ISA 2000

Posted on 2004-11-18
Last Modified: 2013-11-16
I have created a destenation set that will allow users to access certian web sites.  Some of these web sites have https pages.  the user can access the inital site but not the https.  i have added the https url to the destenation set and users still get prompted for a username and password.  I have recreated the destenation set and get the same results.  Any Suggestions would be nice.
Question by:airlog
    LVL 5

    Expert Comment

    What kind of rule are you creating that uses the destination set? There are four kinds of rule you can use:

    Site and Content
    Web Publishing

    Remember that a Destination set only defines a group of computer names and possibly Paths to content, it doesn't specify which protocols can or can't be used.

    It might be you need a rule for HTTPS in \Access Policy\Protocol Rules if you don't have a default "All Internet Access" protocol rule which would allow all protocols.

    Author Comment

    I do have an all protcol rule that allows all IP traffic, I have an internet rule which allows FTP, FTP Download only, Gopher, HTTP, and HTTPS protocols to any request.  I have also setup another protocol rule which allows the same protocols as the internet rule and made it specific to the group that is having trouble connecting to the Https web sites.  I have even added the https url to the destentation set that is linked to the site and content rule which denies all destenations except the selected destenation set.  I can only get to the destenations that are listed in the destenation set but if the destenation has an HTTPS link in it i get prompted for a username and password.

    This is confusing.
    LVL 5

    Accepted Solution

    For an outgoing request, rules are processed in the following order:

    Protocol rules
    Site and content rules
    IP packet filters
    Routing rules or Firewall chaining configuration

    So in your scenario it sounds like you have:

    All Internet Access protocol rule
    A Site and Content rule allowing a Destination Set.
    No IP packet  filters denying access to HTTP (80) or HTTPS (port 443) outbound.
    Correct routing rules

    Are the web browsers configured to use the ISA Server web proxy?

    If so, have you checked the properties of the Outgoing Web Requests?

    To check these select the Computer Name, right-click for Properties and choose the Outgoing Web Requests tab.

    If you call up the help for this tab you'll see the following section:

    You can create access policy rules, allowing or denying access to a set of computers (client address sets) or to a group of users. If the rule applies specifically to users, then ISA Server checks the server's outgoing Web request properties to determine how the user should be authenticated. If the rule does not apply to users but only to client address sets or to any user, then authentication may not be required. The only time this is not true is if ISA Server always authenticates users. In this case, if a user cannot provide proper credentials, then the request is denied. For more information, see Rules and authentication and Require authentication for all requests.

    You might find clues as to what rules are causing the authentication challenge in the ISA server logs.

    Featured Post

    Maximize Your Threat Intelligence Reporting

    Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.

    Join & Write a Comment

    The DROP (Spamhaus Don't Route Or Peer List) is a small list of IP address ranges that have been stolen or hijacked from their rightful owners. The DROP list is not a DNS based list.  It is designed to be downloaded as a file, with primary intention…
    If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
    After creating this article (, I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
    Here's a very brief overview of the methods PRTG Network Monitor ( offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

    754 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    19 Experts available now in Live!

    Get 1:1 Help Now