[Last Call] Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

ISA 2000

Posted on 2004-11-18
5
Medium Priority
?
211 Views
Last Modified: 2013-11-16
I have created a destenation set that will allow users to access certian web sites.  Some of these web sites have https pages.  the user can access the inital site but not the https.  i have added the https url to the destenation set and users still get prompted for a username and password.  I have recreated the destenation set and get the same results.  Any Suggestions would be nice.
0
Comment
Question by:airlog
  • 2
3 Comments
 
LVL 5

Expert Comment

by:TJworld
ID: 12619675
What kind of rule are you creating that uses the destination set? There are four kinds of rule you can use:

Site and Content
Bandwidth
Routing
Web Publishing

Remember that a Destination set only defines a group of computer names and possibly Paths to content, it doesn't specify which protocols can or can't be used.

It might be you need a rule for HTTPS in \Access Policy\Protocol Rules if you don't have a default "All Internet Access" protocol rule which would allow all protocols.
0
 

Author Comment

by:airlog
ID: 12627562
I do have an all protcol rule that allows all IP traffic, I have an internet rule which allows FTP, FTP Download only, Gopher, HTTP, and HTTPS protocols to any request.  I have also setup another protocol rule which allows the same protocols as the internet rule and made it specific to the group that is having trouble connecting to the Https web sites.  I have even added the https url to the destentation set that is linked to the site and content rule which denies all destenations except the selected destenation set.  I can only get to the destenations that are listed in the destenation set but if the destenation has an HTTPS link in it i get prompted for a username and password.


This is confusing.
0
 
LVL 5

Accepted Solution

by:
TJworld earned 2000 total points
ID: 12630342
For an outgoing request, rules are processed in the following order:

Protocol rules
Site and content rules
IP packet filters
Routing rules or Firewall chaining configuration

So in your scenario it sounds like you have:

All Internet Access protocol rule
A Site and Content rule allowing a Destination Set.
No IP packet  filters denying access to HTTP (80) or HTTPS (port 443) outbound.
Correct routing rules

Are the web browsers configured to use the ISA Server web proxy?

If so, have you checked the properties of the Outgoing Web Requests?

To check these select the Computer Name, right-click for Properties and choose the Outgoing Web Requests tab.

If you call up the help for this tab you'll see the following section:

Authentication
You can create access policy rules, allowing or denying access to a set of computers (client address sets) or to a group of users. If the rule applies specifically to users, then ISA Server checks the server's outgoing Web request properties to determine how the user should be authenticated. If the rule does not apply to users but only to client address sets or to any user, then authentication may not be required. The only time this is not true is if ISA Server always authenticates users. In this case, if a user cannot provide proper credentials, then the request is denied. For more information, see Rules and authentication and Require authentication for all requests.

You might find clues as to what rules are causing the authentication challenge in the ISA server logs.
0

Featured Post

Free Tool: Subnet Calculator

The subnet calculator helps you design networks by taking an IP address and network mask and returning information such as network, broadcast address, and host range.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Unable to change the program that handles the scan event from a network attached Canon/Brother printer/scanner. This means you'll always have to choose which program handles this action, e.g. ControlCenter4 (in the case of a Brother).
Tech spooks aren't just for those who are tech savvy, it also happens to those of us running a business. Check out the top tech spooks for business owners.
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
NetCrunch network monitor is a highly extensive platform for network monitoring and alert generation. In this video you'll see a live demo of NetCrunch with most notable features explained in a walk-through manner. You'll also get to know the philos…

829 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question