I might be confused, but the main topic of the thread is : titleAndStar(48053,0,true,false,"","") This article is for discussing the article on using ISA in a PIX DMZ to protect Exchange mail and Web services at http://isaserver.org/tutorials/2004isapixdmz.html
Thanks to everyone for help, we figured it out over the weekend, the issue was "double" NATing, PIX and then ISA. Once we fixed the ISA side, everything started to work
Originally we were NATing traffic on the PIX and on the ISA. We took out ISA NATing, re-enabled external interface to accept incoming from NATed PIX interface and published SMTP and, alas, traffic started to flow!!! Raf
It's sort of strange that there are any PIX devices out there -- they were based on a 20th century threat model that's no longer valid. All it does is pass exploits.
Posts: 4663
Joined: 30.Jul.2002
From: United Kingdom
Status: offline
quote:
ORIGINAL: tshinder
It's sort of strange that there are any PIX devices out there -- they were based on a 20th century threat model that's no longer valid. All it does is pass exploits.
Tom
You mean I'm not protected by Layer 3 firewalls? Ok, I had better put an ISA Server in my DMZ between my Layer 3 firewalls then...
I know this is an old posting, hoping your still monitoring it.
I've been going over the ISA fireall in a pix config, and I have one concern.
On the ISA firewall, you have the ISA sitting in the DMZ and on the LAN on the internal.
I know this was written some time ago, but from the reading's I have found all suggest the ISA could be a security weak spot. I'm concerned if the machine get's compromised, someone will have direct access to the LAN network.
Your pix setup doesn't seem to suggest that.
Would you continue to use that set up knowing what you know now?