Solved

ISA Question

Posted on 2006-07-18
4
318 Views
Last Modified: 2013-11-16
I'm hoping that you can help me understand something.  I creatated an edge network in ISA  and I allowed unrestricted access.  How come the system policy rules include and enable DHCP but the server doesn't seem to give out DHCP until i configure a Firewall policy rule?  I am missing somethign I thought the whole Idea of the system rules was so that you don't have to create them all yourself.  

Wes
0
Comment
Question by:hmcnasty
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
4 Comments
 
LVL 51

Accepted Solution

by:
Keith Alabaster earned 500 total points
ID: 17145407
The system policy enables the process of ISA acting in that role.
The firewall rule dictates where that traffic can pass to.
0
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 17146668
Thank you :)
0
 

Author Comment

by:hmcnasty
ID: 17146670
I get it thanks Keith.  I had the damn thing running on my domain controllor so nothing worked right.   Once I installed it properly it's fine.  

I guess that's how we learn

W
0
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 17146689
Absolutely, I am still learning all the time :)
0

Featured Post

On Demand Webinar: Networking for the Cloud Era

Did you know SD-WANs can improve network connectivity? Check out this webinar to learn how an SD-WAN simplified, one-click tool can help you migrate and manage data in the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Wikipedia defines 'Script Kiddies' in this informal way: "In hacker culture, a script kiddie, occasionally script bunny, skiddie, script kitty, script-running juvenile (SRJ), or similar, is a derogatory term used to describe those who use scripts or…
The DROP (Spamhaus Don't Route Or Peer List) is a small list of IP address ranges that have been stolen or hijacked from their rightful owners. The DROP list is not a DNS based list.  It is designed to be downloaded as a file, with primary intention…
There's a multitude of different network monitoring solutions out there, and you're probably wondering what makes NetCrunch so special. It's completely agentless, but does let you create an agent, if you desire. It offers powerful scalability …
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
Suggested Courses

630 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question