?
Solved

ISA 2000 dynamic ports

Posted on 2004-08-31
3
Medium Priority
?
633 Views
Last Modified: 2013-11-16
Hi,

is there a way to configure an ISA server to allow any communications for an application? (like in symantec personal firewall)
My problem is that we have to use video conference via MSN Messenger, and I've read a lot of hints and tips on what ports should be opened. I opened them but it still doesn't work.

thanks in advance.
0
Comment
Question by:thegroover
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 7

Assisted Solution

by:JJ2
JJ2 earned 200 total points
ID: 11964368
0
 
LVL 35

Accepted Solution

by:
Bembi earned 200 total points
ID: 11980047
This is a general problem on ISA 2000, see what microsoft says:

http://www.microsoft.com/technet/prodtechnol/isa/2000/maintain/isaimsec.mspx
SIPS. Features such as voice, video, application sharing, and whiteboard require a connection to be made between an internal and external client, and use SIP Signaling (SIPS) to set up the communication session, which then uses dynamic ports. For example, using audio/video (AV) requires opening all UDP ports between 5004 and 65535 to allow SIP and media streams (RTP) to cross the firewall. The use of dynamic ports without an associated application filter is a problem because ISA Server does not have information about which ports to open and at what time. No ISA Server SIP application filter is available to circumvent this issue.

or
http://msdn.microsoft.com/library/default.asp?url=/library/en-us/rtcclnt/rtc/traversal_of_upnp_enabled_nats.asp

The usual solution is to open a wide range of ports above 5000 to allow video streaming. And this is a security risk. Try Net-Meeting for this.
0
 
LVL 1

Author Comment

by:thegroover
ID: 11987575
well, thanks anyway guys, the articles are usable.

G
0

Featured Post

Ransomware Attacks Keeping You Up at Night?

Will your organization be ransomware's next victim?  The good news is that these attacks are predicable and therefore preventable. Learn more about how you can  stop a ransomware attacks before encryption takes place with our Ransomware Prevention Kit!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you are like regular user of computer nowadays, a good bet that your home computer is on right now, all exposed to world of Internet to be exploited by somebody you do not know and you never will. Internet security issues has been getting worse d…
The DROP (Spamhaus Don't Route Or Peer List) is a small list of IP address ranges that have been stolen or hijacked from their rightful owners. The DROP list is not a DNS based list.  It is designed to be downloaded as a file, with primary intention…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Visualize your data even better in Access queries. Given a date and a value, this lesson shows how to compare that value with the previous value, calculate the difference, and display a circle if the value is the same, an up triangle if it increased…
Suggested Courses

741 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question