ISA manual
-------------------------------------------------- ------------------------------
ISA complete name is Microsoft
Internet
Security
and
ACCELERATION
Server (Internet Security and Acceleration Server) is the next-generation product of Proxy2.0, which can be used well 2000 series products. Its and proxy's main difference is a great improvement in the function of firewall, so it is not Calling Internet
Security, integrated with the current firewall multi-function.
One,
Software and hardware configuration: Windows2000 AD, 256M memory, network card
two,
installation:
1.
Three modes:
(1)
Firewall mode: firewall
Mode
(2)
Cache mode: cache
Mode
(3)
Complete mode: integrated
Mode (add Web
Hosting
FunctionAlity)
2.
Stop IIS
Publishing
Service (W3SVC), Uninstall after installation
IIS or reconfigure IIS sites, do not use 80 and 8080 ports.
3.
Fill in the IP range (must contain the address of this unit)
three,
use:
1.
Monitoring:
(1)
Alerts: alarm
(2)
Services: Start and stop service
(3)
Sessions: conference
(4)
Reports: Report
2.
Computer: Display computer status
3.
ACCESS
Policy: Access Strategy
(1)
Site
and
Content
Rules: Site and Directory Rules
(2)
Protocol
Rules: Agreement Rules
(3)
IP
Packet
Filters: IP package filter
4.
Publishing: release
(1)
Web
Publishing
Rules: Site Publishing Rules
(2)
Server
Publishing
Rules: Server Publishing Rules
5.
Bandwidth
Rules: Bandwidth Restriction Rule
6.
Policy
Elements:
(1)
Schedules: Planning Tasks
(2)
Bandwidth
PRIORITIES: Bandwidth Priority
(3)
Destination
SETS: Target Address Settings
(4)
Client
Address
SETS: Customer Address Settings
(5)
Protocol
Definitions: protocol definition
(6)
Content
Groups: Content Group (7)
Dial-Up
ENTRIES: Dial-Dial Connection
7.
Cache
Configuration: set of cache
(1)
Schedules
Content
Download: Planned Task Download
(2)
Drivers: Disk size settings
8.
Monitoring
Configuration: Warning configuration
(1)
Alerts: alarm
(2)
Log: Day
(3)
Report
Jobs: report
9.
Extensions: Extended Features:
(1)
Application
Filters: Application filtering
(2)
Web
Filters: Web Filter
10.
NetWork
Configuration: Network configuration
(1)
Routing: routing
(2)
Local
Address
TABLE: List of local address
(3)
Local
Domain
TABLE: List of local domains
11.
Client
Configuration: Customer Configuration
(1)
Web
Browser: web browsing
(2)
Firewall
Client: Firewall Customer
four,
Corresponding service:
1.
Microsoft
FireWall:
FWSRV
2.
Microsoft
Server
CONTROL:
Isactrl
3.
Microsoft
Scheduled
Cache
Content
Download:
W3SCHDWN
4.
Microsoft
Web
Proxy:
W3Proxy
Among them, service 2 depends on 1, 3, 4
Fives,
Configuration strategy: (Take a few small examples)
1.
Secure
Your
ISA
Server
Computer: Customize your own solution
2.
Limit bandwidth: bandwidth- right-right-attribute
3.
From the case of using ISA, it seems that there is no bandwidth of each user directly, but can create some groups first, then set the bandwidth policy, then let these support to apply these policies, where the limit is achieved by priority, However, it is more perfect to use QoS to use.
4.
Close Ping (ICMP): IP
Packet
Filters - Name - Block
packet
Transmission-Predefine-ICMP
ping
Query-Default
IP
Address
for
Each
EXTERNAL
on
THE
ISA
Server
Computer-all
REMOTE
Computer- is done.
In addition, it can easily define protocol rules, package filtering rules, application filtering, site release rules, caches, etc., and finally, the function is still very powerful, and it is not one for example.