CHAPTER 9

                      MONITORING AND OPTIMIZING ISA SERVER

                                                          PERFORMANCE

 

 

 

Microsoft Internet Security and Acceleration Server 2000 (ISA Server) includes many tools

for monitoring, optimizing, and tuning performance.  Alerts, logs, and reports can all be

configured through the Monitoring Configuration node in ISA Management. 

 

 

Lesson 1:  Configuring Alerts

 

The ISA Server alert service is responsible for capturing events, checking whether certain

conditions are met, and taking appropriate action.  You can use ISA Management to view

the full list of events supplied with ISA Server and to configure which actions should be

triggered when

 any of these events occur.

 

Preconfigured Alerts

 

By default, ISA Server includes 45 alerts, 39 of which are enabled.  You can view this list of alerts

in ISA Management by selecting the Alerts folder in the Monitoring Configuration node.  View at

home but do not memorize them!!!

 

NOTE:  You can also view ISA Server events in the Alert folder of the Monitoring node in ISA

Management.  However, ISA Management only shows the first occurrence of an event since the

previous shutdown.

 

Alert Conditions:  New alerts are based on existing alerts, but they normally include an additional,

more specific condition that must be met.  For example, the Domain Name System (DNS)

Intrusion alert normally has the Any DNS Intrusion condition specified as the additional

condition.

 

Event Location:  You can also configure a new alert that includes the same event and additional

condition as one of the pre-existing alerts, but that limits the detection of the event to a particular

server in the array.

 

 

Event Thresholds

 

Once an alert is configured, you can modify the alert by specifying the following threshold, which

determines when the alert action should be performed:

 

 

 

=====================================================================

 

winisa9.html                                                     PAGE 2                                                   2002/05/31

 

 

 

event frequency threshold)

 

 

Alert Action

 

You can set one or more of the following actions to be performed when an alert condition

is met:

 

Scheduled

 

NOTE:  If you configure an e-mail action to use an external SMTP server, you must create

a static packet filter that allows the SMTP protocol.

 

 

 

Lesson Summary:

 

event and four properties, including the alert condition, the event location, and alert threshold,

and the alert actions.

or stop ISA Server services.

place, and that the alert action should take place immediately.

 

 

 

Lesson 2:  Logging ISA Server Activity

 

formats like World Wide Web Consortium (W3C) and Open Database Connectivity (ODBC). 

and packet filtering.  New logs can be created daily, weekly, monthly or yearly.

 

 

 

 

=====================================================================

 

winisa9.html                                                     PAGE 3                                                   2002/05/31

 

 

 

 

Managing ISA Server Logs

 

ISA Server logs packet filtering activity, Firewall service activity, and Web Proxy service activity. 

By default, one new log file is generated for each service per day.

 

You can modify many of the default settings for these three service logs.  For example, you can

modify the logging format.  By default, ISA Server logs to a file in W3C format, but you can also

choose to log to a file in ISA format.

 

 

Logging to a File

 

You can save ISA Server logs to a file in either of the following formats:

 

 

You can specify the location of a log file in the Options dialog box.

 

The default location for the log file is the ISALogs folder.  When you leave this option selected, the

log file is saved to the same location within the ISA Server installation folder on every ISA Server

computer in the array.  If you specify another folder, however, the path you specify for the log file

must exist on every server in the array.

 

IMPORTANT  It is recommended that you log to Windows NT file system (NTFS) partitions so

that the log files benefit from advanced file system features like NTFS security and data compression. 

C:\wwroot\drop

 

 

Log File Names

 

The first three letters of the service log file name indicate the service being logged.  FWS indicates

the Firewall service, WEB indicates the Web Proxy service, and IPP indicates IP packet filters.

(A file in ISA Server file format is designated by the absence of the letters EXT).

 

A monthly Firewall service log file in ISA format created on the same date would be named

FWSM20020521.log.

 

 

=====================================================================

 

winisa9.html                                                     PAGE 4                                                   2002/05/31

 

 

 

 

 

Logging to a Database

 

You can store ISA Server logs to an ODBC database instead of a file.  You configure this

option by selecting the Database radio button on the Log tab of a service log’s Properties

dialog box.

 

The root folder of the ISA Server CD-ROM includes the following sample scripts that create

tables and indexes to support database logging:

 

support table queries.

 

 support table queries.

 

to support table queries.

 

 

For example, to create a SQL Server 2000 log databased named ISALogs that can grow

to a maximum size of 100MB and a transaction log file that can grow to a maximum size of

50MB, perform the following steps:

 

 

NOTE:  Logs will truncate information, if tables not created properly, and they are not much

help if the error message is missing information.

 

 

Logging Packets

 

All packets that pass through ISA Server can be logged to the packet filter log.  You can

configure exactly which packets are logged by following these guidelines:

 

 

packet filter log.

to any specific block-mode IP packet filter.

communicated by way of ISA Server.  When you enable logging of allowed packets,

all packets that pass through ISA Server are logged in the packet filter log.

 

NOTE:  You can only log allowed packets if packet filtering is enabled.

 

 

Firewall and Web Proxy Log Fields

 

By default, the packet filters log reports nine of a possible twelve fields.  Also by default,

the Firewall service and Web Proxy Service logs report 18 of a possible 27 fields.

 

 

 

 

=====================================================================

 

winisa9.html                                                     PAGE 5                                                   2002/05/31

 

 

 

 

Packet Filter Log Fields

 

You can use the ISA server log to monitor and analyze the status of the packet filters.

 

 *** See page 370-371 ***

 

 

Lesson Summary:

 

filters, the firewall service, and the Web Proxy Service. 

Server installation folder.

 

 

Lesson 3:  Creating ISA Server Reports

ISA Server can automatically generate graphical reports from information stored in the logs.

 

 

Configuring Reports

 

You can use the reporting feature of ISA Server to create reports about the Internet usage

patterns of your client users and computers.

 

 

Viewing Reports

 

Each report job actually creates a set of five reports, each of which can be viewed in a

separate folder in the Monitoring node of ISA Management page 375.  The five folders,

named Summary, Web Usage, Application Usage, Traffic & Utilization, and Security,

contain reports corresponding to each folder name.

 

 

Summary Reports

 

These Reports are most relevant to the network administrators or the person managing or

planning a company’s Internet connectivity.

 

 

 

 

=====================================================================

 

winisa9.html                                                     PAGE 6                                                   2002/05/31

 

 

 

 

Application Usage Reports

 

Application Usage reports illustrate Internet application usage in a company, including

incoming and outgoing traffic, top users, client applications, and destinations.

 

 

Traffic & Utilization Reports

 

Traffic & Utilization reports illustrate total Internet usage by application, protocol, and

direction; average traffic and peak simultaneous connections; cache hit ratio; errors and

other statistics.

 

 

NOTE:  The report will be sorted the next time you view it.

 

 

 

Configuring Report Jobs

 

You can schedule reports to be generated on a recurring basis:  daily, on specified days of the

week, or monthly.  For each report job you create, you can specify a period of time over

which the information in the logs will be collected, and the schedule by which a report based

on that period will be generated.

 

 

Report Job Credentials

 

For each report job you must configure, whether locally or remotely, a user name and password

with appropriate credentials to generate the reports on every server in the array.    In addition,

users that meet the following criteria can generate reports:

 

The user must have local administrator privileges on every ISA Server computer in the array.

The user must be able to access and launch DCOM objects on every ISA Server in the array.

 

 

Configuring Report Log Summaries

 

Reports are generated from a database that includes data collected form the ISA Server logs.

 

Scheduled reports may be created even if daily and monthly summaries are disabled.

 

NOTE:  You may specify between 35 and 999 daily summaries and between 13 and 999 monthly

summaries to save.  These minimums ensure that enough summaries will be saved to generate

monthly and yearly reports.

 

 

=====================================================================

 

winisa9.html                                                     PAGE 7                                                   2002/05/31

 

 

 

 

Report Database

 

By default, that location is the ISAReports folder of the ISA installation folder.  A typical path

is %ProgramFiles\Microsoft ISA Server\ISAReports.

 

The reports can then be viewed on the ISA Server computer on which the report database is

located.  You cannot view the reports if you run ISA Management from another ISA Server

computer in the same array.

 

 

Lesson Summary:

 

 

 

Lesson 4:  Controlling Bandwidth

 

As communication within your network and with the Internet becomes more congested,

network performance may deteriorate.

 

Bandwidth priorities are policy elements that designate priority values between 1 and 200 for

incoming and outgoing bandwidth.  These bandwidth priorities can then be applied to specific

connections through the use of bandwidth rules.

 

 

Determining Effective Bandwidth

 

Before you create bandwidth rules, you need to specify the effective bandwidth of your

Internet connection in ISA Management so that ISA Server can properly enforce bandwidth

priorities.

 

 

 

 

=====================================================================

 

winisa9.html                                                     PAGE 8                                                   2002/05/31

 

 

 

 

Effective Bandwidth for Dial-up Connections

 

For a modem, the bandwidth depends on the modem speed, compression, and other factors. 

You can specify the effective bandwidth for a dial-up connection by modifying the dial-up

entry associated with that connection in ISA Management, as shown on page 387.

 

 

 

Effective Bandwidth for Dedicated Network Connections

 

For frame relay networks (E1/T1 or E3/T3), the maximum effective bandwidth is determined

by your wide area network (WAN) provider.  You can configure effective bandwidth for a

dedicated network connection by modifying bandwidth rules properties in ISA Management.

 

If a device used for internal communication has 100KB effective bandwidth and the external

device has 56KB, you should configure the effective bandwidth at 56KB.

 

 

Configuring Bandwidth Priorities

 

Bandwidth priorities are policy elements that define the priority level applied to connections

passing through the ISA Server computer.  These policy elements are then assigned to

bandwidth rules to prioritize specific connections or traffic types.

 

Bandwidth priorities are specified according to the following directions:

 

Outbound bandwidth.  This is the bandwidth priority allocated for requests from internal

clients for objects on the Internet.

 

Inbound bandwidth.  This is the bandwidth priority allocated for requests from external

clients for objects on the local network.

 

 

Configuring Bandwidth Rules

 

Bandwidth rules apply predefined bandwidth priorities to traffic passing through ISA Server. 

When you create a bandwidth rule, you can specify a traffic type by any combination of the

following parameters:

 

 

 

 

=====================================================================

 

winisa9.html                                                     PAGE 9                                                   2002/05/31

 

 

 

 

As a result, all traffic passing through ISA Server is assigned a priority of 100 unless

otherwise specified.

 

NOTE:  Before you use the New Bandwidth Rule wizard, be sure to create policy elements

for the new rule.  Depending on how you configure the rule, you may require the following

policy elements:  protocol definitions, schedules, client address sets, destination sets, content

groups, and bandwidth priorities.

 

 

Rule Order

 

For each bandwidth rule, ISA Server compares the parameters defined in the rule to the

details of the connection.  The rule numbered 1 is processed first.

 

 

Lesson Summary:

 

through bandwidth priorities and bandwidth rules.

for incoming and outgoing bandwidth, with higher values representing high priorities.

default bandwidth priority to all network traffic) always processed last.

 

 

Lesson 5:  Additional Tuning and Monitoring Tools

 

You can fine tune performance in ISA Server by adjusting the server’s configuration to the

number of expected daily connections, and you can tune performance of the cache by

adjusting the amount of physical RAM used for storing Web content.

 

*** See charts 404-420 ****

 

 

 

 

=====================================================================

 

winisa9.html                                                     PAGE 10                                                 2002/05/31

 

 

 

Lesson Summary:

 

 

 tune the array’s performance to adjust to the number of daily connections you

anticipate for your site.

seven performance objects, each containing multiple counters that you can use

to gather information related to ISA Server performance.

counters preloaded into the System Monitor snap-in, the real-time monitoring tool.