The Allow All IP Packet Filter Does Not Work for ISA Server Perimeter Network Hosts (313907)
The information in this article applies to:
- Microsoft Internet Security and Acceleration Server 2000
This article was previously published under Q313907 SYMPTOMS
If you configure an Allow All Internet Protocol (IP) packet filter that applies to hosts in a perimeter network (also known as DMZ, demilitarized zone, and screened subnet) subnet, if you are using an Internet Security and Acceleration (ISA) Server computer that is configured with one internal network adapter, one perimeter network interface, and one public interface, the hosts cannot perform the following actions:
- Access resources on the public network by using either Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) from a perimeter network host.
- Ping the external interface of the ISA Server computer or ping clients on the public network from a perimeter network host.
RESOLUTION
To resolve this problem, configure a packet filter for TCP, UDP, and any IP protocols such as Internet Control Message
Protocol (ICMP), and then apply the filter to the perimeter network hosts:
- Start the ISA Server Microsoft Management Console (MMC), and then expand Access Policy.
- Right-click IP Packet Filters, point to New, and then click Filter.
- Name the filter ICMP_DMZ, and then click Next.
- Make sure Allow Packet Transmission is selected, and then click Next.
- Click Custom, and then click Next.
- In the IP Protocol box, click ICMP, click Both in the Direction box, click All types in the Types box, click All codes in the Codes box, and then click Next.
- Click This computer (on the perimeter network), type the perimeter network host IP address, and then click Next.
- Make sure that All remote computers is selected, and then click Next.
- Click Finish.
- Restart the Firewall Service in ISA Server.
NOTE: To allow TCP or UDP protocols for perimeter network hosts, complete this procedure, except in step 5, click either TCP or UDP, depending on the protocol that you want to grant access to.
To apply this packet filter to a subnet in the perimeter network instead of a single host:
- Right-click the ICMP_DMZ IP packet filter, and then click Properties.
- Click the Local Computer tab.
- Click These computers (on the perimeter network).
- Type the IP subnet in the perimeter network that must have access to Public Subnet-A.
- Click Apply, and then click OK.
- Restart the Firewall Service in ISA Server.
NOTE: The perimeter network host cannot ping the public interface IP address of the ISA Server computer; however, the perimeter network host can ping hosts on the public subnet of the ISA Server computer.
STATUSMicrosoft has confirmed that this is a problem in the Microsoft products that are listed at the beginning of this article.
Modification Type: | Major | Last Reviewed: | 6/9/2002 |
---|
Keywords: | kbenv kbprb KB313907 |
---|
|