Tutorials

How to work around an issue with VPN clients and split DNS

In the past I have read a lot about VPN users having problems accessing internal resources which are also published on the same ISA server. I had never fully understood those problems because I had never experienced them myself. Recently I was lucky to see the problem with my own eyes and investigate it further. Now, I would like to share a nice workaround to that problem.

Configuring an Inbound and Outbound SMTP Relay to Complement ISA 2004 Firewall Protection for Exchange Servers

I’m a big proponent of the SMTP relay concept. A properly configured SMTP relay can protect your Exchange Server by preventing untrusted SMTP servers on the Internet from directly communicating with your Exchange server. An SMTP relay doesn’t require a significant amount of system resources and you can install the IIS SMTP service without incurring the resource or security overhead you would have if you installed the IIS W3SVC (World Wide Web service).In this article we’ll go over some of the important details you need to consider before rolling out an SMTP relay to complement your ISA 2004 firewall e-mail protection design.

Configuring ISA Server Log Files.

As an ISA Server administrator, I’m sure you are quite aware of the need for service data. After all, good data helps you make wise configuration and performance management decisions. ISA Server helps you collect data in a number of different ways, and in this tutorial, we will focus on ISA Server log files, which can be an easy way to gather information about ISA Server performance and usage. Combined with reporting, log files can be highly effective.

Scroll to Top