Understanding the ISA 2004 access rule processing
In contrast to the simple trusted and untrusted ISA Server 2000 networking model, the ISA Server 2004 uses a far more sophisticated and flexible networking model. As a consequence the way you define your network and firewall policy in ISA Server 2004 is completely different and therefore also the logic behind the access rule processing done by ISA Server 2004. Because the result is not always what you might expect, we will explore in this article how ISA Server 2004 process the different rule lists and how a particular rule is chosen to validate a particular outgoing request.
By Stefaan Pouseele at ISA Server.
[ Read more ]
Reading our newsletter every Monday will keep you up-to-date with security news.
Receive a daily digest of the latest security news.