Thanks for providing the link....
Hardware Load-balancer definately has some advantages and provides the flexibility to configure load-balancing methods as per requirment. Infact as per my knowledge some load-balancers act as Reverse Proxy...!!!
Is Microsoft IT using load-balancer's revers proxy functionality by eliminating ISA ?
But for mediam size organizations CAS NLB is a cost-effective option.
As per older practice, all web facing servers needs to be there in DMZ. Now we are bringing the CAS server in inside zone, the concern is we are bringing the internet user's request directly to the inside zone of the firewall. In case of ISA reverse proxy the internet user's session is terminated on ISA and ISA generates seperate request to actual server. Incase of any attact Reverse proxy goes down (with limiting access to internet users) but CAS server continues to service internet users without any issue.
Any Architecture always has plus and minus points....