- Exploring the ISA Server 2004 Management Console
- Configuring Networks with ISA Console Network Wizards and Tools
- Exploring Firewall Policy Settings
- Navigating the Monitoring Node Options
- Working with the Virtual Private Networks Node
- Examining the Cache Node Settings
- Configuring Add-ins
- Exploring the ISA General Node
- Summary
- Best Practices
Working with the Virtual Private Networks Node
A Virtual Private Network is an encrypted "tunnel" from an untrusted network such as the Internet into a trusted network, such as an organization’s Internal network. ISA Server 2004 possesses a wide array of VPN capabilities, all of which can be accessed through the Virtual Private Networks Node in the ISA Server Console, as shown in Figure 3.25.
FIGURE 3.25 Examining the Virtual Private Networks (VPNs) node in the ISA Console.
This section of the chapter covers the ISA Server Console settings in the VPN node at a high level, describing the general options available and giving an idea of what VPN tools are available in the console. For advanced VPN design, configuration, and step-by-step descriptions, see Chapters 9 and 10, "Extending ISA Server 2004 to Branch Offices with Site-to-Site VPNs."
Enabling and Configuring VPN Client Access
By default, VPN access through ISA Server is not enabled, and it must be turned on before VPN capabilities can be reviewed. Turning on VPN functionality is a straightforward process and can be performed as follows:
- Open the ISA Server Management Console (Start, All Programs, Microsoft ISA Server, ISA Server Management).
- In the console tree, select the Virtual Private Networks (VPN) node by clicking on it.
- In the Tasks pane, click the link labeled Enable VPN Client Access.
- Click the Apply button on the top of the Central Details pane.
Click OK when the success dialog box, shown in Figure 3.26, is displayed.
FIGURE 3.26 Enabling VPN client access.
After VPN client access has been granted, the VPN client settings can be configured by clicking on the Configure VPN Client Access link in the Task Pane. This link invokes the VPN Clients Properties dialog box, shown in Figure 3.27, where the following settings can be configured:
FIGURE 3.27 Setting VPN client properties.
- Maximum number of VPN Clients allowed The default is 100, but it can be throttled based on the server’s capacity.
- The specific Active Directory groups that can be granted remote access This option is relevant only if the server is a member of an AD domain. For non-AD domain member ISA servers, Remote Dial-In Authentication Service (RADIUS) authentication can be used to specify which users have access.
- What type of VPN Protocols will be allowed The two options are the Point-to-Point Tunneling Protocol (PPTP) and the Layer 2 Tunneling Protocol (L2TP).
- Whether or not user mapping will be enabled User mapping allows for non–Windows authenticated users to be mapped to AD users so that user-based policies can be applied.
Configuring Remote Access Configuration
Many of the options associated with VPNs in ISA Server can be found in the Remote Access configuration dialog box, accessible via the Select Access Networks link in the Task pane. The dialog box invoked via this link, shown in Figure 3.28, allows for the configuration of Remote Access properties specific to VPN access, but not necessarily specific to clients. These include the following settings:
FIGURE 3.28 Configuring Remote Access settings.
- Networks from which VPN clients can connect.
- Address assignment properties, such as automatic VPN client IP address assignment via the Dynamic Host Configuration Protocol (DHCP).
- Authentication methods allowed. This includes such protocols as Microsoft encrypted authentication version 2 (MS-CHAPv2), Extensible authentication protocol (EAP, for smartcards), and other downlevel encryption methods.
- Remote Dial-In User Service (RADIUS) Settings.
Creating Remote Site Networks for Site-to-Site VPN
ISA Server 2004 also includes the capability to create encrypted tunnels between two disparate networks in an organization that are connected through the Internet. This allows for communication across the Internet to be scrambled so that it cannot be read by a third party. ISA provides this capability through its Remote Site VPN capabilities.
The Remote Site VPN options, available on the Remote Sites tab in the Central Details pane of the VPN node, allow for the creation and configuration of Remote Site networks for site-to-site VPNs. These site-to-site VPN networks enable an organization to connect remote networks together, creating one complete, routable, and logical network, such as the one shown in Figure 3.29.
FIGURE 3.29 Configuring Remote Access settings.
When configuring a site-to-site VPN between two ISA Server 2004 systems, the option exists to secure the traffic by using the IP Security Protocol (IPSec), the Later Two Tunneling Protocol (L2TP) over IPSec, or the Point-to-Point Tunneling Protocol (PPTP), depending on the individual organizational security needs. These options are available when running the New Site-to-Site Network Wizard that is launched from the Add Remote Site Network link in the Task pane.
In addition to supporting a destination ISA Server 2004 system for site-to-site VPN, ISA Server also supports connecting to a third-party VPN Gateway that supports the IPSec protocol. This greatly extends ISA’s reach because third-party firewall solutions that may already be in place are potential candidates for ISA site-to-site VPNs.
Specific configuration information for site-to-site VPNs can be found in Chapter 10.
Understanding VPN Quarantine
The concept of the VPN quarantine network is fairly straightforward; although, its implementation is not necessarily so. Essentially, VPN quarantine refers to the capability to have ISA place a client that does not conform to specific criteria into a special quarantined VPN clients network. This network can then be limited to only a specific set of low-risk activities. For example, it may be useful to validate that all clients have approved anti-virus software installed before full access to the network is granted.
VPN quarantine is not on by default, and must be specifically set up and configured. Chapter 9 contains step-by-step procedures, but the configuration of VPN quarantine consists of two processes. The first process involves configuring VPN client computers with a special listener that reports to the ISA server if the client passes specified criteria that are necessary for full access. The second component, illustrated in Figure 3.30, involves checking the box in the Quarantined VPN Clients Properties dialog box.
FIGURE 3.30 Enabling VPN quarantine.
Unlike the other VPN settings, you can invoke this dialog box in the Networks node by double-clicking on the quarantined VPN clients network listed under the Networks tab of the Central Details pane.