Network configuration steps

For newly created networks to send or receive traffic, additional configuration steps must be completed. These steps depend on the type of network you created.

Internal, External, and perimeter networks

For clients on these networks to send and receive traffic, you must complete the following steps:

Note

  1. Create a network rule allowing traffic to and from this network. For instructions, see Create a network rule.
  2. Create firewall policy rules allowing traffic to and from this network. For instructions, see Create an access rule, Create a Web publishing rule, Create a server publishing rule, or Publish a mail server.

Enterprise networks

ISA Server 2006 Enterprise Edition only

Enterprise networks can be used in enterprise rules and in array-level rules.

Enterprise networks can also be included in array-level networks. In this way, even networks that are not physically connected to the array can be included in an array-level network.

Site-to-site VPN using IPsec

For clients to connect from the virtual private network (VPN) using Internet Protocol security (IPsec), you must complete the following steps:

  1. Create a network rule allowing traffic to and from this network.
  2. Create access rules allowing traffic to and from this network.
  3. Verify IPsec protocol settings using properties of the newly created network.

Site-to-site VPN using PPTP or L2TP

For clients to connect from the VPN using Point-to-Point Tunneling Protocol (PPTP) or Layer Two Tunneling Protocol (L2TP), you must complete the following steps:

  1. Create a user with the same name as the new network, and then set remote access permissions to Allow. For instructions, see Create users and groups for remote VPN clients.
  2. Create network rules allowing traffic to and from this network.
  3. Create access rules allowing traffic to and from this network.



web link Get latest ISA Server content at ISA Server Guidance.
Send feedback about this page Send feedback about this page.