. Trojans: - Sending viruses to steal the DATA 6. Port Scan: - Scanning ports for getting into applications ETC

What is a Firewall : -

A firewall protects networked computers from


intentional hostile intrusions

Software Firewall : ISA Server Checkpoint Smooth wall

Hardware Firewall : Cisco Pix Watch Guard Multicom Ethernet II..

Types of FIREWALL
Packet Filtering
e.g.. ROUTERS

Controls data transfer based on Source & Destination IP Address Packets are allowed or dropped through the device depending on the Access Control List

Application Gateway
eg. PROXY SERVER

Packets are allowed based on type of application and IP address Filter Application specific commands such as: HTTP, FTP etc Application level Gateways can also be used to: To Log User Activity and Logins

Statefull Multilayer Inspection

This is a full fledged firewall which combines the aspects of other two types of firewalls and is capable of intrusion detection server publishing etc.

eg. ISA SERVER

Flavors of ISA Server

Standard Edition Server Deployment Standalone only

Enterprise Edition Multiple server with Centralized Management Enterprise and Array policies No limit

Policy based Support Scalability

Local only 4 cpus only

ISA Server requirements : -

1. Member server or Domain Controller


2. Service pack 1 or above 3. Two interface (public and private)

4. Routing and Remote Access


5. Pentium III 300MHz or above 6. 256 Mb Ram 7. 20 Mb of Hard Disk space on NTFS 5.0

ISA SERVER MODES

1. Firewall mode

ISA SERVER MODES

1. Firewall mode 2. Cache mode

ISA SERVER MODES

1. Firewall mode 2. Cache mode

3. Integrated mode

Key features 1. Internet Firewall (Intrusion detection)

Key features 1. Internet Firewall (Intrusion detection) 2. Secure Server Publishing

Key features 1. Internet Firewall (Intrusion detection) 2. Secure Server Publishing 3. Web Caching Server

Key features 1. 2. 3. 4. Internet Firewall (Intrusion detection) Secure Server Publishing Web Caching Server Secure NAT

Key features 1. 2. 3. 4. 5. Internet Firewall (Intrusion detection) Secure Server Publishing Web Caching Server Secure NAT Integrated VPN

Key features 1. 2. 3. 4. 5. 6. Internet Firewall (Intrusion detection) Secure Server Publishing Web Caching Server Secure NAT Integrated VPN Tiered-Policy Management

Key features 1. 2. 3. 4. 5. 6. 7. Internet Firewall (Intrusion detection) Secure Server Publishing Web Caching Server Secure NAT Integrated VPN Tiered-Policy Management QOS(Quality Of Service)

Key features 1. 2. 3. 4. 5. 6. 7. 8. Internet Firewall (Intrusion detection) Secure Server Publishing Web Caching Server Secure NAT Integrated VPN Tiered-Policy Management QOS(Quality Of Service) Multiprocessor Support

Key features 1. 2. 3. 4. 5. 6. 7. 8. 9. Internet Firewall (Intrusion detection) Secure Server Publishing Web Caching Server Secure NAT Integrated VPN Tiered-Policy Management QOS(Quality Of Service) Multiprocessor Support Client Side Auto Discovery

Key features 1. Internet Firewall (Intrusion detection) 2. Secure Server Publishing 3. Web Caching Server 4. Secure NAT 5. Integrated VPN 6. Tiered-Policy Management 7. QOS(Quality Of Service) 8. Multiprocessor Support 9. Client Side Auto Discovery 10. Web Filters

Key features 1. Internet Firewall (Intrusion detection) 2. Secure Server Publishing 3. Web Caching Server 4. Secure NAT 5. Integrated VPN 6. Tiered-Policy Management 7. QOS(Quality Of Service) 8. Multiprocessor Support 9. Client Side Auto Discovery 10. Web Filters 11. Alerts

Types of Client

1. SECURE NAT 2. WEB 3. FIREWALL

Clients Clients Clients

Access is Controlled based on :-

1. Client address sets

2. Destination sets
3. Protocols 4. Bandwidth priorities

Anda mungkin juga menyukai