After you’ve created a wireless DMZ to allow wireless users
to access the Internet, you can provide a method to allow them to access resources
on the internal network if you wish. You could do this by creating a set of Web
and Server Publishing Rules for all the resources that computers on the
wireless DMZ might require, or you could create a Route relationship between
the wireless DMZ and the Default Internal Network and then create Access Rules
allowing connections from the wireless DMZ to the default Internal Network.
The method we’ll use for our example is to enable the ISA
firewall’s VPN component and configure the VPN server to listen for incoming
connections on the DMZ interface. The following sections will show you how to
do this.
Enabling the VPN Server Component on the ISA Firewall
You can use a VPN connection from the wireless DMZ to allow
wireless clients access to internal resources. You can either configure the ISA
firewall to act like a traditional VPN server that allows the VPN clients access
to all protocols and resources on the corporate network, or you can restrict
the VPN clients to accessing only necessary protocols and resources on a
per-user/per-group basis. Of course, the second configuration is more secure.
Allowing VPN Clients to access the Default Internal Network and the
Internet
In our example, we will provide all users logged onto the
VPN server access to all resources using all protocols to the Default Internal
Network and the Internet. On a production network, you would use user/group
based access controls for a more secure environment.
Tables A, B, C and D illustrate the basic construction of
each rule that we will include in the ISA Server’s firewall policy for our
example configuration.
Table A |
|||||||||||||||||
|
|||||||||||||||||
Creating an Access rule to allow DNS queries to the ISA Firewall’s DNS Server |
Table B |
|||||||||||||||||
|
|||||||||||||||||
Creating an Access Rule allowing HTTP access to the Internet |
Table C |
|||||||||||||||||
|
|||||||||||||||||
Creating an Access Rule allowing all outbound traffic from the Default Internal Network to the Internet |
Table D |
|||||||||||||||||
|
|||||||||||||||||
Creating an Access Rule allowing VPN Traffic to the Default Internal Network and the Internet |
You can’t create the last rule, to allow VPN traffic to the
default internal network and the Internet, until you enable the ISA firewall’s
VPN server component.
Creating the Access Rules for the DMZ and Internal
After we create the Access Rules for DMZ and Internal
Network communications, we’ll create the VPN server.
Creating the All Open Access Rule from Default Internal to Internet
Here are the steps to create this rule:
- In
the Microsoft Internet Security and
Acceleration Server 2004 management console, expand the server name
and then click on the Firewall Policy
node. Click the Tasks tab in
the Task Pane and click the Create
a New Access Rule link. - On
the Welcome to the New Access Rule
Wizard page, enter a name for the rule in the Access Rule name text box. In this example we’ll name the rule
All Open Internal to Internet
and click Next. - On
the Rule Action page, select
the Allow option and click Next. - Accept
the default setting on the Protocols
page, All outbound traffic, and
click Next. - On
the Access Rule Sources page,
click the Add button. - On
the Add Network Entities page,
click the Networks folder and
then double click the Internal
entry. Click Close. - Click
Next on the Access Rule Sources page. - On
the Access Rule Destinations
page, click Add. - In
the Add Network Entities dialog
box, click the Networks folder and
double click the External
entry. Click Close. - Click
Next on the Access Rule Destinations page. - On
the Users Sets page, select the
default setting, All Users, and
click Next. - Click
Finish on the Completing the New Access Rule page.
Creating the HTTP Access Rule from DMZ to Internet
Here are the steps to create this rule:
- On
the Firewall Policy node. Click
the Tasks tab in the Task Pane
and click the Create a New Access
Rule link. - On
the Welcome to the New Access Rule
Wizard page, enter a name for the rule in the Access Rule name text box. In this example we’ll name the rule
HTTP DMZ to Internet and click Next. - On
the Rule Action page, select
the Allow option and click Next. - On
the Protocols page, select the Selected protocols option and
click Add. - In
the Add Protocols dialog box,
click the Common Protocols
folder and double click the HTTP
protocol as shown in Figure A. Click Close.
Figure A |
![]() |
Selecting the Protocol |
- Click
Next on the Protocols page. - On
the Access Rule Sources page, click
the Add button. - On
the Add Network Entities page,
click the Networks folder and
then double click the DMZ
entry. Click Close. - Click
Next on the Access Rule Sources page. - On
the Access Rule Destinations
page, click Add. - In
the Add Network Entities dialog
box, click the Networks folder
and double click the External
entry. Click Close. - Click
Next on the Access Rule Destinations page. - On
the Users Sets page, select the
default setting, All Users, and
click Next. - Click
Finish on the Completing the New Access Rule page.
Creating the Access Rule Allowing DNS Queries to the ISA Firewall
Here are the steps to create this rule:
- On
the Firewall Policy node. Click
the Tasks tab in the Task Pane
and click the Create a New Access
Rule link. - On
the Welcome to the New Access Rule
Wizard page, enter a name for the rule in the Access Rule name text box. In this example we’ll name the rule
HTTP DMZ to Internet and click Next. - On
the Rule Action page, select
the Allow option and click Next. - On
the Protocols page, select the Selected protocols option and
click Add. - In
the Add Protocols dialog box,
click the Common Protocols
folder and double click the HTTP
protocol as shown in Figure B. Click Close.
Figure B |
![]() |
Selecting the Protocol |
- Click
Next on the Protocols page. - On
the Access Rule Sources page,
click the Add button. - On
the Add Network Entities page,
click the Networks folder and
then double click the DMZ
entry. Click Close. - Click
Next on the Access Rule Sources page. - On
the Access Rule Destinations
page, click Add. - In
the Add Network Entities dialog
box, click the Networks folder
and double click the External
entry. Click Close. - Click
Next on the Access Rule Destinations page. - On
the Users Sets page, select the
default setting, All Users, and
click Next. - Click
Finish on the Completing the New Access Rule page. - The
last rule that enables VPN traffic to the default Internet Network and the
Internet for VPN users must wait until we have enabled the VPN server
component on the ISA firewall.
Enabling and Configuring the ISA Firewall’s VPN Server Component
You can configure the DMZ interface on the ISA Server
firewall to accept incoming VPN client connections. This way, you can allow
trusted users with trusted computers who connect to the wireless DMZ segment to
also obtain access to resources on the internal network that have not been
published.
If you choose to allow VPN access, you should use L2TP/IPSec
instead of PPTP, for a more secure connection. With L2TP/IPSec, you can use
either a pre-shared key or machine certificates for the machine authentication
and IPSec encryption requirement. Machine certificates are more secure, but
they require a Public Key Infrastructure (PKI) to issue certificates. You can
use pre-shared key in a low security environment or as an interim measure
before you deploy your PKI. In our example, we use the pre-shared keys for the
sake of simplicity.
Enabling the ISA Server Firewall’s VPN Component
Here are the steps to enable the VPN server component on the
ISA Server machine:
- In
the ISA firewall console, expand the server name and then click the Virtual Private Networks (VPN)
node. - Click
the Tasks tab in the Task Pane
and click the Enable VPN Client
Access link. - Click
the Configure VPN Client Access
link in the Task Pane. - On the
General tab of the VPN Clients Properties dialog box,
you’ll see the default number of VPN connections is set to 5. If you need more connections,
change that number here. - On
the Protocols tab, remove the
checkmark from the Enable PPTP
checkbox. Put a checkmark in the Enable
L2TP/IPSec checkbox. - Click
Apply and then click OK. - Click
the Select Access Networks link
in the Task Pane. - In
the Virtual Private Networks (VPN)
Properties dialog box, click the Access
Networks tab. On the Access
Networks tab, remove the checkmark from the External checkbox and place a checkmark in the DMZ checkbox as shown in Figure C.
If you want to allow VPN connections from the Internet, then you can leave
the checkmark in the External
checkbox.
Figure C |
![]() |
Selecting the VPN Listener |
- Click
the Address Assignment tab. You’ll
then see the screen shown in Figure D. Notice that the default setting is
for the ISA firewall to use DHCP to obtain addresses for VPN clients. I
recommend that you use this option. However, it does require that the ISA
firewall have access to a DHCP server on the Internal Network. If you do
not use a DHCP server, then you will need to select the Static address pool option. If you
use this option, you must use addresses that do not overlap with any other network addresses.
For example, if you are using
network ID 192.168.1.0/24 for the Internal Network, then you can’t use
addresses in that network ID unless you remove the addresses you place in the
static address pool list from the definition of the Internal Network. In
contrast, when you use DHCP, you can use on-subnet addresses for your VPN
clients. In the example discussed in this article, we have a DHCP server on the
Default Internal Network that the ISA firewall can reach, so we will use the
default option.
Figure D |
![]() |
Configuring VPN Client Addressing Options |
- Click
the Authentication tab. The
default user authentication protocol is Microsoft encrypted authentication version 2 (MS-CHAPv2) as
you can see in Figure E. You can leave this setting as it is unless you
want to enable alternate authentication protocols. In order to force only
trusted users and computers to use the VPN server, you can use EAP
authentication and user certificate authentication. In the example
discussed in this article, we’ll use the default setting. Put a checkmark
in the Allow custom IPSec policy
for L2TP connection checkbox. Enter the pre-shared key in the Pre-shared key checkbox. This is
the same pre-shared key that you will enter on the VPN client.
Figure E |
![]() |
Setting the IPSec Pre-shared Key |
- Click
Apply and then click OK in the ISA Server 2004 dialog box warning you that the RRAS service
may restart. Click OK. - Click
Apply in to save the changes to
firewall policy.
Creating the VPN Client Access Rule
Now we’ll create an Access Rule to allow the VPN Clients to
access the Internal Network and the Internet. This is the last step in
configuring our wireless DMZ. Here are the steps:
- In
the Microsoft Internet Security and
Acceleration Server 2004 management console, expand the server name
and then click on the Firewall
Policy node. Click the Tasks
tab in the Task Pane and click the Create
a New Access Rule link. - On
the Welcome to the New Access Rule
Wizard page, enter a name for the rule in the Access Rule name text box. In this example we’ll name the rule
All Open VPN to Internet and Internal and click Next. - On
the Rule Action page, select
the Allow option and click Next. - Accept
the default setting on the Protocols
page, All outbound traffic, and
click Next. - On
the Access Rule Sources page,
click the Add button. - On
the Add Network Entities page,
click the Networks folder and
then double click the VPN Clients entry.
Click Close. - Click
Next on the Access Rule Sources page. - On
the Access Rule Destinations
page, click Add. - In
the Add Network Entities dialog
box, click the Networks folder
and double click the External and
Internal entries. Click Close. - Click
Next on the Access Rule Destinations page. - On
the Users Sets page, select the
default setting, All Users, and
click Next. - Click
Finish on the Completing the New Access Rule page.
Your mileage may vary
As you can see from this article, setting up the ISA
firewall’s VPN server component is a complex topic. There are many different
ways you can configure your wireless DMZ, depending on your organization’s
security needs and existing infrastructure. You may need to modify some of the precise
rules and policies to fit your individual needs. The steps outlined above
though will help you get on your way to allowing wireless users to access your
network without you having to worry about weakening security in the process.