Solved

Running MSN Voice Behind ISA 2000 as Firewall Clients

Posted on 2004-10-14
2
188 Views
Last Modified: 2010-03-18
I have ISA 2000 and want to msn voice thru that but i have tried opening ports and all the things i could find on this site is there anything you could still advise me i did add protocol rules and ip packet filter rules allow msn messenger traffic rules and opened port TCP 6901 , 5060 UDP rom 5000 -65535 and lots more but it soes not help i have given up

when i by pass PIX it works pls adise asap


Thnx
0
Comment
Question by:mivbinfotech
2 Comments
 
LVL 15

Accepted Solution

by:
adamdrayer earned 500 total points
ID: 12317806
opening up ports on the ISA server will not open them up on a PIX firewall wall.  If bypassing your PIX works, you'll have to open them up there too.

Look here:
http://www.experts-exchange.com/Security/Firewalls/Q_21118065.html
0
 
LVL 2

Author Comment

by:mivbinfotech
ID: 12321608
sorry actually i meant  bypassing ISA not PIX it works perfect through PIX

pls advise
0

Featured Post

What is SQL Server and how does it work?

The purpose of this paper is to provide you background on SQL Server. It’s your self-study guide for learning fundamentals. It includes both the history of SQL and its technical basics. Concepts and definitions will form the solid foundation of your future DBA expertise.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Enterprise networks where VoIP phones have been deployed frequently use port configurations that allow both a computer and an IP phone to be plugged into the same switch port but use different VLANs. On Cisco equipment I'm referring to the "native V…
Are you one of those front-line IT Service Desk staff fielding calls, replying to emails, all-the-while working to resolve end-user technological nightmares? I am! That's why I have put together this brief overview of tools and techniques I use in o…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
Although Jacob Bernoulli (1654-1705) has been credited as the creator of "Binomial Distribution Table", Gottfried Leibniz (1646-1716) did his dissertation on the subject in 1666; Leibniz you may recall is the co-inventor of "Calculus" and beat Isaac…

815 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now