共用方式為


Chapter 5: Configuring DNS and DHCP Support for Web Proxy and Firewall Client Autodiscovery

The Web Proxy Autodiscovery Protocol (WPAD) can be used to allow Web browsers and the Firewall client application to automatically discover the address of the ISA Server 2004 firewall. The client can then download autoconfiguration information from the firewall after the Web Proxy or Firewall client discovers the address.

WPAD solves the problem of automatically provisioning Web browsers. The default setting on Internet Explorer 6.0 is to autodiscover Web proxy client settings. When this setting is enabled, the browser can issue a DHCPINFORM message or a DNS query to find the address of the ISA Server 2004 from which it can download autoconfiguration information. This greatly simplifies Web browser setup so that it automatically uses the firewall to connect to the Internet.

The ISA Server 2004 Firewall client can also use the wpad entry to find the ISA Server 2004 firewall and download Firewall client configuration information.

In this ISA Server 2004 Configuration Guide document, we discuss how to:

  • Configure DHCP WPAD support, and
  • Configure DNS WPAD support

After the wpad information is entered into DHCP and DNS, Web Proxy and Firewall clients will not require manual configuration to connect to the Internet through the ISA Server 2004 firewall machine.

Configure DHCP WPAD Support

The DHCP scope option number 252 can be used to automatically configure Web Proxy and Firewall clients. The Web Proxy or Firewall client must be configured as a DHCP client, and the logged on user must be a member of the local administrators group or Power users group (for Windows 2000). On Windows XP systems, the Network Configuration Operators group also has permission to issue DHCP queries (DHCPINFORM messages).

Note

For more information about the limitations of using DHCP for autodiscovery with Internet Explorer 6.0, please see KB article Automatic Proxy Discovery in Internet Explorer with DHCP Requires Specific Permissions at https://support.microsoft.com/default.aspx?scid=kb;en-us;312864

Perform the following steps at the DHCP server to create the custom DHCP option:

  1. Open the DHCP console from the Administrative Tools menu and right-click your server name in the left pane of the console. Click the Set Predefined Options command.
  2. In the Predefined Options and Values dialog box, click Add.
    Cc302584.c2855dc3-362b-4896-ae04-e6cf3eee43f8(en-us,TechNet.10).gif
  3. In the Option Type dialog box, enter the following information:
    Name: wpad
    Data type: String
    Code: 252
    Description: wpad entry
    Click OK.
    Cc302584.f3760659-754a-4e41-9f7b-a18184bb34c1(en-us,TechNet.10).gif
  4. In the Value frame, enter the URL to the ISA Server 2000 firewall in the String text box. The format for this value is:
    https://ISAServername:AutodiscoveryPort Number/wpad.dat
    The default autodiscovery port number is TCP 80. You can customize this value in the ISA Management console. We will cover this subject in more detail later.
    In the current example, enter the following into the String text box:
    https://isalocal.msfirewall.org:80/wpad.dat
    Make sure to enter wpad.dat in all lowercase letters. For more information on this problem, please refer to KB article "Automatically Detect Settings" Does Not Work if You Configure DHCP Option 252 at https://support.microsoft.com/default.aspx?scid=kb;en-us;307502
    Click OK.
    Cc302584.4c828239-7527-48dc-beb6-78d4a21a46cc(en-us,TechNet.10).gif
  5. Right-click the Scope Options node in the left pane of the console and click the Configure Options command.
  6. In the Scope Options dialog box, scroll through the list of Available Options and put a check mark in the 252 wpad check box. Click Apply and then click OK.
    Cc302584.a7fe695c-d134-4225-abca-7ea71ff02ae9(en-us,TechNet.10).gif
  7. The 252 wpad entry now appears in the right pane of the console under the list of Scope Options.
    Cc302584.f5889c97-9a35-406b-9db6-6f0f7ac25cc1(en-us,TechNet.10).gif
  8. Close the DHCP console.

At this point a DHCP client that has a logged on user who is a local administrator will be able to use DHCP wpad support to automatically discover the ISA Server 2004 firewall and subsequently autoconfigure itself. However, the ISA Server 2004 firewall must be configured to support publishing autodiscovery information. We will do this configuration later in this ISA Server 2004 Configuration Guide.

Configure DNS WPAD Support

Another method that used to deliver autodiscovery information to Web Proxy and Firewall clients is DNS. You can create a wpad alias entry in DNS and allow browser clients to use this information to automatically configure themselves. This is in contrast to the situation we saw with the DHCP method, where the logged-on user needed to be a member of a specific group in the Windows operating system.

Name resolution is a pivotal component to make this method of Web Proxy and Firewall client autodiscovery work correctly. In this case, the client operating system must be able to fully qualify the name wpad because the Web Proxy and Firewall client only knows that it needs to resolve the name wpad. It does not know what specific domain name it should append to the query to resolve the name wpad. We will cover this issue in detail later in the chapter.

Note

In contrast to the DHCP method of assigning autodiscovery information to Web Proxy and Firewall clients, you do not have the option to use a custom port number to publish autodiscovery information when using the DNS method. You must publish autodiscovery information on TCP 80 when using the DNS method.

You need to perform the following steps to configure DNS support for Web Proxy and Firewall client autodiscovery of the ISA Server 2004 firewall:

  • Create the wpad entry in DNS
  • Configure the client to use the fully qualified wpad alias
  • Configure the client browser to use autodiscovery

Create the Wpad Entry in DNS

The first step is to create a wpad alias entry in DNS. This alias (also known as a CNAME record) points to a Host (A) record for the ISA Server 2004 firewall. The Host (A) record resolves the name of the ISA Server 2004 firewall to the Internal IP address of the firewall.

Create the Host (A) record before you create the CNAME record. If you enable automatic registration in DNS, the ISA Server 2004 firewall’s name and IP address will already be entered into a DNS Host (A) record. If you have not enabled automatic registration, you will need to create the Host (A) record for the ISA Server 2004 firewall yourself.

In the following example, the ISA Server 2004 firewall has automatically registered itself with DNS because the Internal interface of the ISA Server 2004 firewall is configured to do so, and the DNS server is configured to accept unsecured dynamic registrations.

Perform the following steps on the DNS server on the domain controller on the Internal network:

  1. Click Start and select Administrative Tools. Click the DNS entry. In the DNS management console, right-click the forward lookup zone for your domain and click the New Alias (CNAME) command.
  2. In the New Resource Record dialog box, enter wpad in the Alias name (uses parent domain if left blank) text box. Click the Browse button.
    Cc302584.51fe4e3b-1135-4e9c-affb-4919fd120c8c(en-us,TechNet.10).gif
  3. In the Browse dialog box, double-click your server name in the Records list.
    Cc302584.818de1f0-2452-44f0-81ae-6fdf66fe2458(en-us,TechNet.10).gif
  4. In the Browse dialog box, double-click the Forward Lookup Zone entry in the Records frame.
    Cc302584.4f93dfb8-6769-4a27-a486-b52b8a37cbfd(en-us,TechNet.10).gif
  5. In the Browse dialog box, double-click the name of your forward lookup zone in the Records frame.
    Cc302584.820ff515-7bbd-4ce2-9b1b-077d1ec24407(en-us,TechNet.10).gif
  6. In the Browse dialog box, select the name of the ISA Server 2000 firewall in the Records frame. Click OK.
    Cc302584.a8db2ae0-3982-40bd-b5a6-04849d82ef71(en-us,TechNet.10).gif
  7. Click OK in the New Resource Record dialog box.
    Cc302584.eb4475fa-d3a7-4f85-8d8c-2cd3139a4ef9(en-us,TechNet.10).gif
  8. The CNAME (alias) entry appears in the right pane of the DNS management console.
    Cc302584.b10d5111-cd64-4451-b348-0974b5008a23(en-us,TechNet.10).gif
  9. Close the DNS Management console.

Configure the Client to Use the Fully Qualified wpad Alias

The Web Proxy and Firewall client need to be able to resolve the name wpad. The Web Proxy and Firewall client configurations are not aware of the domain containing the wpad alias. The Web Proxy and Firewall client operating system must be able to provide this information to the Web Proxy and Firewall client.

DNS queries must be fully qualified before sending the query to the DNS server. A fully qualified request contains a host name and a domain name. The Web Proxy and Firewall client only know the host name portion. The Web Proxy and Firewall client operating system must be able to provide the correct domain name, which it appends to the wpad host name, before it can send a DNS query to the DNS server.

There are a number of methods you can use to insure that a proper domain name is appended to wpad before the query is sent to the DNS server. Two popular methods for doing this include:

  • Using DHCP to assign a primary domain name
  • Configuring a primary domain name in the client operating system’s network identification dialog box.

We already configured a primary DNS name to assign DHCP clients when we configured the DHCP scope. The following steps demonstrate how to set the primary domain name to append to unqualified DNS queries:

Note

You do not need to perform these steps on the client machine on the Internal network in our example network. The reason for this is that the client is a member of the Active Directory domain on the Internet network. However, you should go through the following steps to see how the primary domain name is configured on nondomain member computers.

  1. Right-click My Computer on the desktop and click Properties.
  2. In the System Properties dialog box, click the Network Identification tab. Click the Properties button.
    Cc302584.70914440-2083-4b6c-a106-b05f76946798(en-us,TechNet.10).gif
  3. In the Identification Changes dialog box, click the More button.
    Cc302584.5792223e-82be-453b-bab5-9ab9b7562fd1(en-us,TechNet.10).gif
  4. In the DNS Suffix and NetBIOS Computer Name dialog box, enter the domain name that contains your wpad entry in the Primary DNS suffix of this computer text box. The operating system will append this domain name to the wpad name before sending the DNS query to the DNS server. By default, the primary domain name is the same as the domain name the machine belongs to. If the machine is not a member of a domain, then this text box will be empty. Note the Change primary DNS suffix when domain membership changes is enabled by default. In the current example, the machine is not a member of a domain.
    Cancel out of each of the dialog boxes so that you do not configure a primary domain name at this time.
    Cc302584.54138b33-3a13-4389-bf37-b67198219b30(en-us,TechNet.10).gif

Note that if you have multiple domains and clients on your Internal network that belong to multiple domains, you will need to create wpad CNAME alias entries for each of the domains.

Configure the Client Browser to Use Autodiscovery

The next step is to configure the browser to use autodiscovery. To configure the Web browser to use autodiscovery to automatically configure itself to use the ISA Server 2000 firewall’s Web Proxy service:

  1. Right-click the Internet Explorer icon on the desktop and click Properties.
  2. In the Internet Properties dialog box, click the Connections tab. Click the LAN Settings button.
  3. In the Local Area Network (LAN) Settings dialog box, put a check mark in the Automatically detect settings check box. Click OK.
    Cc302584.4ec54120-dad9-4871-ace9-4104f3f77dce(en-us,TechNet.10).gif
  4. Click Apply and then click OK in the Internet Properties dialog box.

The next step is to configure the ISA Server 2000 firewall publish autodiscovery information for autodiscovery Web Proxy and Firewall clients.

Conclusion

In this ISA Server 2004 Configuration Guide document we discussed the uses of a Microsoft Internet Authentication Server and how to install and configure the IAS server on the domain controller on the Internal network. Later in this guide, we will use this IAS server to authenticate incoming Web and VPN client connections.