<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Using ISA for OWA in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/using-isa-for-owa/m-p/41404#M30437</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm looking to replace our Fortigate 110c with a new PA-500 and I've managed to write the security and NAT policies which when tested seemed to work well apart from OWA.&lt;/P&gt;&lt;P&gt;We have an ISA 2006 server which publishes OWA and OMA on a public IP and have configured the NAT rule and security rule as I did for all the other sites (like Citrix etc) which work fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The NAT rule looks like:-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Source Zone:- DMZ&lt;/P&gt;&lt;P&gt;Destination Zone:- Internet&lt;/P&gt;&lt;P&gt;Source Address:- ISA_Server&lt;/P&gt;&lt;P&gt;Destination Address:- Any&lt;/P&gt;&lt;P&gt;Service:- service-https&lt;/P&gt;&lt;P&gt;Source Transalation:-&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; static-ip&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; NAT_ISA_Server_Public&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; bi-directional: yes&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The associated security rule basicaly allows all https traffic to NAT_ISA_Server_Public from the Internet and I log at session start and end. This is basicaly the same as the Fortigate config.&lt;/P&gt;&lt;P&gt;When I try and connect to OWA I get a timeout. I jumped on the logs to see whats happening and saw that the NAT rule seemed to be working. I then checked the ISA firewall logs and was seeing connections being dropped for packet spoofing. So why would the packets forward by the PA-500 be seen by ISA as being spoofed when the packets forwarded by the Fortigate aren't? Putting the Fortigate back in place and OWA started working fine again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm desparate to get rid of the Fortigate and get the PA-500 working in production (something I'm going to have to do on Tuesday 18th). So I guess my questions are:-&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Can anyone see what I've done wrong in the config of the PA-500 that stops ISA from working?&lt;/LI&gt;&lt;LI&gt;Should I be using ISA? Can I just forward directly to Exchange? If so what are the best practices for doing this securely?&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help or advise on OWA/OMA publishing would be appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;Alan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 14 Sep 2012 02:10:23 GMT</pubDate>
    <dc:creator>TDC</dc:creator>
    <dc:date>2012-09-14T02:10:23Z</dc:date>
    <item>
      <title>Using ISA for OWA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/using-isa-for-owa/m-p/41404#M30437</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm looking to replace our Fortigate 110c with a new PA-500 and I've managed to write the security and NAT policies which when tested seemed to work well apart from OWA.&lt;/P&gt;&lt;P&gt;We have an ISA 2006 server which publishes OWA and OMA on a public IP and have configured the NAT rule and security rule as I did for all the other sites (like Citrix etc) which work fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The NAT rule looks like:-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Source Zone:- DMZ&lt;/P&gt;&lt;P&gt;Destination Zone:- Internet&lt;/P&gt;&lt;P&gt;Source Address:- ISA_Server&lt;/P&gt;&lt;P&gt;Destination Address:- Any&lt;/P&gt;&lt;P&gt;Service:- service-https&lt;/P&gt;&lt;P&gt;Source Transalation:-&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; static-ip&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; NAT_ISA_Server_Public&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; bi-directional: yes&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The associated security rule basicaly allows all https traffic to NAT_ISA_Server_Public from the Internet and I log at session start and end. This is basicaly the same as the Fortigate config.&lt;/P&gt;&lt;P&gt;When I try and connect to OWA I get a timeout. I jumped on the logs to see whats happening and saw that the NAT rule seemed to be working. I then checked the ISA firewall logs and was seeing connections being dropped for packet spoofing. So why would the packets forward by the PA-500 be seen by ISA as being spoofed when the packets forwarded by the Fortigate aren't? Putting the Fortigate back in place and OWA started working fine again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm desparate to get rid of the Fortigate and get the PA-500 working in production (something I'm going to have to do on Tuesday 18th). So I guess my questions are:-&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Can anyone see what I've done wrong in the config of the PA-500 that stops ISA from working?&lt;/LI&gt;&lt;LI&gt;Should I be using ISA? Can I just forward directly to Exchange? If so what are the best practices for doing this securely?&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help or advise on OWA/OMA publishing would be appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;Alan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Sep 2012 02:10:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/using-isa-for-owa/m-p/41404#M30437</guid>
      <dc:creator>TDC</dc:creator>
      <dc:date>2012-09-14T02:10:23Z</dc:date>
    </item>
    <item>
      <title>Re: Using ISA for OWA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/using-isa-for-owa/m-p/41405#M30438</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I assume you have your ISA on a dedicated DMZ.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does this DMZ use the public ip-range or does it use a RFC1918 range (what is the ip address of the ISA box itself)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When you setup security rules in PA for NATed traffic the guideline is:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;srczone: &amp;lt;prenat srczone&amp;gt;&lt;/P&gt;&lt;P&gt;dstzone: &amp;lt;postnat dstzone&amp;gt;&lt;/P&gt;&lt;P&gt;dstip: &amp;lt;prenat dstip&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So given that you use RFC1918 addresses in your DMZ you will setup a DNAT rule such as:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;srczone: outside&lt;/P&gt;&lt;P&gt;dstzone: outside&lt;/P&gt;&lt;P&gt;dstint: any&lt;/P&gt;&lt;P&gt;src: any&lt;/P&gt;&lt;P&gt;dst: &amp;lt;ip of your PA at outside zone&amp;gt;&lt;/P&gt;&lt;P&gt;service: TCP443 (or the list of ports you need to get translated for inbound connections)&lt;/P&gt;&lt;P&gt;srctrans:&lt;/P&gt;&lt;P&gt;dsttrans: &amp;lt;ip of your ISA&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and security rule like:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;srczone: outside&lt;/P&gt;&lt;P&gt;dstzone: dmz&lt;/P&gt;&lt;P&gt;dstip: &amp;lt;ip of your PA at outside zone&amp;gt;&lt;/P&gt;&lt;P&gt;service: TCP443 (or a list of ports or application-default, I recommend to never use any)&lt;/P&gt;&lt;P&gt;appid: ssl (or which appids you need)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Personally I would avoid using "bidirectional" and instead manually setup DNAT and SNAT when I need (and limit to specific ports if possible). In your case are you sure your ISA needs to be able to on its own connect to Internet (or whatever you have on your outside)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) See above &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) Im not sure how much ISA is involved in the OWA/OMA stuff. I think ISA is capable of do a first certificate verification which the Exchange doesnt do but that could have been changed (Microsoft seems to change this behaviour for every release).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Edit: Since most traffic for OWA/OMA is https-based I would strongly recommend you to use ssl termination in the PA in order to be able to inspect the content of the ssl sessions (and using the PA IPS, AV, FILE and such features).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Sep 2012 06:50:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/using-isa-for-owa/m-p/41405#M30438</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2012-09-14T06:50:28Z</dc:date>
    </item>
    <item>
      <title>Re: Using ISA for OWA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/using-isa-for-owa/m-p/41406#M30439</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;First off, many thanks for your detailed reply - really appreciate it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes I'm using a private addresses in the DMZ.&lt;/P&gt;&lt;P&gt;Thanks for the advice on using "bidirectional". The reason I set it up like this was because I'd got a NAT rule working for Citrix and decided to copy it and modify it to remove any NATting issues (it was 2am in the morning and wanted to remove any chance of config error). Taking your advise, I'll be changing the bidirectional rules to DNAT ones as in most cases the server doesn't initiate traffic to the Internet - ironicaly I've configured our email using DNAT and SNAT based rules rather than bidirectional.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've now created the ISA DNAT rule and when I was checking the security rule noticed that the destination zone was set to LAN and not DMZ. I changed both the NAT and security rule so many times during the night that I don't know if this error was there at the start or end.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyway the config looks good now but I can't test it until tomorrow night when I can take the network down again. I'll update this post with the results.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Edit: Since most traffic for OWA/OMA is https-based I would strongly recommend you to use ssl termination in the PA in order to be able to inspect the content of the ssl sessions (and using the PA IPS, AV, FILE and such features).&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm going to start looking into this now (thanks for the suggestion) as I really want to remove ISA from our network and save the cost of the license.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Sep 2012 00:27:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/using-isa-for-owa/m-p/41406#M30439</guid>
      <dc:creator>TDC</dc:creator>
      <dc:date>2012-09-17T00:27:46Z</dc:date>
    </item>
    <item>
      <title>Re: Using ISA for OWA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/using-isa-for-owa/m-p/41407#M30440</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Got it working. I analysed a working session in ISA and noted that when the Fortigate unit was in place the source IP (according to ISA's logs) was that of the firewalls DMZ interface (in this case 192.168.20.1) and not the original source IP (obviously a public address).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I therefore concluded that the fortigate was somehow NATting the source address as well as the destination. Modifying my DNAT rule to include translating the source (dynamic-ip-and-port) to that of the DMZ interface caused ISA to work as before. I guess thats why ISA was dropping everything as being spoofed, it wasn't expecting to see the original source IP on a network of 192.168.20.0/24.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyway, a big thanks to Mikeand for his help and suggestions.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;Alan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Sep 2012 08:20:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/using-isa-for-owa/m-p/41407#M30440</guid>
      <dc:creator>TDC</dc:creator>
      <dc:date>2012-09-18T08:20:30Z</dc:date>
    </item>
  </channel>
</rss>

