Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

Proxy Server II configuration help

Posted on 2004-04-22
3
Medium Priority
?
150 Views
Last Modified: 2010-04-09
Hi, I've been looking at this for a few weeks, and alas haven't sorted it, so I thought I'd ask.

On Microsoft Proxy Server II what needs to be done to all the computer running Proxy Server to be able to a) web browse using IE
and b) be able to download updates (FTP I'd say) from the CA website that has the InoculateIT virus definitions.

If packet filtering is not checked, both tasks work, so I'm sure it is in the configuration somewhere.

Thanks,

Andrew.
0
Comment
Question by:aladel
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 62

Accepted Solution

by:
gheist earned 200 total points
ID: 10907022
Web is few layers above packets filters, so you need to track what packet filter does wrong.
Traffic dumper like one from www.ethereal.com may be of help,
Or alternate packet filter like <http://www.hsc.fr/ressources/outils/pktfilter/index.html.en>.
Ina any case you can either understand how web maps into ethernet frames or trust the wizards....
0

Featured Post

Free Tool: ZipGrep

ZipGrep is a utility that can list and search zip (.war, .ear, .jar, etc) archives for text patterns, without the need to extract the archive's contents.

One of a set of tools we're offering as a way to say thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Wikipedia defines 'Script Kiddies' in this informal way: "In hacker culture, a script kiddie, occasionally script bunny, skiddie, script kitty, script-running juvenile (SRJ), or similar, is a derogatory term used to describe those who use scripts or…
The DROP (Spamhaus Don't Route Or Peer List) is a small list of IP address ranges that have been stolen or hijacked from their rightful owners. The DROP list is not a DNS based list.  It is designed to be downloaded as a file, with primary intention…
In this video, Percona Solution Engineer Rick Golba discuss how (and why) you implement high availability in a database environment. To discuss how Percona Consulting can help with your design and architecture needs for your database and infrastr…
Is your data getting by on basic protection measures? In today’s climate of debilitating malware and ransomware—like WannaCry—that may not be enough. You need to establish more than basics, like a recovery plan that protects both data and endpoints.…
Suggested Courses

598 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question