There is some info on the how-tos at
http://www.microsoft.com/technet/treeview/default.asp?url=/technet/itsolutions/howto/isahow.asp
They may help you decide on your course of action.

----- Original Message ----- 
From: "Charles Marriott" <[EMAIL PROTECTED]>
To: "Exchange Discussions" <[EMAIL PROTECTED]>
Sent: Monday, December 09, 2002 6:15 PM
Subject: RE: ISA Server implementation for Exchange


> Don't ever put ISA on a DC. (unless you create a separate forest)
>
> -----Original Message-----
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED]]On Behalf Of Howard Griffith
> Sent: Monday, December 09, 2002 3:44 PM
> To: Exchange Discussions
> Subject: ISA Server implementation for Exchange
>
>
> Ok, here is the situation. I'm assigned to a project regarding Internet
> Security and I've been pushed into a corner and need some help.
>
> How are most people deploying ISA Server within their company? Are they
> adding it as a member of their AD domain or making it stand alone?
>
> Let me explain why I'm asking. Our company is looking at doing a more
secure
> DMZ. For my part of the project I need to present a way to continue to
allow
> access to our Exchange services to outside users, for this example, we'll
> say just SMTP and OWA.
>
> Ok, here is the catch. Even though we already have a checkpoint firewall
in
> place on the outside border of the DMZ they feel that we should add
another
> firewall on the inside border and put ISA between them as a stand alone
box.
> While this will work, it's not exactly the best in my opinion.
>
> This is what I'm proposing but I need ammo to back it up. I'm telling them
> leave the Checkpoint where it is and use the ISA server as the inside
border
> firewall and allow it to be a member of the AD domain. Put the web servers
> in the DMZ (their decision not mine) and allow me to publish my Exchange
> services with ISA to the outside world. Granted, even though this will all
> still be behind the checkpoint firewall, they don't like it. They want a
> completely disconnected DMZ. I've tried explaining the ins and outs about
> how ISA will do just fine and block everything the way it should and how
we
> can do packet content level filtering but I'm still getting the "you're
> wrong and stupid" looks from them.
>
> Can somebody point me in the right direction for GOOD technical or
political
> ammo to back up what I've recommended. Or am I whistling in the wind????
>
> TIA,
> Howard
>
> _________________________________________________________________
> List posting FAQ:       http://www.swinc.com/resource/exch_faq.htm
> Archives:               http://www.swynk.com/sitesearch/search.asp
> To unsubscribe:         mailto:[EMAIL PROTECTED]
> Exchange List admin:    [EMAIL PROTECTED]
>
>
> _________________________________________________________________
> List posting FAQ:       http://www.swinc.com/resource/exch_faq.htm
> Archives:               http://www.swynk.com/sitesearch/search.asp
> To unsubscribe:         mailto:[EMAIL PROTECTED]
> Exchange List admin:    [EMAIL PROTECTED]
>

_________________________________________________________________
List posting FAQ:       http://www.swinc.com/resource/exch_faq.htm
Archives:               http://www.swynk.com/sitesearch/search.asp
To unsubscribe:         mailto:[EMAIL PROTECTED]
Exchange List admin:    [EMAIL PROTECTED]

Reply via email to