HP Microsoft Internet Security and Acceleration (ISA) Software manual Remote access VPN

Models: Microsoft Internet Security and Acceleration (ISA) Software

1 37
Download 37 pages 12.14 Kb
Page 25
Image 25

For example, if a Microsoft® Windows® domain exists on the internal network, configure the PDC emulator to use the ProLiant DL320 Security Server as its time server. If a Microsoft® Windows® domain does not exist, configure the individual clients to synchronize with the ProLiant DL320 Security Server time server.

Create an access policy enabling both the ProLiant DL320 Security Server and the computers on the LAN to contact Internet time servers.

1.In the scope pane of the ISA Server 2004 management console, expand the server name, right-click the Firewall Policy node, and select New>Access Rule.

2.On the Welcome to the New Access Rule Wizard page, enter the name for the rule in the Access rule name text box. In this example, enter Network Time requested by Local Host and Internal, and click Next.

3.On the Rule Action page, select Allow, and click Next.

4.On the Protocols page in the This rule applies to list, select Selected protocols, and click Add.

5.In the Add Protocols text box, select the Infrastructure folder, double-click the NTP (UDP) entry, and then click Close.

6.On the Protocols page, click Next.

7.On the Access Rule Sources page, click Add.

8.In the Add Network Entities dialog box, select Networks.

9.Double-click Local Host>Internal, and then click Close.

10.On the Access Rule Sources page, click Next.

11.On the Access Rule Destinations page, click Add.

12.Select the Networks folder, double-click the external entry, and then click Close.

13.On the Access Rule Destinations page, click Next.

14.On the User Sets page, click Next.

15.On the Completing the New Access Rule Wizard page, click Finish.

The ProLiant DL320 Security Server can now perform time synchronization with Internet-based time servers. If the internal network clients are to synchronize with the ProLiant DL320 Security Server, create an access rule allowing the internal network access to the local host network using the Network Time Protocol. In addition, configure the clients to use the correct time server. In Microsoft® Windows® XP, the time server configuration is performed in the Date and Time properties dialog box on the Internet Time tab.

Remote access VPN

A remote access VPN allows computers located virtually anywhere in the world to connect to computers in the internal network through the ProLiant DL320 Security Server using a VPN connection. The only requirement is that the client computer has an Internet connection. The ProLiant DL320 Security Server can be managed from home or any other location by creating a VPN connection to the server. In addition, other computers can be accessed on the internal network protected by the ProLiant DL320 Security Server. For comprehensive documentation on how to create and configure site-to-site VPN connections, see the ProLiant DL320 Security Server Help file and the Microsoft® ISA Server 2004 website (http://go.microsoft.com/fwlink/?LinkID=27332).

Managing and maintaining the firewall 25

Page 25
Image 25
HP Microsoft Internet Security and Acceleration (ISA) Software manual Remote access VPN

Microsoft Internet Security and Acceleration (ISA) Software specifications

HP Microsoft Internet Security and Acceleration (ISA) Software is a robust network security solution designed to safeguard business environments by offering a versatile platform for secure internet access. ISA Server integrates multiple functionalities that are essential for modern enterprise needs, helping organizations manage and protect their network infrastructure.

One of the main features of ISA Server is its firewall capabilities, which provide an essential barrier between internal networks and external threats. The software utilizes intelligent packet filtering to analyze incoming and outgoing traffic, ensuring that only legitimate communications are allowed while blocking potentially harmful activity. This helps to mitigate risks associated with external cyber threats and unauthorized access.

Another key feature is the built-in web caching technology. ISA Server improves network performance by caching frequently accessed websites and content. This reduces bandwidth usage and enhances response times for end-users, leading to increased productivity. By storing copies of web pages, ISA Server can serve them quickly to users, allowing enterprises to optimize their use of internet resources.

ISA Server also includes a powerful Virtual Private Network (VPN) feature, enabling secure remote access for employees. This technology supports secure connections over the internet, allowing users to access the corporate network and resources from anywhere in the world. The VPN capabilities ensure data encryption during transmission, protecting sensitive information from interception.

Moreover, ISA Server incorporates integrated threat management tools, which offer insights into potential security issues. These tools provide logging and reporting features that allow administrators to monitor traffic patterns and detect anomalies. This functionality is critical for identifying and responding to potential security breaches in real-time.

In addition to these features, ISA Server supports application-layer filtering, which enhances security further. This allows organizations to control access to specific applications and services while ensuring that malicious content cannot infiltrate the network.

Overall, HP Microsoft Internet Security and Acceleration Software is a comprehensive solution designed to address the complexities of network security in today’s digital landscape. Its combination of firewall protection, web caching, VPN capabilities, and application-layer filtering makes it an invaluable tool for organizations looking to secure their internet connectivity while optimizing performance and user experience. By leveraging advanced technologies and characteristics, ISA Server empowers businesses to operate safely and efficiently in an interconnected world.