Cannot Logon to the Domain or Contact Other Servers After the ISA Server Installation

Cannot Logon to the Domain or Contact Other Servers
After the ISA Server Installation
By Santhosh Sivarajan

I am sure we have all either encountered or heard of this “problem” one time or another if the ISA Server is part of the Active Directory Domain. Is it a problem? No, it is by design. To block all unnecessary traffic is the job of the firewall. I know Domain Controller traffic is not unnecessary unreachable traffic, but we have to “explain” to the ISA Server that DC traffic is reachable.

How can we do this? This can be accomplished by adding all the trusted subnets to the Windows Routing Table (WRT) because the ISA Server thinks only the information available in the WRT can be trusted.

Here is my lab scenario to explain this situation.

In the above example, you can see that the ISA Server’s Internal Network (10.10.1.X), Active Directory Domain Controllers (10.10.2.X), Exchange Back-End Machines (10.10.3.X) and Exchange Front-End Machines (10.10.4.X) are on different subnets. I know it is a complicated network but I have worked with a similar network structure at several of my client sites.

If you install ISA Server 2004, by default you will lose all the connectivity to the Active Directory Domain Controllers, Exchange Back-End Machines and Exchange Front-End Machines because they are not part of ISA’s Internal network (10.10.1.X). By default, the ISA Server will only consider 10.10.1.X as the internal and reachable network because the 10.10.1.X network is the only network information present in the WRT. Everything else is considered an external network.

What needs to be done during installation to make sure the ISA Server can contact the DCs, Exchange BEs and Exchange FEs? The simple answer to this question is you must manually add each route to reachable networks to the WRT using the “Route Add –P” command before the ISA Server installation.

In the following screen shot you will see I am manually adding 10.10.2.0 (DCs), 10.10.3.0 (Exchange BEs) and 10.10.4.0 (Exchange FEs) to the WRT using the “Route Add” command:

The next screen shot, will display all the routing information that is part of WRT. You can use the “Route Print” command to display the Windows Routing Table.

During the ISA Server 2004 installation, the ISA Server looks for the WRT to “learn” the internal and other reachable networks. If the DCs or any other subnet are not in the Windows Routing Table, the ISA Server will think it is located on the default External Network and deny the traffic using the Default Rule. If it is in the WRT, it will automatically add the DC subnet to the Internal network.

In the above scenario, the ISA Server will automatically add the following subnets to its Internal Network:

10.10.1.0 – 10.10.1.255

10.10.2.0 – 10.10.2.255

10.10.3.0 – 10.10.3.255

10.10.4.0 – 10.10.4.255



Note:


If you go to the properties of the Internal Network, sometimes you will see a “Domain Controller” name in the network list. During the ISA Server setup, it will discover the ISA Server’s “Logon Server” and add it to the Internal Network as a “Domain Controller”. You cannot modify this entry.

Let’s say you forgot to add a route to your Domain Controller or other trusted subnet information, what will happen after the ISA Server installation? Of course, you cannot logon to the Domain or contact any other servers on the trusted network.

The following section will explain how to resolve this issue:

  1. Logon to the ISA Server using the Local Administrator account (logon locally)
  2. Go to the Command Prompt, add the appropriate route using the Route Add –P command
  3. Open the ISA Server Management Console
  4. Go to the Properties of the Internal Network
  5. Add the DC subnets and all other required subnet information
  6. Click OK and close the ISA Server Management Console
  7. Restart the Microsoft Firewall Service.
  8. Log off from the machine and try to logon to the Domain.

The rule of thumb is, if the servers are on different networks than the ISA’s Default Internal subnet and you want to communicate to any other subnet other than the ISA Server’s Default Internal subnet, it must be added to the Windows Routing Table.

If it is difficult to manually add the route to the ISA Servers, a group policy can be used to add those entries. Keep in mind that those registry entries won’t be added to the WRT until you restart the machine.

As you can see the design to block all “unnecessary traffic” makes total sense. I hope this article will provide a better understanding of ISA’s Internal and External networks, as well as a work around solution. If you have any questions regarding this article, feel free to email me or post a comment on the newsgroup.

————————————————————-

About the Author, Santhosh Sivarajan
Santhosh Sivarajan
is an Infrastructure and Security Architect in Houston, Texas. His certifications include MCSE (W2K3/W2K/NT4), MCSA (W2K3/W2K/MSG), CCNA, and Network+. He has worked for large networking project companies for the past 10 years. His expertise includes Active Directory, Exchange, Migrations, Microsoft Security, ISA Server, etc.

————————————————————-

I hope you enjoyed this article and found something in it that you can apply to your own network. If you have any questions on anything I discussed in this article, head on over to http://forums.isaserver.org/ultimatebb.cgi?ubb=get_topic;f=24;t=000566 and post a message. I’ll be informed of your post and will answer your questions ASAP. Thanks!

If you would like us to email you when

Santhosh Sivarajan releases another article on ISAserver.org, subscribe to our ‘Real-Time Article Update’ by clicking here. Please note that we do NOT sell or rent the email addresses belonging to our subscribers; we respect your privacy

Leave a Comment

Your email address will not be published. Required fields are marked *

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Scroll to Top