Search This Blog

Wednesday, May 27, 2009

ISAserver.org - May 2009 Newsletter

-------------------------------------------------------
ISAserver.org Monthly Newsletter of May 2009
Sponsored by: Collective Software
-------------------------------------------------------

Welcome to the ISAserver.org newsletter by Thomas W Shinder MD, MVP.
Each month we will bring you interesting and helpful information on ISA Server.
We want to know what all *you* are interested in hearing about.
Please send your suggestions for future newsletter content to: tshinder@isaserver.org


1. Getting Ready for a Hot TMG Firewall Summer
--------------------------------------------------------------

Last month I spoke about how virtualization has changed the way we do computing, even the way we do network security. I made a point of the fact that all computing is about software, and virtualization changes the game and makes the artificial distinction between "hardware" and "software" firewalls moot. This is a good thing for ISA and TMG firewall admins, because now when talking with the network guys, they don't have to get into the relative security differences between traditional hardware and software firewalls – all firewalls will be software and most of them will be virtualized.

That said, there we a number of people who said that I was wrong about not being able to trust virtualization as a security platform. They directed me to information about how Microsoft has implemented a superior security model compared to VMware's and that Hyper-V does leverage Intel's VT extensions to the extent that you can put your ISA or TMG firewalls in a virtualized environment and not worry about any potential attack surface the virtualization layer may represent.

There were other people we wrote that I was maybe half right. These people thought I was right about the potential attack surface the virtualization software can represent, but thought that this attack surface wasn't so great that they would never put their ISA or TMG firewall up in a virtualized environment. Instead, what these people recommend is that you deploy your ISA or TMG firewalls on dedicated hardware at the edge, but then put the ISA or TMG firewall on a virtual machine anywhere else on the internal network.

Probably the most interesting responses were from those who said that there should be an ISA or TMG firewall on every virtual server. In this model, every virtual server has one or more "internal" networks were server resources are located. At the edge of the internal networks contained on the virtual servers are one or more ISA or TMG firewalls. Thus, the ISA or TMG firewall becomes the standard "virtual edge solution". I found this to be a very compelling design and will put together a series of articles on how you might implement the TMG firewall as a centrally managed "virtual edge solution". Nice!

Before signing out for this month, I just wanted to remind you that TMG Beta 2 is still available and if you have not had a chance to check it out, there is still time. But, if you want to wait just a week or two, you might want to hold on and check out TMG Beta 3, which should be out sometime in June. As reported at TechEd, URL filtering is back with Beta 3! That is indeed good news and I think you are going to like some of the new and improved features included with Beta 3. I will talk about TMG Beta 3 in the next newsletter.

Thanks!
Tom
tshinder@isaserver.org


Want to learn about network security from the experts? Want to get the inside information about Windows Network Security and the inner workings of the TMG firewall? Then join us at Black Hat Las Vegas for Microsoft Ninjitsu: Black Belt <http://www.blackhat.com/html/bh-usa-09/train-bh-usa-09-tm-ms-bbe.html> Tim, Jim and I provide helpful and cogent insights into squeezing the highest level of security from your Microsoft infrastructure and let you into the secret tweaks that we use to get an edge over the bad guys.

For ISA and TMG and other Forefront Consulting Services in the USA, call me at
Prowess Consulting <http://www.prowessconsulting.com>
206-443-1117

=======================
Quote of the Month - "Tact is the knack of making a point without making an enemy." - Sir Isaac Newton
=======================


2. ISA Server 2006 Migration Guide - Order Today!
--------------------------------------------------------------

Dr. Tom Shinder's best selling books on ISA Server 2000 and 2004 were the "ISA
Firewall Bibles" for thousands of ISA Firewall administrators. Dr. Tom and his
illustrious team of ISA Firewall experts now present to you , ISA Server 2006
Migration Guide
<http://www.amazon.com/exec/obidos/ASIN/1597491993/isaserver1-20/>. This book
leverages the over two years of experience Tom and his team of ISA Firewall
experts have had with ISA 2006, from beta to RTM and all the versions and builds
in between. They've logged literally 1000's of flight hours with ISA 2006 and
they have shared the Good, the Great, the Bad and the Ugly of ISA 2006 with
their no holds barred coverage of Microsoft's state of the art stateful packet
and application layer inspection firewall.

Order your copy of ISA Server 2006 Migration Guide
<http://www.amazon.com/exec/obidos/ASIN/1597491993/isaserver1-20/>. You'll be
glad you did.


3. ISAserver.org Learning Zone Articles of Interest
--------------------------------------------------------------

We have a great group of articles in the Learning Zone that will help you get a
handle on your most difficult configuration issues. Here are just a few of the
newer and more interesting articles:

* Overview of New Features in TMG Beta 2 (Part 2)
<http://www.isaserver.org/tutorials/Overview-New-Features-TMG-Beta2-Part2.html
Configuring and using the E-Mail protection feature in Microsoft Forefront Threat>

* Management Gateway Beta 2 (Part 1)
<http://www.isaserver.org/tutorials/Configuring-using-E-Mail-protection-feature-Microsoft-Forefront-Threat-Management-Gateway-Beta-2-Part1.html>

* Overview of New Features in TMG Beta 2 (Part 3)
<http://www.isaserver.org/tutorials/Overview-New-Features-TMG-Beta2-Part3.html>

* Websense Enterprise Voted ISAserver.org Readers' Choice Award Winner - Access Control
<http://www.isaserver.org/news/ISAserver-Readers-Choice-Award-Access-Control-Websense-Enterprise-Mar09.html>

* Configuring and using the E-Mail protection feature in Microsoft Forefront Threat Management Gateway Beta 2 (Part 2)
<http://www.isaserver.org/tutorials/Configuring-using-E-Mail-protection-feature-Microsoft-Forefront-Threat-Management-Gateway-Beta-2-Part2.html>

* ISAserver.org Readers' Choice Awards Yearly Round Up 2008
<http://www.isaserver.org/news/ISA-Readers-Choice-Awards-Yearly-Round-Up-2008.html>

* Overview of New Features in TMG Beta 2 (Part 4)
<http://www.isaserver.org/tutorials/Overview-New-Features-TMG-Beta2-Part4.html>

* Configuring the AntiMalware functionality in Microsoft Forefront TMG
<http://www.isaserver.org/tutorials/Configuring-AntiMalware-functionality-Microsoft-Forefront-TMG.html>


4. KB Article of the Month
---------------------------------------------------------------

On your ISA or TMG firewall, the following alert may appear in the Management node in the console on the Alerts tab:

*Resource allocation failure*

The alert description is similar to the following:

Description:
The Web Proxy filter failed to bind its socket to IP_address port 80. This may have been caused by another service that is already using the same port or by a network adapter that is not functional. To resolve this issue, restart the Microsoft Firewall service. The error code specified in the data area of the event properties indicates the cause of the failure. The failure is due to error: 0x80072740.

Note:
The same description is repeated for the IP address 127.0.0.1.
If you restart the Microsoft Firewall service, the alert is logged again.
When you receive the alert, you may experience either or both of the following symptoms:

* Clients that are configured to use automatic discovery cannot connect to the ISA Server or Microsoft Forefront Threat Management Gateway, Medium Business Edition computer.
* Users cannot connect to a Web site that is published through a Web publishing rule on your ISA Server or Microsoft Forefront Threat Management Gateway, Medium Business Edition computer. The Web publishing rule uses a listener that is configured to use port 80.
Check out Microsoft's support base for an explanation and a solution <http://support.microsoft.com/kb/888650>.


5. Tip of the Month
--------------------------------------------------------------

One of the most common questions appearing on the ISAserver.org message boards and mailing list are related to getting RSA SecurID working with the ISA firewall or TMG firewall. One of the trickier configurations is getting SecurID working with Terminal Services Gateway. Last month someone posted a link to a great article that gives you the step by step details on how to make it work! Check it out. <http://www.scribd.com/doc/15682090/TS-Gateway-2008-RSA>


6. ISA/TMG/IAG Links of the Month
--------------------------------------------------------------

* Forefront Threat Management Gateway is the future version of Microsoft ISA Server
<http://www.elmajdal.net/ISAServer/Forefront_Threat_Management_Gateway_is_the_future_version_of_Microsoft_ISA_Server.aspx>

* Microsoft ISA Server / Forefront Threat Management Gateway Two Vulnerabilities
<http://secunia.com/advisories/34687/>

* Installing Forefront Threat Management Gateway
<http://tamermaher.spaces.live.com/blog/cns!AB876127E31FDC4!535.entry?sa=862256305>

* Running TMG (Threat Management Gateway) in Hyper-V
<http://www.carbonwind.net/Forefront_TMG/Hyper-V/tmg_hyper-v.htm>

* Using the ADAM Sites Tool with ISA Server 2006 Enterprise Edition
<http://blog.msfirewall.org.uk/2009/05/using-adam-sites-tool-with-isa-server.html>

* ISA Server 2006/2004 Configuration Storage Server Frequently Asked Questions
<http://blog.msfirewall.org.uk/2009/04/isa-server-20062004-configuration.html>


7. Blog Posts
--------------------------------------------------------------

* Outlook RPC/HTTP Client Locks Out User Account through ISA Firewall <http://blogs.isaserver.org/shinder/2009/05/22/outlook-rpchttp-client-locks-out-user-account-through-isa-firewall/>

* Clearing the ISA Firewall's Web Cache <http://blogs.isaserver.org/shinder/2009/05/21/clearing-the-isa-firewalls-web-cache/>

* Configure an IPsec Tunnel Mode Site-to-Site VPN between an ISA Server 2006 SP1 SE and a Check Point NGX R65 VPN-1 <http://blogs.isaserver.org/shinder/2009/05/20/configure-an-ipsec-tunnel-mode-site-to-site-vpn-between-an-isa-server-2006-sp1-se-and-a-check-point-ngx-r65-vpn-1/>

* Technical Overview of DirectAccess in Windows 7 and Windows Server 2008 R2 <http://blogs.isaserver.org/shinder/2009/05/19/technical-overview-of-directaccess-in-windows-7-and-windows-server-2008-r2/>

* Improving Web Proxy Client Authentication Performance on ISA Server 2006 <http://blogs.isaserver.org/shinder/2009/05/18/improving-web-proxy-client-authentication-performance-on-isa-server-2006-2/>

* Jason Jones Demystifies ADAM Sites Configuration <http://blogs.isaserver.org/shinder/2009/05/18/jason-jones-demystifies-adam-sites-configuration/>

* Caching and Memory - Too Much of a Good Thing? <http://blogs.isaserver.org/shinder/2009/05/17/caching-and-memory-too-much-of-a-good-thing/>

* TechEd 2009: Post Show Feedback - David Cross <http://blogs.isaserver.org/shinder/2009/05/17/teched-2009-post-show-feedback-david-cross/>

* Jason Jones ISA Server 2006/2004 Configuration Storage Server FAQ <http://blogs.isaserver.org/shinder/2009/05/14/jason-jones-isa-server-20062004-configuration-storage-server-faq/>

* See a Panel Discussion on the TMG from TechEd <http://blogs.isaserver.org/shinder/2009/05/14/see-a-panel-discussion-on-the-tmg-from-teched/>


8. Ask Dr. Tom
--------------------------------------------------------------

* QUESTION:

Dear Tom,

I have setup a Back-to-Back ISA firewall between a front-end Pix and Back-end ISA firewall array. Now I have setup another back-to-back between the Front-end Array and Back-end single ISA Server. Internet is available only through the Front-end Array network. I want to allow the internal clients behind another Back-end ISA Server to access the Internet via proxy Front-end Array. Is it possible to configure Changing and DownStream?

Thanks,
Habibalby

* ANSWER:

Hi Habibalby,

There is no reason why you can not have a front end ISA firewall array in front of a single ISA firewall on the back end. This is a common scenario when you have multiple ISA firewalls distributed over the network, often representing departmental ISA firewalls. All the department ISA firewall can then be configured to forward connections to the front-end ISA firewall array.

Since it sounds like you are using the back-end ISA firewalls for forward Web proxy only, you're best and most flexible option is to chain the back-end ISA firewalls to the front-end array. All you need to do is configure a Web chaining rule to chain the back-end ISA firewalls to the front-end array.

Authentication might be an issue in your scenario. Remember that for general user authentication, you want to enable authentication on the back-end ISA firewalls. You do not want to load the front-end array with authentication requirements, at least not for forward proxy. You did not mention if the front-end array was part of the domain, but in general, if the back-end firewalls are part of the domain, there is no reason to add the front-end array to the domain, since it is the back-end firewalls that are performing the authentication heavy lifting.

Instead, make the front-end array part of its own workgroup, and create an account on the array members that the downstream ISA firewall's can use with chaining with the front-end firewall array. If you want, you can create multiple accounts, one for each of the downstream ISA firewalls. In that way, your reports will break out the traffic forwarded from each of the downstream firewalls.

The figure below shows the configuration interface where you would enter your credentials. Note that if you choose to use basic authentication, you should configure the downstream ISA firewall to use SSL between itself and the upstream.
<http://www.isaserver.org/img/IS-MWN-May09-1.jpg>

Got a question for Dr. Tom? Send it to tshinder@isaserver.org.


TechGenix Sites
--------------------------------------------------------------

MSExchange.org <http://www.msexchange.org/>
WindowSecurity.com <http://www.windowsecurity.com/>
WindowsNetworking.com <http://www.windowsnetworking.com/>
VirtualizationAdmin.com <http://www.virtualizationadmin.com/>

--
Visit the Subscription Management <http://www.techgenix.com/newsletter/>
section to unsubscribe.
ISAserver.org is in no way affiliated with Microsoft Corp.
http://www.techgenix.com/advert/index.htm for sponsorship
information or contact us at advertising@isaserver.org
Copyright c ISAserver.org 2009. All rights reserved.

No comments: