isa
TRANSCRIPT
![Page 1: Isa](https://reader036.vdocuments.us/reader036/viewer/2022062319/555ed27bd8b42a772f8b47e6/html5/thumbnails/1.jpg)
![Page 2: Isa](https://reader036.vdocuments.us/reader036/viewer/2022062319/555ed27bd8b42a772f8b47e6/html5/thumbnails/2.jpg)
What is ISA Server:-
ISA server is a upgraded version of Microsoft proxy server 2.0 with inbuilt FIREWALL
PROXY FIREWALL
![Page 3: Isa](https://reader036.vdocuments.us/reader036/viewer/2022062319/555ed27bd8b42a772f8b47e6/html5/thumbnails/3.jpg)
Proxy server :- It’s a server which emulates as a web server
192.168.1.2
Client Proxy Server
192.168.1.1
Zoom.com
Internet
![Page 4: Isa](https://reader036.vdocuments.us/reader036/viewer/2022062319/555ed27bd8b42a772f8b47e6/html5/thumbnails/4.jpg)
HACKING : - Taking over your resources or attempt to bring down your server
Types of ATTACK: -
1. Foot printing:- The way to know the OS and IP of server
2. Scanning:- Scanning system for bugs and loopholes
3. DOS Attacks: - Denial Of Service
4. Exploits: - Writing scripts to bring down server
5. Trojans: - Sending viruses to steal the DATA
6. Port Scan: - Scanning ports for getting into applications
ETC………
![Page 5: Isa](https://reader036.vdocuments.us/reader036/viewer/2022062319/555ed27bd8b42a772f8b47e6/html5/thumbnails/5.jpg)
Types of Attacks
1. Foot Printing The Art of gathering the complete security profiles of an Organization or a Target Computer
By using a combination of Tools and Techniques, The Hacker can take up the system and determine itsIp address and Domain names
![Page 6: Isa](https://reader036.vdocuments.us/reader036/viewer/2022062319/555ed27bd8b42a772f8b47e6/html5/thumbnails/6.jpg)
Types of Attacks
2. Scanning
Scanning the System for Bugs and Loopholes in O/S
Hacker uses scanning technique to determine which PortsAre open, what services are running and what is the O/S
E.G: RETINA, Shadow Security scanner, ANSIL etc
![Page 7: Isa](https://reader036.vdocuments.us/reader036/viewer/2022062319/555ed27bd8b42a772f8b47e6/html5/thumbnails/7.jpg)
Types of Attacks
3. DOS Attack
Denial of Service attack which is an attempt to get the Services or the server down by overflowing the buffer
E.G: Win spoof 97, My Spoof
![Page 8: Isa](https://reader036.vdocuments.us/reader036/viewer/2022062319/555ed27bd8b42a772f8b47e6/html5/thumbnails/8.jpg)
Types of Attacks
4. Exploits
Exploits are usually Bugs in Applications or O/S which can be Exploited by using a piece of Code often referred as Scripts
E.G: CGI scripts, Perl scripts etc
![Page 9: Isa](https://reader036.vdocuments.us/reader036/viewer/2022062319/555ed27bd8b42a772f8b47e6/html5/thumbnails/9.jpg)
Types of Attacks
5. Trojan Horses
Trojan Horses is program that pretends to be a useful toolBut actually installs malicious or damaging software
Trojan Horses can be used to take over the Remote System. Sending viruses to steal the Data
E.G. Netbus , Bo2k
![Page 10: Isa](https://reader036.vdocuments.us/reader036/viewer/2022062319/555ed27bd8b42a772f8b47e6/html5/thumbnails/10.jpg)
Types of Attacks
6. Port Scanner
Scanning the port to get into the Application
E.G: Port Scanner, etc
![Page 11: Isa](https://reader036.vdocuments.us/reader036/viewer/2022062319/555ed27bd8b42a772f8b47e6/html5/thumbnails/11.jpg)
What is a Firewall : - A firewall protects networked computers from
intentional hostile intrusions
Software Firewall : -
Hardware Firewall : -
ISA Server
Checkpoint
Smooth wall
Cisco Pix
Watch Guard
Multicom Ethernet II…..
![Page 12: Isa](https://reader036.vdocuments.us/reader036/viewer/2022062319/555ed27bd8b42a772f8b47e6/html5/thumbnails/12.jpg)
Types of FIREWALL
Packet Filtering
e.g.. ROUTERS
Controls data transfer based on
Source & Destination IP Address TCP/UDP Port of Source & Destination IP Address
Packets are allowed or dropped through the device depending on the Access Control List
![Page 13: Isa](https://reader036.vdocuments.us/reader036/viewer/2022062319/555ed27bd8b42a772f8b47e6/html5/thumbnails/13.jpg)
Application Gateway
eg. PROXY SERVER
Packets are allowed based on type of application and IP address
Filter Application specific commands such as: HTTP:GET and POST etc
Application level Gateways can also be used to: To Log User Activity and Logins
![Page 14: Isa](https://reader036.vdocuments.us/reader036/viewer/2022062319/555ed27bd8b42a772f8b47e6/html5/thumbnails/14.jpg)
Statefull Multilayer Inspection
This is a full fledged firewall which combines the aspects of other two types of firewalls and is capable of intrusion detection server publishing etc….
eg. ISA SERVER
![Page 15: Isa](https://reader036.vdocuments.us/reader036/viewer/2022062319/555ed27bd8b42a772f8b47e6/html5/thumbnails/15.jpg)
Flavors of ISA Server
Standard Edition Enterprise Edition
Server Deployment Standalone only Multiple server with Centralized Management
Policy based
Support
Local only Enterprise and Array policies
Scalability 4 cpu’s only No limit
![Page 16: Isa](https://reader036.vdocuments.us/reader036/viewer/2022062319/555ed27bd8b42a772f8b47e6/html5/thumbnails/16.jpg)
ISA Server requirements : -
1. Member server or Domain Controller
2. Service pack 1 or above
3. Two interface (public and private)
4. Routing and Remote Access
5. Pentium III 300MHz or above
6. 256 Mb Ram
7. 20 Mb of Hard Disk space on NTFS 5.0
![Page 17: Isa](https://reader036.vdocuments.us/reader036/viewer/2022062319/555ed27bd8b42a772f8b47e6/html5/thumbnails/17.jpg)
Array considerations
Arrays allow a group of ISA Server computers to be treated and managed as a single, logical entity.
They provide scalability, fault tolerance, and load balancing
All array members must be in the same Windows 2000 domain and in the same site
![Page 18: Isa](https://reader036.vdocuments.us/reader036/viewer/2022062319/555ed27bd8b42a772f8b47e6/html5/thumbnails/18.jpg)
Array Stand-alone server
Scalability and fault tolerance
Can have one or more member servers.
Limited to only one member.
Active Directory requirement
Must be installed only in Windows 2000 domains with Active Directory installed.
No need for 2000 Domain Can be installed in Windows NT 4.0 domains. Configuration information is stored in the registry.
Enterprise policy Yes. A single policy can be applied to all arrays in the enterprise.
No. Only a local array policy can be applied.
Enterprise Vs Standalone Policies
![Page 19: Isa](https://reader036.vdocuments.us/reader036/viewer/2022062319/555ed27bd8b42a772f8b47e6/html5/thumbnails/19.jpg)
Enterprise
Tiered Policy ISA Server Enterprise Edition supports two levels of policy: array level and enterprise level
Array
![Page 20: Isa](https://reader036.vdocuments.us/reader036/viewer/2022062319/555ed27bd8b42a772f8b47e6/html5/thumbnails/20.jpg)
ISA SERVER MODES
1. Firewall mode
![Page 21: Isa](https://reader036.vdocuments.us/reader036/viewer/2022062319/555ed27bd8b42a772f8b47e6/html5/thumbnails/21.jpg)
ISA SERVER MODES
1. Firewall mode
2. Cache mode
![Page 22: Isa](https://reader036.vdocuments.us/reader036/viewer/2022062319/555ed27bd8b42a772f8b47e6/html5/thumbnails/22.jpg)
ISA SERVER MODES
1. Firewall mode
2. Cache mode
3. Integrated mode
![Page 23: Isa](https://reader036.vdocuments.us/reader036/viewer/2022062319/555ed27bd8b42a772f8b47e6/html5/thumbnails/23.jpg)
Key features
1. Internet Firewall (Intrusion detection)
![Page 24: Isa](https://reader036.vdocuments.us/reader036/viewer/2022062319/555ed27bd8b42a772f8b47e6/html5/thumbnails/24.jpg)
Key features
1. Internet Firewall (Intrusion detection)2. Secure Server Publishing
![Page 25: Isa](https://reader036.vdocuments.us/reader036/viewer/2022062319/555ed27bd8b42a772f8b47e6/html5/thumbnails/25.jpg)
Key features
1. Internet Firewall (Intrusion detection)2. Secure Server Publishing3. Web Caching Server
![Page 26: Isa](https://reader036.vdocuments.us/reader036/viewer/2022062319/555ed27bd8b42a772f8b47e6/html5/thumbnails/26.jpg)
Key features
1. Internet Firewall (Intrusion detection)2. Secure Server Publishing3. Web Caching Server4. Secure NAT
![Page 27: Isa](https://reader036.vdocuments.us/reader036/viewer/2022062319/555ed27bd8b42a772f8b47e6/html5/thumbnails/27.jpg)
Key features
1. Internet Firewall (Intrusion detection)2. Secure Server Publishing3. Web Caching Server4. Secure NAT5. Integrated VPN
![Page 28: Isa](https://reader036.vdocuments.us/reader036/viewer/2022062319/555ed27bd8b42a772f8b47e6/html5/thumbnails/28.jpg)
Key features
1. Internet Firewall (Intrusion detection)2. Secure Server Publishing3. Web Caching Server4. Secure NAT5. Integrated VPN6. Tiered-Policy Management
![Page 29: Isa](https://reader036.vdocuments.us/reader036/viewer/2022062319/555ed27bd8b42a772f8b47e6/html5/thumbnails/29.jpg)
Key features
1. Internet Firewall (Intrusion detection)2. Secure Server Publishing3. Web Caching Server4. Secure NAT5. Integrated VPN6. Tiered-Policy Management7. QOS(Quality Of Service)
![Page 30: Isa](https://reader036.vdocuments.us/reader036/viewer/2022062319/555ed27bd8b42a772f8b47e6/html5/thumbnails/30.jpg)
Key features
1. Internet Firewall (Intrusion detection)2. Secure Server Publishing3. Web Caching Server4. Secure NAT5. Integrated VPN6. Tiered-Policy Management7. QOS(Quality Of Service)8. Multiprocessor Support
![Page 31: Isa](https://reader036.vdocuments.us/reader036/viewer/2022062319/555ed27bd8b42a772f8b47e6/html5/thumbnails/31.jpg)
Key features
1. Internet Firewall (Intrusion detection)2. Secure Server Publishing3. Web Caching Server4. Secure NAT5. Integrated VPN6. Tiered-Policy Management7. QOS(Quality Of Service)8. Multiprocessor Support9. Client Side Auto Discovery
![Page 32: Isa](https://reader036.vdocuments.us/reader036/viewer/2022062319/555ed27bd8b42a772f8b47e6/html5/thumbnails/32.jpg)
Key features
1. Internet Firewall (Intrusion detection)2. Secure Server Publishing3. Web Caching Server4. Secure NAT5. Integrated VPN6. Tiered-Policy Management7. QOS(Quality Of Service)8. Multiprocessor Support9. Client Side Auto Discovery10. Web Filters
![Page 33: Isa](https://reader036.vdocuments.us/reader036/viewer/2022062319/555ed27bd8b42a772f8b47e6/html5/thumbnails/33.jpg)
Key features
1. Internet Firewall (Intrusion detection)2. Secure Server Publishing3. Web Caching Server4. Secure NAT5. Integrated VPN6. Tiered-Policy Management7. QOS(Quality Of Service)8. Multiprocessor Support9. Client Side Auto Discovery10. Web Filters11. Alerts
![Page 34: Isa](https://reader036.vdocuments.us/reader036/viewer/2022062319/555ed27bd8b42a772f8b47e6/html5/thumbnails/34.jpg)
Types of Client
1. SECURE NAT Clients
2. WEB Clients
3. FIREWALL Clients
![Page 35: Isa](https://reader036.vdocuments.us/reader036/viewer/2022062319/555ed27bd8b42a772f8b47e6/html5/thumbnails/35.jpg)
Access is Controlled based on :-
1. Client address sets
2. Destination sets
3. Protocols
4. Bandwidth priorities