Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

need info on ISA 2004

Posted on 2006-07-11
6
Medium Priority
?
260 Views
Last Modified: 2013-11-16
I have about 250 machines im going to point at my corrent proxy. The machine is a dell server P4, 1gb memory, 1 nic running server 2003 R2
Does anyone think there will be a problem with the current server or will I have to upgrade?
They will be limited to certen sites/Domains that they can go to.

Thanks for you help.
0
Comment
Question by:itguyrg
  • 4
  • 2
6 Comments
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 17084105
2GB RAM would be better as would two processors but not crucial. When you go up to ISA2006, the extra memory etc would be needed for sure.

Are you going to use VPN's?
0
 
LVL 1

Author Comment

by:itguyrg
ID: 17084259
No vpn just http/https traffic it is basically used more as s site controller then firewall. The 250 machines are on the wan side of the proxy and forwarded through my router then to the proxy and out to the internet.
I have a 9m t3 comming into the proxy.

Do you for see any other issues
0
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 17084328
Not exactly tight on bandwidth then? :)

If you have that capacity, I would definitely opt for 2GB and a twin processor as responses are going to be reasonably quick. Of course, you could just go as you are then upgrade if needed. Your current config will work fine but may not perform as fast as it might.

Regards
keith
ISA MCT
0
The Lifecycle Approach to Managing Security Policy

Managing application connectivity and security policies can be achieved more effectively when following a framework that automates repeatable processes and ensures that the right activities are performed in the right order.

 
LVL 1

Author Comment

by:itguyrg
ID: 17084354
oK Thanks I will pitch it to the owner of my company
0
 
LVL 51

Accepted Solution

by:
Keith Alabaster earned 1000 total points
ID: 17084360
Welcome.
0
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 17085184
& Thank you :)
0

Featured Post

The Firewall Audit Checklist

Preparing for a firewall audit today is almost impossible.
AlgoSec, together with some of the largest global organizations and auditors, has created a checklist to follow when preparing for your firewall audit. Simplify risk mitigation while staying compliant all of the time!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Do you have a windows based Checkpoint SmartCenter for centralized Checkpoint management?  Have you ever backed up the firewall policy residing on the SmartCenter?  If you have then you know the hassles of connecting to the server, doing an upgrade_…
To setup a SonicWALL for policy based routing to be used with the Websense Content Gateway there are several steps that need to be completed. Below is a rough guide for accomplishing this. One thing of note is this guide is intended to assist in the…
Exchange organizations may use the Journaling Agent of the Transport Service to archive messages going through Exchange. However, if the Transport Service is integrated with some email content management application (such as an anti-spam), the admin…
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…
Suggested Courses

578 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question