I am trying to setup a back to back ISA 2004 firewall. The edge firewall will be the front-end ISA 2004 and internal firewall will be a back-end ISA 2004.
Internet-->Frontend ISA-->DMZ(Frontend E2K3)-->Backend ISA-->LAN. The goal is to have an authenicated access DMZ security perimeter between the frontend and backend ISA with the Exchange 2003 FE sitting in this DMZ. The DMZ will be configured for intradomain communication between the DMZ and our LAN. I have two NICs (internal and external NICs) on each of the ISA. I need to know how to configure the NICs and the relationship (NAT or Route) each NICs need to be configure for this solution. My Frontend ISA external NIC has a public IP (216.x.x.x/24) and the ISP router as is DGW. Do I need to put the ISP DNS on this NIC? How should I configure the Internal NIC on the Frontend ISA if the DMZ IP scheme is 192.x.x.x/24? As for the backend ISA, the external NIC is configured with 192.x.x.x/24 but what is the DGW for the DMZ security zone? My internal NIC for the backend ISA is 10.x.x.x/24.
Internet-->Frontend ISA-->DMZ(Frontend E2K3)-->Backend ISA-->LAN. The goal is to have an authenicated access DMZ security perimeter between the frontend and backend ISA with the Exchange 2003 FE sitting in this DMZ. The DMZ will be configured for intradomain communication between the DMZ and our LAN. I have two NICs (internal and external NICs) on each of the ISA. I need to know how to configure the NICs and the relationship (NAT or Route) each NICs need to be configure for this solution. My Frontend ISA external NIC has a public IP (216.x.x.x/24) and the ISP router as is DGW. Do I need to put the ISP DNS on this NIC? How should I configure the Internal NIC on the Frontend ISA if the DMZ IP scheme is 192.x.x.x/24? As for the backend ISA, the external NIC is configured with 192.x.x.x/24 but what is the DGW for the DMZ security zone? My internal NIC for the backend ISA is 10.x.x.x/24.