For ISA Server 2006 Enterprise Edition, do the
following:
In the console tree of ISA Server Management, click the
relevant object. For example, to export a rule:
Click Firewall Policy:
Expand Microsoft Internet Security and Acceleration
Server 2006, expand Arrays, expand
Array_Name, and then click Firewall
Policy.
In the details pane, right-click the applicable rule, and then
click Export Selected.
Follow the on-screen instructions.
For ISA Server 2006 Standard Edition, do the
following:
In the console tree of ISA Server Management, click the
relevant object. For example, to export a rule:
Click Firewall Policy:
Expand Microsoft Internet Security and Acceleration
Server 2006, expand Server_Name, and then
click Firewall Policy.
In the details pane, right-click the applicable rule, and then
click Export selected.
In File name, type a name for the exported file.
To export confidential information, such as user passwords and
certificates, click Export confidential information. This
information will be encrypted during the export process.
To export user permissions, click Export user permission
settings.
Click Export.
Note
To open ISA Server Management, click Start, point to
All Programs, point to Microsoft ISA Server, and then
click ISA Server Management.
Important
For ISA Server 2006 Enterprise Edition, you must be an
Enterprise Administrator or Enterprise Auditor to export the
enterprise configuration. To export confidential information, you
must be an Enterprise Administrator. You must be an ISA Server
Array Administrator to export confidential array-level
information.
The system policy rules are not exported when you export the
firewall policy. To export the system policy, select the Export
System Policy task.
To export confidential information, such as user passwords and
certificates, select Export confidential information. This
information will be encrypted during the export process.
You only have to specify a password when exporting confidential
information.
Specify a strong password, to ensure proper protection of
encrypted information. A password is considered strong if it
provides an effective defense against unauthorized access. A strong
password does not contain all or part of the user account name. It
contains at least three of the four following categories of
characters: uppercase characters, lowercase characters, base
10 digits, and symbols found on the keyboard (such as !, @,
and #).