ISA Firewall Policy

Posted on 2005-03-22
Medium Priority
Last Modified: 2013-11-16
Hi All,

I am trying to implement the firewall policy but seems to be having few understanding problems in it. e.g.

1. which rule applies first, is it like Access List in routers, cuz if it is then it's not happening in ISA 2004.
2. I would like to block access to internet for few of my employees MSN and other services
3. I would like to block complete access to other group of users
4. would only want that group to have access to local sites.

can anyone plz give me details on how to do it.
Question by:lomaree
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions

Accepted Solution

Jarrod earned 1000 total points
ID: 13607370

The rules should apply by the order you set, so the deny rules should be set above the allow rules. Youre probly best having a quick browse of


There are a few tutorials on how to use the basics of isa firewall

Hope this helps

Featured Post

Moving data to the cloud? Find out if you’re ready

Before moving to the cloud, it is important to carefully define your db needs, plan for the migration & understand prod. environment. This wp explains how to define what you need from a cloud provider, plan for the migration & what putting a cloud solution into practice entails.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article is a collection of issues that people face from time to time and possible solutions to those issues. I hope you enjoy reading it.
Make the most of your online learning experience.
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Suggested Courses
Course of the Month14 days, 18 hours left to enroll

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question