Planning and Deploying Clients
This chapter covers the following Microsoft-specified objectives for the Deploying, Configuring, and Troubleshooting the Client Computer section of the Installing, Configuring, and Administering Microsoft Internet Security and Acceleration (ISA) Server 2000 exam:
Plan the deployment of client computers to use ISA Server services. Considerations include client authentication, client operating system, network topology, cost, complexity, and client function.
To deploy any new system in the most cost efficient and least disruptive fashion requires careful planning. Knowing how to configure and install clients is only a small part of the total picture. Of what good is knowledge of how to install the firewall client if it is determined that this client will not be used in the network? Of what use is the "least cost/least complexity" dogma, if no one knows the potential advantages of deploying clients that require more time and effort to deploy?
Client choices can also impact network infrastructure design. If services required by clients are not in place, then more changes to the current network infrastructure may have to be made. You must know the current status, as well as client requirements and plan needed changes so that the process is the least disruptive possible.
Get firmly entrenched in your mind the difference between client types.
Learn the relationship between requiring authentication of all users, the use of user groups to control access, and the client type.
Study each client type separately, and the impact of a single computer becoming more than one client type at a time.
Introduction
Plan the deployment of client computers to use ISA Server services. Considerations include client authentication, client operating system, network topology, cost, complexity, and client function.
Allowed access to the Internet should be transparent to users. That is, in visiting nonrestricted Web sites, using email, or a other nonprohibited services across the Internet, no user should be aware that a firewall or caching server sits between him and the actual source. On the other hand, you should be able to configure the firewall to successfully block and allow access as dictated by policy, and these rules should operate as expected. This is possible with ISA Server but its implementation is dependent on understanding the client types and how rules affect them. To plan the deployment of clients you must spend time:
Considering current infrastructure issues
Considering cost and complexity
This chapter discusses issues pertinent to planning client deployment, including network infrastructure changes and configuration. Detailed client, ISA Server and network infrastructure configuration is covered in Chapter 14, "Installing and Configuring Client Options."