Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

Running MSN Voice Behind ISA 2000 as Firewall Clients

Posted on 2004-10-14
2
Medium Priority
?
197 Views
Last Modified: 2010-03-18
I have ISA 2000 and want to msn voice thru that but i have tried opening ports and all the things i could find on this site is there anything you could still advise me i did add protocol rules and ip packet filter rules allow msn messenger traffic rules and opened port TCP 6901 , 5060 UDP rom 5000 -65535 and lots more but it soes not help i have given up

when i by pass PIX it works pls adise asap


Thnx
0
Comment
Question by:mivbinfotech
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 15

Accepted Solution

by:
adamdrayer earned 2000 total points
ID: 12317806
opening up ports on the ISA server will not open them up on a PIX firewall wall.  If bypassing your PIX works, you'll have to open them up there too.

Look here:
http://www.experts-exchange.com/Security/Firewalls/Q_21118065.html
0
 
LVL 2

Author Comment

by:mivbinfotech
ID: 12321608
sorry actually i meant  bypassing ISA not PIX it works perfect through PIX

pls advise
0

Featured Post

Free Tool: Site Down Detector

Helpful to verify reports of your own downtime, or to double check a downed website you are trying to access.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Nslookup is a command line driven utility supplied as part of most Windows operating systems that can reveal information related to domain names and the Internet Protocol (IP) addresses associated with them. In simple terms, it is a tool that can …
The Need In an Active Directory enviroment, the PDC emulator provide time synchronization for the domain. This is important since Active Directory uses Kerberos for authentication.  By default, if the time difference between systems is off by more …
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
In response to a need for security and privacy, and to continue fostering an environment members can turn to for support, solutions, and education, Experts Exchange has created anonymous question capabilities. This new feature is available to our Pr…

604 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question