Solved

Open Port 8025 ISA Server

Posted on 2004-08-03
2
3,097 Views
Last Modified: 2013-11-16
Can someone walk me through the steps neccessary to open port 8025 on ISA Server for both inbound and outbound traffic.  All of my attempt have been futile

thanks
jabronicus
0
Comment
Question by:jabronicus
2 Comments
 
LVL 10

Expert Comment

by:winzig
ID: 11709951

1) You can open port on ISA server
 - create policy element My protocol and define your own protocol
 - in packet filters create new rule using your protocol definition

2) You can mat this port to any internal PC  
  Create 2 protocol definition ( one for incoming traffic and one for outgoing traffic)
  Add new rule to  protocol to rules
  Publish your server

Check out if thre isn't DENY rule which deny your Protocol. It there is such rule you have to exclude this protocol.




0
 
LVL 15

Accepted Solution

by:
Cyber-Dude earned 500 total points
ID: 11724349
  1. In ISA Management, expand Servers, expand <server-name>, click Access Policy, and then click IP Packet Filters.
   2. Click Create a packet filter to start a wizard.
   3. Name the packet filter what ever you wish.
   4. Click Allow packet transmission, and then click Custom.
   5. Click TCP as the IP protocol, click Outbound for the direction, click all ports for the local port, and then click Fixed port for the remote port. Type 8025 in the Port Number box.
   6. Select default IP addresses for each external interface that is on the ISA server.
   7. Click All remote computers.

Cyber
0

Featured Post

Simplifying Server Workload Migrations

This use case outlines the migration challenges that organizations face and how the Acronis AnyData Engine supports physical-to-physical (P2P), physical-to-virtual (P2V), virtual to physical (V2P), and cross-virtual (V2V) migration scenarios to address these challenges.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
Knowing where your website is hosted is as important as the features you receive, the monthly fee, and the support you receive. Due diligence should be done when choosing your next hosting provider.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

778 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question