Solved

Bypassing our WebMarshal Server

Posted on 2006-06-16
5
11,244 Views
Last Modified: 2008-01-09
Hi guys!

Hope you can help.

At our network (2003 Server AD Domain), all internal clients gain internet access by first going through our WebMarshal proxy server

We have an application that requires access/connects to an external ftp server.

At the moment, this works by configuring in the application the hostname of the WebMarshal proxy server.
Along with this, we have to enter a valid domain user account for authentication.

It wont work if we dont point the application to the WebMarshal proxy server.

What we want is the following:

- Bypass our WebMarshal proxy server to get Internet Access.

We have a server on our network that is an ISA Firewall Server.
On configuration of this isa server, the WebMarshall proxy server was configured for Web Access.

Could someone point me in the right direction as to how for this application, we can bypass the WebMarshal proxy server and go straight through to our ISA Server and then get Internet Access/

Any help greatly appreciated.

Thank you.

Simon
0
Comment
Question by:Simon336697
  • 2
  • 2
5 Comments
 
LVL 51

Expert Comment

by:ahoffmann
ID: 16919149
simple question, simple answer: ask the people configuering your network and/or the people responsible for the policies
0
 
LVL 51

Accepted Solution

by:
Keith Alabaster earned 500 total points
ID: 16922356
You cannot. Web Marshall's job, like Surf Control, Smart Filter and others is to add additional filtering capabilities to ISA server which is the back-end engine.

if your administrator wishes to allow exceptions then suitable rules need to be created for that exception to take place on the ISA server.

If you are using an FTP client then this will not go through web marshall as it is not a proxy-based protocol. If you are using ftp through the web browser then the site needs to be added to Web marshall (as a permissible site) and the rule still needs to be added to ISA.

Are you the administrator?

Regards
Keith
0
 
LVL 51

Expert Comment

by:ahoffmann
ID: 16925955
hehe, more circumstantial description to waht I already said ;-)
0
 
LVL 1

Author Comment

by:Simon336697
ID: 16926399
Hi keith, thanks for you input appreciate your response!

Cheers.

Simon


0
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 16926402
Thank you :)
0

Featured Post

Control application downtime with dependency maps

Visualize the interdependencies between application components better with Applications Manager's automated application discovery and dependency mapping feature. Resolve performance issues faster by quickly isolating problematic components.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

If you are like regular user of computer nowadays, a good bet that your home computer is on right now, all exposed to world of Internet to be exploited by somebody you do not know and you never will. Internet security issues has been getting worse d…
To setup a SonicWALL for policy based routing to be used with the Websense Content Gateway there are several steps that need to be completed. Below is a rough guide for accomplishing this. One thing of note is this guide is intended to assist in the…
Video by: Mark
This lesson goes over how to construct ordered and unordered lists and how to create hyperlinks.
Many functions in Excel can make decisions. The most simple of these is the IF function: it returns a value depending on whether a condition you describe is true or false. Once you get the hang of using the IF function, you will find it easier to us…

895 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now