Solved

Firewall client to SecureNAT client

Posted on 2006-06-13
5
384 Views
Last Modified: 2013-11-16
We are running a Windows Server 2003 with ISA 2000 and currently have all of the client computers set up with the ISA Firewall Client software and a proxy set.  We would like to switch to a SecureNAT client without the proxy.  How do we go about doing something like that?  What is involved to switch on the server and on the workstations?

I am pretty sure that on the workstations you just have to take the Firewall client off, but I am not sure what to do on the server side.
0
Comment
Question by:sdrevs
  • 2
5 Comments
 
LVL 51

Expert Comment

by:Keith Alabaster
Comment Utility
Remove the firewall clients. As long as the default gateway of the client is pointed at the internal nic of the ISA server you will become SecureNAT clients.
Do one user first (not the administrator) and make sure everything is still working. Are you removing the web proxy as well as the socks proxy?
There is no switch on the server to change.

What you will lose though is direct reference to Active Directory groups etc. Authentication issues will need to be addressed as you go.


Regards
Keith
0
 

Author Comment

by:sdrevs
Comment Utility
After Removing the firewall client Internet did still work, however when I removed the proxy settings from IE the internet does not work yet.  What do you mean "you will lose direct reference to Active Directory groups"? What is an example of a scenario that that would be a problem.

The end result I would like is to be able to plug in a workstation without having to install a client or set a proxy but still have the server acting as a firewall, closing all unsecured ports.

Thanks.
0
 
LVL 51

Accepted Solution

by:
Keith Alabaster earned 500 total points
Comment Utility
Only whereby you were using AD groups etc to limit traffic.

Youe will need to make IP filters for incoming/outgoing traffic sets.
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Wikipedia defines 'Script Kiddies' in this informal way: "In hacker culture, a script kiddie, occasionally script bunny, skiddie, script kitty, script-running juvenile (SRJ), or similar, is a derogatory term used to describe those who use scripts or…
The DROP (Spamhaus Don't Route Or Peer List) is a small list of IP address ranges that have been stolen or hijacked from their rightful owners. The DROP list is not a DNS based list.  It is designed to be downloaded as a file, with primary intention…
This video discusses moving either the default database or any database to a new volume.
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

763 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now