Network Access Quarantine Control options in ISA Server
To view the options for configuring Network Access Quarantine
Control in ISA Server 2006 or in ISA Server 2004, follow these steps:
- Click Start, point to All
Programs, point to Microsoft ISA Server, and then
click ISA Server Management.
- Expand
ComputerName, where
ComputerName is the name of your ISA Server
computer.
- Expand Configuration, and then click
Networks.
- Click the Networks tab, right-click
Quarantined VPN Clients, and then click
Properties.
- Click the Quarantine tab.
The following Network Access Quarantine Control options are
available in the
Quarantined VPN Clients Properties dialog
box:
No quarantine
To configure this option, click to clear the
Enable
Quarantine Control check box if it is selected.
If you do not
enable Quarantine Control in ISA Server, ISA Server adds new virtual private
network (VPN) connections to the VPN Clients network instead of to the
Quarantined VPN Clients network. In this scenario, network policies that apply
to the VPN Clients network are applied to users who connect to ISA Server by
using VPN connections.
Important In this scenario, ISA Server disconnects the VPN user if you use
Remote Authentication Dial-In User Service (RADIUS) authentication to
authenticate VPN users and if one of the following conditions is true:
- The RADIUS server returns an
"MS-Quarantine-Session-Timeout" result.
- The RADIUS server sets the MS-Quarantine-IPFilter
quarantine filter attribute for the VPN user.
Quarantine according to ISA Server policies
To configure this option, click to select the
Enable
Quarantine Control check box, and then click one of the following
options:
- In ISA Server 2006, click Quarantine VPN clients
according to ISA Server policies.
- In ISA Server 2004, click Quarantine according to
ISA Server policies.
In this scenario, ISA Server determines whether to quarantine
the VPN user. If you use this option, ISA Server adds new VPN connections to
the Quarantined VPN Clients network. The firewall policies that apply to this
network are applied to users who connect to ISA Server by using VPN
connections.
If you have VPN users whom you want to exempt from
quarantine, add these users to the
Exempt these users from Quarantine
Control list. To do this, follow these steps:
- On the Quarantine tab in the
Quarantined VPN Clients Properties dialog box, click
Add.
- Click New User Set.
Note In ISA Server 2006, click New. - Type a name for the user set in the User set
name box. For example, type Exempted Quarantine
Users.
- Click Next, click Add,
and then click the type of users that you want to add to this user set. For
example, click Windows users and groups.
- Type the name of the user or the name of the security group
that you want to add to this user set, and then click
OK.
- Click Next, and then click
Finish.
- In the Available User Sets list, click to
select the check box of the user set that you created. For example, click to
select the Exempted Quarantine Users check box.
- Click OK.
Important In this scenario, ISA Server disconnects the VPN user if you use
RADIUS authentication to authenticate VPN users and if the RADIUS server sets
the MS-Quarantine-IPFilter quarantine filter attribute for the VPN
user.
Note The
MprAdminConnectionEnum function of the Routing and Remote Access service enumerates all
active connections. However, the RAS_FLAGS_QUARANTINE_PRESENT flag is not set
when the VPN user is quarantined according to ISA Server policies.
Quarantine according to RADIUS server policies
To configure this option, click to select the
Enable
Quarantine Control check box, and then click
Quarantine
according to RADIUS server policies.
Note This option is available only when ISA Server is installed on a
Windows Server 2003-based computer.
In this scenario, you can use the
MS-Quarantine-Session-Timeout quarantine timeout attribute to specify that the
VPN user must be quarantined. ISA Server looks for this attribute. If this
attribute exists, ISA Server adds the VPN user to the Quarantined VPN Clients
network. ISA Server also uses the timeout value that is specified in this
attribute and disconnects the VPN user if the user is not successfully removed
from quarantine within the time that is specified in the timeout
value.
Additionally, you can also use the MS-Quarantine-IPFilter
quarantine filter attribute to specify that the client must be quarantined. If
this attribute is the only attribute that is present, ISA Server adds the VPN
user to the Quarantined VPN Clients network. However, in this scenario, the
following conditions are true:
- ISA Server ignores the part of this attribute that applies
to Internet Protocol (IP) filters. ISA Server does not try to parse the IP
filters, and the IP filters are not applied to the VPN session.
- No timeout value is applied to the VPN session unless you
use both the quarantine filter attribute and the quarantine timeout
attribute.
In this scenario, the RAS_FLAGS_QUARANTINE_PRESENT flag of the
MprAdminConnectionEnum function is set when the VPN user is quarantined.
If the
VPN user is quarantined, you can use the
MprAdminConnectionRemoveQuarantine function to remove the user from quarantine if you have chosen
the following options:
- In ISA Server 2004, you have chosen the Quarantine
according to ISA Server policies option.
- In ISA Server 2006, you have chosen the Quarantine
VPN clients according to ISA Server policies option.
- You have chosen the Quarantine according to RADIUS
server policies option.
However, you must import this function from the Vpnplgin.dll
library in the ISA Server installation folder and not from Mprapi.dll.
Quarantine support for modem connections or for Integrated Services Digital Network (ISDN) connections
ISA Server does not provide quarantine support for incoming modem
or ISDN connections. ISA Server provides quarantine support only for
Point-to-Point Tunneling Protocol (PPTP) VPN connections or for Layer Two
Tunneling Protocol (L2TP) VPN connections.