Overview of ISA and TMG Networking and ISA Networking Case Study (Part 2)

            老方说:此篇文章摘自ISASERVER.ORG网站,出自Thomas Shinder达人之手。严重建议ISA爱好者看看。
  • Published: Dec 16, 2008
  • Updated: Jan 21, 2009
  • Author: Thomas Shinder
In our last article . ISA and TMG firewall networking, I talked about how ISA and TMG firewalls use Networks to control traffic moving through and to the firewall. To recap, ISA and TMG Firewall Networks are collections of IP addresses located behind a specific NIC . the firewall. The addresses can be . and off-subnet for the specific NIC, but in order for a client behind any NIC . the TMG or ISA firewall to reach a destination through the firewall, that client’s IP address must be included in the definition of the ISA or TMG Firewall Network from which it connects. If the client’s IP address is not part of the ISA Firewall Network definition for the NIC that receives the request, the connection will be dropped as spoofed.
If you have not read part 1 of this series . ISA and TMG Networking, or want to brush up . what ISA/TMG Firewall Networks are all about, click here.
Now that you understand the details of ISA/TMG Firewall Networks, the next step is to understand how to connect those Networks. In order a host . .e ISA/TMG Firewall Network to connect to a host . another ISA/TMG Firewall Network, the source and destination Networks must be connected. The way you connect ISA/TMG Firewall Networks is by creating a Network Rule.
Network Rules connect ISA/TMG Firewall Networks in .e of two ways: NAT or Route. When you connect ISA/TMG Firewall Networks to each other, you also define the route relationship between the Networks.
Note:
Pay attention to the capitalization when I refer to networks. A “network” with a lower case “n” is a generic network, while a Network with an upper case “N” is an ISA/TMG Firewall Network.
When you define a NAT relationship between the source and destination Network, all IP addresses . the source Network are hidden from the destination host. The destination host sees the source IP address as the primary IP address . the external interface of the ISA/TMG firewall. The primary IP address is the IP . top of the IP address list (when there is more than .e IP address bound to the external interface of the ISA/TMG firewall). A NAT route relationship is .e-way. When you NAT from source to destination, you do not NAT from destination to source. For example, when you NAT from the default Internal Network to the default External Network, you do not NAT from the default External Network to the default Internal Network.
In general, when there is a NAT relationship between the source and destination Network, you create Access Rules to allow connections from the NATed to the non-NATed Network (for example, from the default Internal Network to the default External Network) and Publishing Rules to allow connections from the non-NATed Network to the NATed Network (for example, from the default External Network to the default Internal Network).
When you define a route relationship between two ISA/TMG Firewall Networks, the route relationship is reciprocal. That is to say, if you create a route relationship from source to destination Network, then there is also a route relationship between the destination and source Network. When there is a route relationship, no IP addresses are hidden, and the source IP address is always preserved.
In general, you use Access Rules to allow traffic in both directions when there is a route relationship between source and destination Networks. For example, if you have a route relationship defined for connections from the default Internal Network to a DMZ Network, then you can use Access Rules to allow connections from the default Internal Network to the DMZ Network, and you can use Access Rules to allow connections from the DMZ Network to the default Internal Network.
An example Network Rule appears in figure 1 below. In this example, there is a Network Rule that connects the DMZ Network to the default Internal Network and the route relationship is Route.
clip_image001
Figure 1
Remember, there must always be a Network Rule that connects the source and destination Network. Even if you create an Access Rule that allows a connection from a host . .e Network to a host . another Network, the connection attempt will fail because the Networks are not connected by a Network Rule. This problem can be hard to troubleshoot because when you check the ISA/TMG firewall’s log files, you will see that the connection attempt is denied, but there would not be any information indicating that the problem is a missing Network Rule. Well, that’s been true for ISA firewalls. I have not yet tested this with TMG firewalls. However, the problem should be less frequent with TMG firewalls, since when creating a new TMG Network, you are asked to define the Network Rule before the Network is created. In contrast, with the ISA firewall, you could create a Network without creating a Network Rule.
Network Rule Examples
To get a better understanding of how Network Rules work in connecting ISA/TMG Firewall Networks, let’s look at a few examples. In figure 2 below, you will see a typical configuration for an ISA/TMG firewall with a default Internal and default External Network. In this example, there is a Network Rule connecting the default Internal and External Networks, and the Network Rule defines a NAT relationship between the Networks.
When clients . the default Internal Network try to connect to hosts . the default External Network, the source IP address seen by the host . the default External Network is going to be the primary IP address . the external interface of the ISA/TMG firewall. In effect, the ISA/TMG firewall is “hiding” the IP address of the source client.
clip_image002
Figure 2
ISA and TMG firewalls can be configured with multiple NICs. There is no limit . the number of NICs you can install in an ISA or TMG firewall. In fact, you can even create virtual NICs using 802.1q VLAN tagging, as long your NICs and NIC drivers support this configuration. When you have multiple NICs installed . the ISA firewall, you can create an ISA/TMG Firewall Network for each of the NICs (recall our discussion of ISA/TMG Firewall Networks in part 1 of this article series, where each NIC represents the “root” of each ISA/TMG Firewall Network).
In the figure below, you can see that there are three NICs installed . the ISA firewall. .e NIC is connected to the default External Network .e NIC is connected to the default Internal Network, and .e NIC is installed . a DMZ Network. There are two Network Rules configured . the ISA Firewall:
  • A Network Rule connecting the default Internal Network to the default External Network, and the route relationship is NAT
  • A Network Rule connecting the default Internal Network to the DMZ Network, and the route relationship is Route
In this configuration, connections from the default Internal Network to the default External Network will be NATed, and the destination hosts will see the source IP address of the connection as the primary IP address . the external interface of the ISA firewall. When hosts . the default Internal Network connect to hosts . the DMZ Network, the destination hosts . the DMZ Network will see the source IP address as the actual IP address of the host . the default Internal Network. Likewise, since the route relationship is reciprocal, when a host . the DMZ Network tried to connect to a host . the default Internal Network, the host . the default Internal Network will see the source IP address as the actual IP address of the host . the DMZ Network.
In this next example (figure 3), connections from the default Internal Network to the default External Network are allowed by using Access Rules. Connections from the default External Network to the default Internal Network are allowed by publishing rules (either Web or Server Publishing Rules). Connections from the DMZ Network to the default Internal Network, and from the default Internal Network to the DMZ are allowed using Access Rules.
clip_image003
Figure 3
What do you think will happen if a host . the DMZ Network tries to connect to a host . the default External Network? Since there is no Network Rule in place connecting hosts . the DMZ Network to the default External Network, the connection attempt will be denied, as seen in figure 4 below. Even if there is an Access Rule allowing the connection, the connection attempt will fail because there is no Network Rule connecting the Networks.
clip_image004
Figure 4
Let us say that we create a Network Rule that connects the DMZ Network to the default External Network and define the route relationship as NAT. When there is a NAT relationship, we can use either public or private addresses . the source Network. Connections from hosts . the DMZ Network to the default External Network are allowed by using Access Rules, and connections from the default External Network to the DMZ network are allowed by using publishing rules.
clip_image005
Figure 5
Figure 6 below shows a slight alteration in the configuration. In this case, there is a route Network Rule connecting the DMZ Network to the default External Network. Because there is a route relationship, we must use public addresses . the DMZ Network, because private addresses are not routable over the Internet. We can use Access Rules to allow connections from the DMZ Network to the default External Network, and we can also use Access Rules to allow connections from the default External Network to the DMZ Network.
Up to this point, I’ve been telling you that when you have a route relationship, you can use Access Rules to control traffic in both directions. However, it is possible to use publishing rules. In the case or Web Publishing Rules, the route relationship isn’t an issue, because the connections are always proxied from the source and destination Network, so no actual “routing” at an IP level actually takes place. However, the situation is a little different with Server Publishing Rules.
When there is a route relationship between the source and destination Network, you can allow incoming connections using either an Access Rule or a Server Publishing Rule. In some cases, you might want to use a Server Publishing Rule instead of an Access Rule, because application layer inspection filters are bound to some Server Publishing Rules that can’t be bound to access rules.
For example, in the example configuration noted in the above figure 5, there is a route relationship because the default External Network and the DMZ Network. Suppose you have an SMTP server . the DMZ Network. You want to allow incoming SMTP messages from the Internet to the SMTP server . the DMZ Network. In this case, you could create an Access Rule to allow incoming SMTP connections from the default External Network to the DMZ Network, or you could create a Server Publishing Rule that publishes the SMTP server . the DMZ Network.
The advantage of using a Server Publishing Rule in this scenario is that the SMTP filter can be bound to the “SMTP Server” protocol. “Server” protocols are for inbound connections .ly. The SMTP filter can’t be bound to the “SMTP” protocol, which is used for Access Rules. Thus, a Server Publishing Rule using the SMTP Server protocol allows us to apply application layer inspection . the incoming connections.
I should note here that when you do use Server Publishing Rules to publish servers in a scenario where this is a route relationship between the source and destination Network, you still publish the machine using the actual IP address of the published server. However, the ISA or TMG firewall then performs a bit of magic to intercept the connection so that application layer inspection can be performed. The firewall does what is called “port stealing” . the Server Publishing Rule, so that when connections destined to the actual IP address of the published server are made, the firewall “steals” the connection and passes it to the application layer inspection filters. If the connection passes inspection, then it is forwarded to the published server. If the connection does not pass inspection, then it is dropped.
clip_image006
Figure 6
Now let us change our focus and look at the connectivity between the DMZ Network and the default Internal Network. In figure 7 below, you can see that we have a Network Rule connecting the default Internal Network to the DMZ Network, and the route relationship is NAT. Because the route relationship is NAT, when hosts . the default Internal Network try to connect to hosts . the DMZ Network, the DMZ Network hosts will see the source IP address of the connection to the be primary IP address . the DMZ NIC.
To allow connections to the DMZ Network from the default Internal Network, you need to create Access Rules. To allow connections from hosts . the DMZ Network to hosts . the default Internal Network, you need to create publishing rules. What you cannot do when there is a NAT relationship from the default Internal Network to the DMZ Network is create Access Rules allowing connections from the DMZ Network to the default Internal Network.
clip_image007
Figure 7
Figure 8 shows a reversal of the Network Rule connecting the DMZ Network to the default Internal Network. In this case, the Network Rule defines a NAT relationship from the DMZ Network to the default Internal Network. When hosts . the DMZ Network try to connect to hosts . the default Internal Network, the hosts . the default Internal Network will see the source IP address of the connection request as the primary IP address . the Internal Network NIC. Access Rules are allow connections from hosts . the DMZ Network to the default Internal Network and publishing rules allow connections from hosts . the default Internal Network to the DMZ Network. You cannot create Access Rules to allow connections from the default Internal Network to the DMZ Network because the hosts . the default Internal Network are . the non-NATed Network.
clip_image008
Figure 8
The next scenario looks at a scenario that is a common point of confusion: the back to back ISA/TMG firewall configuration. In a back to back firewall configuration, there is a front-end ISA/TMG firewall that is connected to the Internet, and there is a back-end ISA/TMG firewall that is connected to a DMZ behind the front-end firewall and an internal network behind the back-end firewall.
In the typical case, the front-end ISA/TMG firewall has a NAT route relationship between the DMZ network behind the front-end firewall and the default External Network. The back-end ISA/TMG firewall has a NAT relationship between the default Internal Network and the default External Network.
What you should appreciate here is that in this typical scenario, the DMZ network in front of the back-end ISA/TMG firewall is part of the back-end ISA/TMG firewall’s default External Network. Because it is part of its default External Network, the route relationship is going to be NAT. Therefore, if hosts behind the back-end ISA/TMG firewall need to connect to machines . the DMZ network between the firewalls, then you will create Access Rules to enable those connections. If there are machines in the DMZ network between the firewalls that need to connect to hosts behind the back-end ISA/TMG firewall, then you will need to create publishing rules to enable those connections.
clip_image009
Figure 9
Now let’s look a variation of the above scenario. In this case, . the back-end ISA/TMG firewall we create an ISA/TMG Firewall Network for the DMZ between the firewalls. Then we create a Network Rule that connects the default Internal Network . the back-end ISA/TMG firewall to the DMZ Network and define a Route relationship between the Networks. Now when hosts connect to resources . the DMZ Network, an Access Rule is used to allow the connection and the hosts . the DMZ Network see the source IP address as the original client IP address. This configuration also allows you to create Access Rules to allow hosts . the DMZ Network to connect to hosts . the default Internal Network behind the back-end ISA/TMG firewall.
This scenario is important because many people would like to terminate *** connections at the front-end firewall. When *** clients are terminated at the front-end ISA/TMG firewall, they are given IP addresses that are part of the DMZ Network. Thus, they act as DMZ Network hosts. You can then create Access Rules that allow the *** clients access to resources . the default Internal Network behind the back-end ISA/TMG firewall. The take home point is that since the *** clients are given IP addresses that belong to DMZ Network definition . the back-end ISA/TMG firewall, you can use Access Rules instead of publishing rules due to the route relationship between the two Networks.
There is .e more thing you should be aware of in this back to back configuration where there is a route relationship between the back-end ISA/TMG firewall’s default Internal Network and the DMZ Network. When hosts . the back-end ISA/TMG firewall’s default Internal Network try to connect to the Internet, the connections must go through both firewalls. When the front-end ISA/TMG firewall receives the outbound connection request from hosts . the back-end ISA/TMG firewall’s default Internal Network, the source IP address is going to be the actual IP address of the host making the request.
Normally, the default Internal Network for the front-end ISA/TMG firewall will include the IP addresses . the DMZ Network. However, since there is a route relationship between the DMZ Network and the back-end ISA/TMG firewall’s default Internal Network, you need to include the addresses in the back-end ISA/TMG firewall’s default Internal Network in the addresses that define the front-end ISA/TMG firewall’s default Internal Network. If you fail to do this, the front-end ISA/TMG firewall will see the source address as .e that doesn’t belong to it’s default Internal Network and will drop the connection as spoofed.
clip_image010
Figure 10
Summary
In this, part two in our series about ISA/TMG Network concepts, I went over some scenarios that were designed to help you understand the concept of Network Rules. Network Rules are required to connect Networks. If source and destination Networks are not connected, no communications will be allowed between those Networks, even if there are Access Rules configured to allow the connections. When defining a Network Rule to connect a source and destination Network, you also define the route relationship. The route relationship can be either NAT or Route. Access Rules and publishing rules are supported in a different way, depending . the route relationship between the source and destination Networks.
Next week we will look at a case study where we had to have a good understanding of how ISA/TMG firewall Networks work in order to get a working solution. This case study involves migrating an old ISA 2000 firewall to ISA 2006. Not .ly that, but the migration also includes changing over from a unihomed ISA firewall to a dual-homed firewall. As you might imagine, there were several network issues that needed to be addressed. You find out what the problems where and how we solved them in the next article. See you then! –Tom.

本文来自互联网用户投稿,该文观点仅代表作者本人,不代表本站立场。本站仅提供信息存储空间服务,不拥有所有权,不承担相关法律责任。如若转载,请注明出处:http://www.mzph.cn/news/466253.shtml

如若内容造成侵权/违法违规/事实不符,请联系多彩编程网进行投诉反馈email:809451989@qq.com,一经查实,立即删除!

相关文章

WIN10 vagrant和virtualbox虚拟机和一键搭建lnmp环境配置thinkphp虚拟主机

版本:win10系统  virtualbox:5.1.26  vagrant :1.9.7  centos 7.0  xshell/git 首先下载好对应版本的软件 配置vagrant和virtualbox 一.把虚拟机加载到box容器中 vagrant box add CentOs7.0 D:\soft\Vagrantfile\package.boxCentOs7.0 是给虚拟机起的名字 D:\soft\Vagr…

Linux 驱动开发 | 驱动世界里的宏伟建筑

哈喽,我是老吴。是否每一个上进的人都会觉得自己还可以再努力一点?事情到了最后,只要没达成目的,总能把失败的原因归为 "没有再努力一点"。但是,对努力的最大错误认知就是:时间越长,过…

【乡音】海安话四级考试

海安话四级考试海安话国家四级考试试卷-------------启用前★绝密------------(中国标准话语言研究中心命题) 准考证号___________ 姓名_____________ 座位号___________ 一、选择题(共五题&#xf…

POJ1179 Polygon 【例题精讲】

题意:多边形游戏是一个单人玩的游戏,开始时有一个由n个顶点构成的多边形。每个顶点被赋予一个整数值,每条边被赋予一个运算符“”或“*”。所有边依次用整数从1到n编号游戏第1步,将一条边删除随后n-1步按以下方式操作(1)选择一条边…

学模拟电路的神器everycircuit

之前转的几篇文章,大家对里面的软件非常感兴趣,所以就给你们找来了,这是一个仿真软件。▌官网https://everycircuit.com/▌视频介绍,视频是老外的比如,你想仿真一个555定时器▌手机上也可以用,可以在我刚才…

我也想再上个学

关注我的同学应该知道,我不止在一次告诉大家读书是可以让大家能有更多的机会的,有时候自己也想什么时候再深造一下,等楠哥不那么需要我了,我也不用那么努力赚钱了,再去读读书,在学校里面打打篮球&#xff0…

使用GenerateDriverDiskISO无需软驱安装WINDOWS操作系统

转自:[url]http://bbs.wuyou.com/viewthread.php?tid121630&extra&page1[/url]附件中有详细文章内容及GenerateDriverDiskISO.RAR下载作者: lookskyoo 时间: 2008-3-5 11:19 标题: [chenhall找到最好的解决方案]自认为最好的…

ESP32搞的NES游戏掌机

本文转自立创开源硬件平台作者:micespring原文链接:https://oshwhub.com/micespring/esp32-nesemu▌简介一个基于ESP32制作的开源游戏掌机,可以运行标准的NES(日版为FC)游戏,支持单声道音频。让你随时回味儿…

Matplotlib从文件绘图时Y轴坐标不正确

问题描述: 从文件中读取X坐标和Y坐标,绘制折线图,代码和结果如下: import matplotlib.pyplot as plt import matplotlib.animation as animation from matplotlib import stylestyle.use(dark_background)fig plt.figure()graph_…

全球最囧的爱情测试.....

据说这是全球最准的爱情测试:http://love.xf001.com/?uid224632 。。。。。。。。。。。。。。。。。。。。。。。。。。 。。。。。。。。。。。。。。。。。。。。。。。。。。 。。。。。。。。。。。。。。。。。。。。。。。。。。 。。。。。。。。。。。。…

回答嵌入式初学者的一些问题

如图,最近类似的提问很多,上周末,刚打球回来,跟一起刚工作的同学聊了一个晚上。要知道,一个晚上的时间我可以做很多事情,可以玩好多局王者荣耀,可以看很多论坛的资料。但是我愿意花费时间在他身…

什么是RAC定位?

笔者因为工作原因,接触到一种叫做RAC的定位产品,该定位产品不同于一般的定位模组,它产品外表看起来很像一个GPS定位天线,通过一个4芯线缆(供电串口通信)直接和其它MCU/CPU 相连接,输出定位信息。…

15个有趣的555电路,没事可以自己做一做

NE555几乎是一个非常常见的一个芯片,在很多的电器里都能看到它的身影,本文为大家总结了一些有趣的NE555电路。013*3*3光立方02激光射线03金属探测器04音乐盒05电子转盘06舵机测试器07反应计时器08高压发生器09触摸开关10交通信号灯11电视信号干扰器12自行…

使用ABAP和JavaScript代码生成PDF文件的几种方式

ABAP 方法1:使用ABAP Adobe Lifecycle Enterprise Service 详细步骤参考我的博客Convert word document into PDF via Adobe Livecycle Enterprise service 方法2:使用ABAP Webdynpro里的InteravtiveForm控件 Adobe Form Template 详细步骤参考我的博客…

Configuration Manager 纯模式所需的 PKI 证书的分步部署示例

Configuration Manager 纯模式所需的 PKI 证书的分步部署示例:Windows Server 2008 证书颁发机构此分步示例部署使用 Windows Server 2008 证书颁发机构 (CA),提供一些过程以指导您完成创建和部署 Configuration Manager 2007 在纯模式下操作所需的公钥基…

周琦能和范志毅比高下?

在最新的直播中,徐静雨就专门谈到了周琦与范志毅的对比,他先是举例乒乓球界的张继科与篮球界的姚明对比,张继科在乒乓球界的成就要远高于姚明,但是姚明的影响力却是张继科无法比较的。而在篮球界与足球界的对比中,他明…

[原创]C/C++语言中,如何在main.c或main.cpp中调用另一个.c文件

C/C语言中,如何在main.cpp中调用另一个.c文件主要有5种思路: 1、在VS2012 IDE中,将被引用的.c文件后缀名全部修改为.h,然后通过IDE的解决方案资源管理器中鼠标右键单击“头文件”-"添加"-“现有项”,选中修改…

[零基础学JAVA]Java SE应用部分-35.JAVA类集之四

JAVA按以下重要顺序 面向对象 类集框架 JDBC 文件编程本季目标主要讲解以下的内容: Collection List Set Map Iterator ListIteator Enumeration for…each语句(JDK 1.5的新特性) Comparable接口 二叉树1、类集结构&#xff08…

可在单片机上运行的简易图形库

来源:电子森林,排版:晓宇微信公众号:芯片之家(ID:chiphome-dy)发现一个网站 - http://www.technoblogy.com/,基本都是关于用ATtiny单片机做各种创意设计的,非常适合初学单…

欧拉回路 欧拉路径

欧拉路径(瞎)定义 : 如果有一条路径使得能够走完所有的边且每一条边经过有且只有一次,这样的路径叫做欧拉路径 欧拉回路定义 : 如果有从起点出发最后回到起点的一条路径使得能够走完所有的边且每条边经过有且只有一次,称其为欧拉回…