ISAserver.org - Understanding the ISA 2004 Access Rule Processing

  • From: "ISAserver.org" <info@xxxxxxxxxxxxx>
  • To: "isalist@xxxxxxxxxxxxx" <isalist@xxxxxxxxxxxxx>
  • Date: Fri, 25 Feb 2005 16:40:06 +0100

ISAserver.org - RealTime Article Update

Hi ISAlist,



Title: Understanding the ISA 2004 Access Rule Processing
Author: Stefaan Pouseele
Summary: In contrast to the simple trusted and untrusted ISA Server 2000 
networking model, the ISA Server 2004 uses a far more sophisticated and 
flexible networking model.  As a consequence the way you define your network 
and firewall policy in ISA Server 2004 is completely different and therefore 
also the logic behind the access rule processing done by ISA Server 2004. 
Because the result is not always what you might expect, we will explore in this 
article how ISA Server 2004 process the different rule lists and how a 
particular rule is chosen to validate a particular outgoing request.


Link: http://www.ISAserver.org/articles/ISA2004_AccessRules.html





Visit the Subscription Management (http://newsletter.isoftmarketing.com/) 
section to unsubscribe.
ISAserver.org is in no way affiliated with Microsoft Corp.
For sponsorship information, contact us at advertising@xxxxxxxxxxxxx

Copyright © ISAserver.org 2005. All rights reserved.



Other related posts:

  • » ISAserver.org - Understanding the ISA 2004 Access Rule Processing