Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Isa

970 views

Published on

  • Be the first to comment

  • Be the first to like this

Isa

  1. 2. What is ISA Server :- ISA server is a upgraded version of Microsoft proxy server 2.0 with inbuilt FIREWALL PROXY FIREWALL
  2. 3. Proxy server :- It’s a server which emulates as a web server 192.168.1.2 Client Proxy Server 192.168.1.1 Zoom.com Internet
  3. 4. HACKING : - Taking over your resources or attempt to bring down your server Types of ATTACK: - 1. Foot printing :- The way to know the OS and IP of server 2. Scanning :- Scanning system for bugs and loopholes 3. DOS Attacks : - Denial Of Service 4. Exploits : - Writing scripts to bring down server 5. Trojans : - Sending viruses to steal the DATA 6. Port Scan : - Scanning ports for getting into applications ETC………
  4. 5. Types of Attacks 1. Foot Printing The Art of gathering the complete security profiles of an Organization or a Target Computer By using a combination of Tools and Techniques, The Hacker can take up the system and determine its Ip address and Domain names
  5. 6. Types of Attacks 2. Scanning Scanning the System for Bugs and Loopholes in O/S Hacker uses scanning technique to determine which Ports Are open, what services are running and what is the O/S E.G: RETINA, Shadow Security scanner, ANSIL etc
  6. 7. Types of Attacks 3. DOS Attack Denial of Service attack which is an attempt to get the Services or the server down by overflowing the buffer E.G: Win spoof 97, My Spoof
  7. 8. Types of Attacks 4. Exploits Exploits are usually Bugs in Applications or O/S which can be Exploited by using a piece of Code often referred as Scripts E.G: CGI scripts, Perl scripts etc
  8. 9. Types of Attacks 5. Trojan Horses Trojan Horses is program that pretends to be a useful tool But actually installs malicious or damaging software Trojan Horses can be used to take over the Remote System. Sending viruses to steal the Data E.G. Netbus , Bo2k
  9. 10. Types of Attacks 6. Port Scanner Scanning the port to get into the Application E.G: Port Scanner, etc
  10. 11. What is a Firewall : - A firewall protects networked computers from intentional hostile intrusions Software Firewall : - Hardware Firewall : - ISA Server Checkpoint Smooth wall Cisco Pix Watch Guard Multicom Ethernet II…..
  11. 12. Types of FIREWALL Packet Filtering e.g.. ROUTERS Controls data transfer based on Source & Destination IP Address TCP/UDP Port of Source & Destination IP Address Packets are allowed or dropped through the device depending on the Access Control List
  12. 13. Application Gateway eg. PROXY SERVER Packets are allowed based on type of application and IP address Filter Application specific commands such as: HTTP:GET and POST etc Application level Gateways can also be used to: To Log User Activity and Logins
  13. 14. Statefull Multilayer Inspection This is a full fledged firewall which combines the aspects of other two types of firewalls and is capable of intrusion detection server publishing etc…. eg. ISA SERVER
  14. 15. Flavors of ISA Server Enterprise and Array policies Local only Policy based Support No limit 4 cpu’s only Scalability Multiple server with Centralized Management Standalone only Server Deployment Enterprise Edition Standard Edition
  15. 16. ISA Server requirements : - <ul><li>Member server or Domain Controller </li></ul><ul><li>Service pack 1 or above </li></ul><ul><li>Two interface (public and private) </li></ul><ul><li>Routing and Remote Access </li></ul><ul><li>Pentium III 300MHz or above </li></ul><ul><li>256 Mb Ram </li></ul><ul><li>20 Mb of Hard Disk space on NTFS 5.0 </li></ul>
  16. 17. Array considerations Arrays allow a group of ISA Server computers to be treated and managed as a single, logical entity. They provide scalability, fault tolerance, and load balancing All array members must be in the same Windows 2000 domain and in the same site
  17. 18. Enterprise Vs Standalone Policies No . Only a local array policy can be applied. Yes . A single policy can be applied to all arrays in the enterprise. Enterprise policy No need for 2000 Domain Can be installed in Windows NT 4.0 domains. Configuration information is stored in the registry. Must be installed only in Windows 2000 domains with Active Directory installed. Active Directory requirement Limited to only one member. Can have one or more member servers. Scalability and fault tolerance Stand-alone server Array  
  18. 19. Enterprise Tiered Policy ISA Server Enterprise Edition supports two levels of policy: array level and enterprise level Array
  19. 20. ISA SERVER MODES 1. Firewall mode
  20. 21. <ul><li>ISA SERVER MODES </li></ul><ul><li>Firewall mode </li></ul><ul><li>Cache mode </li></ul>
  21. 22. <ul><li>ISA SERVER MODES </li></ul><ul><li>Firewall mode </li></ul><ul><li>Cache mode </li></ul><ul><li>Integrated mode </li></ul>
  22. 23. <ul><li>Key features </li></ul><ul><li>Internet Firewall (Intrusion detection) </li></ul>
  23. 24. <ul><li>Key features </li></ul><ul><li>Internet Firewall (Intrusion detection) </li></ul><ul><li>Secure Server Publishing </li></ul>
  24. 25. <ul><li>Key features </li></ul><ul><li>Internet Firewall (Intrusion detection) </li></ul><ul><li>Secure Server Publishing </li></ul><ul><li>Web Caching Server </li></ul>
  25. 26. <ul><li>Key features </li></ul><ul><li>Internet Firewall (Intrusion detection) </li></ul><ul><li>Secure Server Publishing </li></ul><ul><li>Web Caching Server </li></ul><ul><li>Secure NAT </li></ul>
  26. 27. <ul><li>Key features </li></ul><ul><li>Internet Firewall (Intrusion detection) </li></ul><ul><li>Secure Server Publishing </li></ul><ul><li>Web Caching Server </li></ul><ul><li>Secure NAT </li></ul><ul><li>Integrated VPN </li></ul>
  27. 28. <ul><li>Key features </li></ul><ul><li>Internet Firewall (Intrusion detection) </li></ul><ul><li>Secure Server Publishing </li></ul><ul><li>Web Caching Server </li></ul><ul><li>Secure NAT </li></ul><ul><li>Integrated VPN </li></ul><ul><li>Tiered-Policy Management </li></ul>
  28. 29. <ul><li>Key features </li></ul><ul><li>Internet Firewall (Intrusion detection) </li></ul><ul><li>Secure Server Publishing </li></ul><ul><li>Web Caching Server </li></ul><ul><li>Secure NAT </li></ul><ul><li>Integrated VPN </li></ul><ul><li>Tiered-Policy Management </li></ul><ul><li>QOS(Quality Of Service) </li></ul>
  29. 30. <ul><li>Key features </li></ul><ul><li>Internet Firewall (Intrusion detection) </li></ul><ul><li>Secure Server Publishing </li></ul><ul><li>Web Caching Server </li></ul><ul><li>Secure NAT </li></ul><ul><li>Integrated VPN </li></ul><ul><li>Tiered-Policy Management </li></ul><ul><li>QOS(Quality Of Service) </li></ul><ul><li>Multiprocessor Support </li></ul>
  30. 31. <ul><li>Key features </li></ul><ul><li>Internet Firewall (Intrusion detection) </li></ul><ul><li>Secure Server Publishing </li></ul><ul><li>Web Caching Server </li></ul><ul><li>Secure NAT </li></ul><ul><li>Integrated VPN </li></ul><ul><li>Tiered-Policy Management </li></ul><ul><li>QOS(Quality Of Service) </li></ul><ul><li>Multiprocessor Support </li></ul><ul><li>Client Side Auto Discovery </li></ul>
  31. 32. <ul><li>Key features </li></ul><ul><li>Internet Firewall (Intrusion detection) </li></ul><ul><li>Secure Server Publishing </li></ul><ul><li>Web Caching Server </li></ul><ul><li>Secure NAT </li></ul><ul><li>Integrated VPN </li></ul><ul><li>Tiered-Policy Management </li></ul><ul><li>QOS(Quality Of Service) </li></ul><ul><li>Multiprocessor Support </li></ul><ul><li>Client Side Auto Discovery </li></ul><ul><li>Web Filters </li></ul>
  32. 33. <ul><li>Key features </li></ul><ul><li>Internet Firewall (Intrusion detection) </li></ul><ul><li>Secure Server Publishing </li></ul><ul><li>Web Caching Server </li></ul><ul><li>Secure NAT </li></ul><ul><li>Integrated VPN </li></ul><ul><li>Tiered-Policy Management </li></ul><ul><li>QOS(Quality Of Service) </li></ul><ul><li>Multiprocessor Support </li></ul><ul><li>Client Side Auto Discovery </li></ul><ul><li>Web Filters </li></ul><ul><li>Alerts </li></ul>
  33. 34. <ul><li>Types of Client </li></ul><ul><li>SECURE NAT Clients </li></ul><ul><li>WEB Clients </li></ul><ul><li>FIREWALL Clients </li></ul>
  34. 35. <ul><li>Access is Controlled based on :- </li></ul><ul><li>Client address sets </li></ul><ul><li>Destination sets </li></ul><ul><li>Protocols </li></ul><ul><li>Bandwidth priorities </li></ul>

×