ISAserver.org - Monthly Article Update Hi ISAlist, New articles added to ISAserver.org last month: Title: Enabling ISA Firewall Forms-based Authentication (FBA) for OWA Connections for both Internal and External Clients (Part 2) Author: Thomas Shinder Summary: In part 1 of this two part series on configuring the ISA firewall’s forms-based authentication feature to support both internal and external clients, we went over the issues and challenges that must be overcome so that all clients can avail themselves of the superior security provided by the ISA firewall’s FBA feature. We also went over the procedures required on the OWA Web site to create the certificates required for the Web Listeners on the ISA firewall. In this, part two of this two-part series, we’ll move our attention to the configuration steps on the ISA firewall device and then test the configuration. Link: http://www.ISAserver.org/tutorials/Enabling-ISA-Firewall-Forms-based-Authentication-FBA-OWA-Connections-Internal-External-Clients-Part2.html Title: Enabling ISA Firewall Forms-based Authentication (FBA) for OWA Connections for both Internal and External Clients – Part 1 Author: Thomas Shinder Summary: The ISA firewall’s forms-based authentication (FBA) feature is one of the killer apps included with the ISA firewall. The ISA firewall’s FBA capability enables the ISA firewall to generate the OWA log on form instead of requiring the Exchange Server to generate the form. This is a tremendous security boon because it enables you to force authentication at the ISA firewall before any connections are forwarded to the Exchange Server. This prevents the situation you see when simple packet filter based firewalls are in front of the Exchange Server and FBA is enabled on the Exchange Server itself. This latter configuration allows unauthenticated and unauthorized connection attempts to the Exchange Server, sometimes with unpleasant results. Link: http://www.ISAserver.org/tutorials/Enabling-ISA-Firewall-Forms-based-Authentication-OWA-Connections-Internal-External-Clients-Part1.html Title: Tom Shinder’s Trek through Small Business Server 2003 Service Pack 1 – Part 4: E-mail Domain Name Page to Completion of the CEICW Author: Thomas Shinder Summary: In the first three parts of these series on running the CEICW and installing the ISA firewall software on SBS 2003 SP1, we began by going over the SBS network security model and how to best place the SBS computer on the network. In parts 2 and 3 we went through the CEICW and now will continue that process in this, part 4 of the series. Link: http://www.ISAserver.org/articles/2004sbsinstallpart4.html Title: Tom Shinder’s Trek through Small Business Server 2003 Service Pack 1 – Part 3: The CEICW from the Network Connection Page to the E-mail Retrieval Method Page Author: Thomas Shinder Summary: In parts 1 and 2 of this series of installing and configuring the ISA firewall on SBS SP1, we began with a discussion on the security implications of co-locating the ISA firewall on the SBS computer, preferred network topology designs, and then began the CEICW process. In this, part 3 of the series, we will pick up where we left off and continue with the CEICW at the Network Connection Page. Link: http://www.ISAserver.org/articles/2004sbsinstallpart3.html Visit the Subscription Management (http://newsletter.isoftmarketing.com/) section to unsubscribe. ISAserver.org is in no way affiliated with Microsoft Corp. For sponsorship information, contact us at advertising@xxxxxxxxxxxxx Copyright © ISAserver.org 2005. All rights reserved.