In-Reply-To: <[EMAIL PROTECTED]>

Hi Chris,

In danger of teaching you to sucks eggs:

Make sure that any client PC has to go through the ISA server to get to 
the router owned by your ISP (i.e. the Internet) first. This way, none of 
your users will be able to bypass the your secure gateway and therefore 
gain unauthorised access to the outside world (sounds a little restrictive 
when put like that!). NB Firewalls are meant to protect one from the 
INBOUND traffic though they can also provide OUTBOUND restriction and ISA 
is really a glorified proxy server.

To achieve this, all your internal PC's should be configured with either a 
default gateway address that eventually leads, perhaps via internal 
routing, to your Gateway, which I am assuming is your ISA server. If you 
do not have any internal routing, i.e. your ISA and PC's are on the same 
subnet, then just make the ISA's internal interface the default gateway 
for your clients. some might suggest to not configure a default gateway 
but instead use your 'proxy clients' (Browser?) settings to connect - 
this'll work but is limited to certain protocols or services. Ideally you 
have the browser set to go to the proxy for HTTP /s FTP etc and use the 
native routing for all other protocols that you may wish to allow (hence 
the probs with your telnet client I suspect).

PC ---- ISA ---- router ----- ISP core ----- 'Internet'

Don't allow PC's to circumvent this - i.e. use a cross-over cable between 
ISA external interface and router rj-45 presentation or e0 (cisco) 
interface.

Meanwhile...

Once this is done, just have a look at your ISA settings and make sure 
that each protocol is accounted for. I've only played with ISA a couple of 
times for customers but I just deleted all the default rules and started 
again so i knew exactly what was what.

I suggest that you make sure that the Protocol Rules, IP Packet filters 
and protocol definitions are all configured correctly. To test, try 
backing up your current config and starting again for maybe just telnet 
and ICMP echo reply/request configured on the afore mentioned 
rules/setting templates - when rebuilding the rules, keep the given 
defaults as, guess what, these leave things wide open. Once tested, you 
can look at hardening. Unfortunate that you are doing this in production 
environment...not secure and quite disruptive.

Feel free to get in touch if any of above is unclear or if you would like 
more detailed help.

ta
Gwyd1on



>From: Chris Berry <[EMAIL PROTECTED]>
>To: [EMAIL PROTECTED]
>Subject: Firewall problem
>
>
>
>    We're using MS ISA server as our firewall.  In accordance with their 
>best practices recommendation I've put it on a dual-homed machine and set 
>up only the external interface with a default gateway.  Our internet 
>connection is working well, and as far as I can tell reasonably secure.  
>However we can't connect telnet traffic, nor can I ping internet sites, 
>even though I have rules configured that should allow this.
>    


Reply via email to