- FIM 2010 R2 Book
- The Story in this book
- Overview of FIM 2010 R2
- Basic Configuration
- User Management
- Group Management
- Self-Service Password Reset
- Using FIM to manage Office365 and other Cloud Identities
- FIM Portal Customization
- Customizing Data transformations
- Issuing Smart Cards
Posts Tagged ForeFront
Finally, it’s here…. ISA 2006 SP1 was released last night.
Please read other blogposts here and also at http://blogs.technet.com/isablog/archive/2008/05/23/isa-server-2006-service-pack-1-features.aspx for information on all the new stuff in SP1.
Many customers and others have been confused by the well spread rumor that ISA 2006 do not support SAN certificates like the ones used by Exchange 2007.
The confusion is often caused by the fact that they do not understand how ISA is using SSL bridging in a typical Exchange Publishing scenario.
You have to remember that SSL bridging means that there are TWO (2) separate SSL sessions going on.
Session 1: From the Client (usually on the Internet) to ISA
In this case the certificate shown by ISA is validated by the client and must satisfy the demands the client has, if no warning is to appear. If the client supports SAN certificates then you can have a SAN certificate in the ISA listener.
Session 2: From ISA to the published server (usually on the Internal network)
In this case the certificate shown by the published server needs to satisfy ISA (the original client has nothing to do with this). This means it has to be issued by a trusted CA and have a Common Name that matches the hostname on the “To” tab in the publishing rule. If this is a SAN certificate, the first SAN also needs to be the same name as the name used on the “To” tab in the publishing rule.
To summarize, ISA 2006 do support SAN certificates, but when acting as a client it can only validate the common name and the first SAN entry. This will change in SP1 (released later this summer), with SP1 ISA will as a client be able to validate any SAN entry to match the “To” used in the publishing rule.
The “great” Jim Harrison, has described this in more detail in his blog at http://blogs.technet.com/isablog/archive/2007/08/29/certificates-with-multiple-san-entries-may-break-isa-server-web-publishing.aspx
One of the new interesting features of SP1 is the Traffic Simulator.
Using the Traffic Simulator you will be able to try out your rules to see if they match your intentions.
The Traffic Simulator is a new tab in the Troubleshooting node.
The way it works is that it “injects” the scenario into the actual engine, and therefore we can only run the simulations on a server where firewall service is running. So it’s not possible to do this remote.
The result is in my opinion still a bit “short”. It simply states the result and show the rule causing the result. If I for example have a rule that requires authentication to access internet. The results will be.
1: Traffic sent from this user:
2: Traffic sent from anonymous user:
And as you can see the information you get from the denied is only that it got stuck on the rule, but it is so far up to you to realize that it is because of authentication requirements. I have filed a change request for more info in this case, hopefully it will make it into RTM.
In all this is yet another great new feature of SP1 that i believe many customers have wanted for some time.
To give you all a quick overview of the new features in ISA 2006 SP1 here is a quick list. I will cover some the features in more detail in some upcoming articles. As always, since this is a beta everything is subject to change, so let’s say this is features we are “likely” to see.
When it comes to release date for SP1, the official timeframe is “late summer 2008″. And since this is built in Israel where the summer never ends (compared to here in Sweden)… Who knows how long this summer will be…I hope it will be the shortest summer in mankind so that SP1 becomes available to all of you a.s.a.p.
The list below is not ordered in any way just a list, but WHAT A LIST!!!!
|1.||Configuration Change Tracking||Registers all configuration changes applied to ISA Server configuration to help you assess issues that may occur as a result of these changes|
|2.||Test Button||Tests the consistency of a Web publishing rule between the published server and ISA Server.|
|3.||Traffic Simulator||Simulates network traffic in accordance with specified request parameters, such as an internal user and the Web server, providing information about firewall policy rules evaluated for the request.|
|4.||Diagnostic Logging Viewer||Now integrated as a tab into the Management console, this feature displays detailed events about the status of your ISA Server computer, as well as configuration and policy issues.|
|5.||NLB Multicast||NLB now supports all three modes, Unicast, Multicast and Multicast with IGMP.|
|6.||Cross domain KCD||Kerberos Constrained Delegation (KCD) now works in both cross-domain and cross-forest trust environments.|
|7.||SAN certificates||Improved support for certificate with multiple SAN entries.|
|8.||Filter RPC by UUID||Supports filtering for RPC traffic by UUID for an access rule. Previously, an access rule to RPC traffic would not be restricted by RPC interface UUID.|
|9.||Monitor virtual memory||A new event has been created that monitors the virtual memory of the WSPSRV process.|
There are more in SP1 but i believe these are the most important ones.
When i look at this it is almost more interesting then the one we could see as news in RTM of 2006 when we compared it to 2004 SP2 (and later SP3).
Ones again… To all of you in the ISA team… Congratulations,nice work!
So finally I can share with you some features of ISA 2006 SP1.
One of the great new features we will see is Change Tracking.
I have sent the product team my love for introducing this, this feature alone will make everyone hurry to get ISA2006 SP1. I also think that this will make selling ISA as a “serious” Firewall will be much easier.
In Enterprise Edition this feature is enabled on the Enterprise level.
You also have the option to require a description for all changes made.
I would suggest that you enable this as soon as the basic configuration of ISA is done and we are moving into production.
Even though you might feel tempted to raise the number of entries to a huge number, be aware that this might cause the Change Tracking, search and filtering function to be real slow.
With Change Tracking you will be able to track every change made to ISA configuration.
I will just LOVE this feature, it will make my life working with ISA so much easier. Imagine having solid proof when the customer complains that ISA “just stopped working” and they “haven’t done anything”.
If you drill down into the change you want to check out you will then see a very detailed view on what was changed.
One of the things this feature will make me stress to my customers is to use individual accounts when working with ISA, in this way we will always know “who” made this change. If we all use the administrator account, that part will be lost.
This is the first in the series of blogs I plan on SP1 features, stay in touch for more.
So finally i got my hands on SP1 of ISA 2006.
Havent had any time to test it yet, but i can promise you all a happy moment when you are able to run it.
Still NDA on the exact featurelist but let me just give you some hints about what’s in the current build.
Hopefully none of them will be removed, but as always. You never know.
- Change tracking possibility
- Multi domain/forest KCD
- Improved support for SAN certs
- Heavy improvements on troubleshooting
and much much more…
In some parts SP1 contains more news than 2006 RTM did compared to 2004 SP2.
Stay in touch and i will tell you more as soon as possible.
The Beta period is planned to be a short one, but no release date so far.