Solved

Bypassing our WebMarshal Server

Posted on 2006-06-16
5
11,293 Views
Last Modified: 2008-01-09
Hi guys!

Hope you can help.

At our network (2003 Server AD Domain), all internal clients gain internet access by first going through our WebMarshal proxy server

We have an application that requires access/connects to an external ftp server.

At the moment, this works by configuring in the application the hostname of the WebMarshal proxy server.
Along with this, we have to enter a valid domain user account for authentication.

It wont work if we dont point the application to the WebMarshal proxy server.

What we want is the following:

- Bypass our WebMarshal proxy server to get Internet Access.

We have a server on our network that is an ISA Firewall Server.
On configuration of this isa server, the WebMarshall proxy server was configured for Web Access.

Could someone point me in the right direction as to how for this application, we can bypass the WebMarshal proxy server and go straight through to our ISA Server and then get Internet Access/

Any help greatly appreciated.

Thank you.

Simon
0
Comment
Question by:Simon336697
  • 2
  • 2
5 Comments
 
LVL 51

Expert Comment

by:ahoffmann
ID: 16919149
simple question, simple answer: ask the people configuering your network and/or the people responsible for the policies
0
 
LVL 51

Accepted Solution

by:
Keith Alabaster earned 500 total points
ID: 16922356
You cannot. Web Marshall's job, like Surf Control, Smart Filter and others is to add additional filtering capabilities to ISA server which is the back-end engine.

if your administrator wishes to allow exceptions then suitable rules need to be created for that exception to take place on the ISA server.

If you are using an FTP client then this will not go through web marshall as it is not a proxy-based protocol. If you are using ftp through the web browser then the site needs to be added to Web marshall (as a permissible site) and the rule still needs to be added to ISA.

Are you the administrator?

Regards
Keith
0
 
LVL 51

Expert Comment

by:ahoffmann
ID: 16925955
hehe, more circumstantial description to waht I already said ;-)
0
 
LVL 1

Author Comment

by:Simon336697
ID: 16926399
Hi keith, thanks for you input appreciate your response!

Cheers.

Simon


0
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 16926402
Thank you :)
0

Featured Post

Gigs: Get Your Project Delivered by an Expert

Select from freelancers specializing in everything from database administration to programming, who have proven themselves as experts in their field. Hire the best, collaborate easily, pay securely and get projects done right.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Do you have a windows based Checkpoint SmartCenter for centralized Checkpoint management?  Have you ever backed up the firewall policy residing on the SmartCenter?  If you have then you know the hassles of connecting to the server, doing an upgrade_…
The DROP (Spamhaus Don't Route Or Peer List) is a small list of IP address ranges that have been stolen or hijacked from their rightful owners. The DROP list is not a DNS based list.  It is designed to be downloaded as a file, with primary intention…
Along with being a a promotional video for my three-day Annielytics Dashboard Seminor, this Micro Tutorial is an intro to Google Analytics API data.
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…

786 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question