Looking at Jacks comment to my initial post this morning (Securing My Infrastructure: Introduction) it seems that I have to give you some additional information:
So let me start with the goal of this network:
Basically I started to build it on one server to play around with our technology. Soon I had to realize that unless I am running it in a "production-like" style, I will not learn the daily problems and challenges with a certain setup. It is one thing to make an environment to work and another to keep it running. Since then I connected my home PCs to the lab and run it 24*7 – and learned a lot!
Second point is about the physical setup of the servers:
I am actually running three physical servers at the moment running Windows Server 2003 R2 at the moment:
So there are two questions open that come to my mind – probably more, let me know
Does that make sense?
If there is any question you would like to me address, drop me a mail or a comment.
Looking forward to your feedback
First, Thank you!
It makes sense. Except the ISA 2008, I hope you mean ISA 2006 which does not run on server 2008 ?
Question, the radius server you mentioned in the introduction, this is being used to authenticate web clients to sharepoint and exchange?
Thanks for this valuable post.
Are you using ISA Server for VPN?
If yes, then radius server is peforming authentication?
Have you installed AV enterprise server ( so one machine is updating and downloading virus definitions? If yes, AV console is installed on all clients and servers?
Any tool or server for detection or monitoring network?
Sorry, for the re-fresh of the post but sure - it was a typo. I meant ISA Server 006 not 2008.
It seems that you have a loooot of questions :-) which is very good. Actually I am running ISA Domain integrated (why should I not) am not using Radius there. At the moment I am using Radius for WPA only. This will change as I am planning to go for NAP sometimes soon and then Radius (today IAS, NPS - Network Policy Server - in Windoes Server 2008) will have an additional role
This is a follow-up of my last post about how I secure my environment. If you want to read the start
Well, this is a follow-up of my last posts about how I secure my environment. If you want to read the