Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

need info on ISA 2004

Posted on 2006-07-11
6
Medium Priority
?
259 Views
Last Modified: 2013-11-16
I have about 250 machines im going to point at my corrent proxy. The machine is a dell server P4, 1gb memory, 1 nic running server 2003 R2
Does anyone think there will be a problem with the current server or will I have to upgrade?
They will be limited to certen sites/Domains that they can go to.

Thanks for you help.
0
Comment
Question by:itguyrg
  • 4
  • 2
6 Comments
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 17084105
2GB RAM would be better as would two processors but not crucial. When you go up to ISA2006, the extra memory etc would be needed for sure.

Are you going to use VPN's?
0
 
LVL 1

Author Comment

by:itguyrg
ID: 17084259
No vpn just http/https traffic it is basically used more as s site controller then firewall. The 250 machines are on the wan side of the proxy and forwarded through my router then to the proxy and out to the internet.
I have a 9m t3 comming into the proxy.

Do you for see any other issues
0
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 17084328
Not exactly tight on bandwidth then? :)

If you have that capacity, I would definitely opt for 2GB and a twin processor as responses are going to be reasonably quick. Of course, you could just go as you are then upgrade if needed. Your current config will work fine but may not perform as fast as it might.

Regards
keith
ISA MCT
0
WatchGuard Case Study: NCR

With business operations for thousands of customers largely depending on the internal systems they support, NCR can’t afford to waste time or money on security products that are anything less than exceptional. That’s why they chose WatchGuard.

 
LVL 1

Author Comment

by:itguyrg
ID: 17084354
oK Thanks I will pitch it to the owner of my company
0
 
LVL 51

Accepted Solution

by:
Keith Alabaster earned 1000 total points
ID: 17084360
Welcome.
0
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 17085184
& Thank you :)
0

Featured Post

Cyber Threats to Small Businesses (Part 1)

This past May, Webroot surveyed more than 600 IT decision-makers at medium-sized companies to see how these small businesses perceived new threats facing their organizations.  Read what Webroot CISO, Gary Hayslip, has to say about the survey in part 1 of this 2-part blog series.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Do you have a windows based Checkpoint SmartCenter for centralized Checkpoint management?  Have you ever backed up the firewall policy residing on the SmartCenter?  If you have then you know the hassles of connecting to the server, doing an upgrade_…
This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
Screencast - Getting to Know the Pipeline
Look below the covers at a subform control , and the form that is inside it. Explore properties and see how easy it is to aggregate, get statistics, and synchronize results for your data. A Microsoft Access subform is used to show relevant calcul…
Suggested Courses
Course of the Month10 days, 9 hours left to enroll

886 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question