Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

ISA Question

Posted on 2006-07-18
4
Medium Priority
?
327 Views
Last Modified: 2013-11-16
I'm hoping that you can help me understand something.  I creatated an edge network in ISA  and I allowed unrestricted access.  How come the system policy rules include and enable DHCP but the server doesn't seem to give out DHCP until i configure a Firewall policy rule?  I am missing somethign I thought the whole Idea of the system rules was so that you don't have to create them all yourself.  

Wes
0
Comment
Question by:hmcnasty
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
4 Comments
 
LVL 51

Accepted Solution

by:
Keith Alabaster earned 2000 total points
ID: 17145407
The system policy enables the process of ISA acting in that role.
The firewall rule dictates where that traffic can pass to.
0
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 17146668
Thank you :)
0
 

Author Comment

by:hmcnasty
ID: 17146670
I get it thanks Keith.  I had the damn thing running on my domain controllor so nothing worked right.   Once I installed it properly it's fine.  

I guess that's how we learn

W
0
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 17146689
Absolutely, I am still learning all the time :)
0

Featured Post

Put Machine Learning to Work--Protect Your Clients

Machine learning means Smarter Cybersecurity™ Solutions.
As technology continues to advance, managing and analyzing massive data sets just can’t be accomplished by humans alone. It requires huge amounts of memory and storage, as well as the high-speed power of the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Do you have a windows based Checkpoint SmartCenter for centralized Checkpoint management?  Have you ever backed up the firewall policy residing on the SmartCenter?  If you have then you know the hassles of connecting to the server, doing an upgrade_…
This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
Video by: ITPro.TV
In this episode Don builds upon the troubleshooting techniques by demonstrating how to properly monitor a vSphere deployment to detect problems before they occur. He begins the show using tools found within the vSphere suite as ends the show demonst…
Add bar graphs to Access queries using Unicode block characters. Graphs appear on every record in the color you want. Give life to numbers. Hopes this gives you ideas on visualizing your data in new ways ~ Create a calculated field in a query: …
Suggested Courses

721 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question