Solved

ISA Placement Question

Posted on 2006-10-20
8
204 Views
Last Modified: 2013-11-16
Currently we have an ISA server setup in a DMZ on a PIX 515.  It use to be a frontend for OWA, but now I would like to use it to monitor web use, and block websites that users shouldn't be using while at work.  I understand that in order for this to happen I will need to have the ISA between the PIX and the rest of the network, but we use our PIX for a Site to Site tunnel and I don't want to block traffic going through the tunnel to our servers on our network.  Any ideas on the best way to accomplish my goals?

Thanks
0
Comment
Question by:tfa8rva
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 3
  • 2
8 Comments
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 17775587
Are you using two nic's in the ISA (like an internal firewall) or just using it as a proxy device? Also, which version of ISA are you using?
0
 

Author Comment

by:tfa8rva
ID: 17775854
We are using ISA 2004, and more specificly V4.0.2163.213.  It has two nics, one going to the PIX and one going to the internal network, but currently it isn't being used for anything.
0
 
LVL 11

Accepted Solution

by:
prueconsulting earned 500 total points
ID: 17780525
Simply point web traffic towards the ISA internal NIC for monitoring web access . This can be done as simply as checking the proxy server box in your browser and pointing it to the ISA server .

0
Get 15 Days FREE Full-Featured Trial

Benefit from a mission critical IT monitoring with Monitis Premium or get it FREE for your entry level monitoring needs.
-Over 200,000 users
-More than 300,000 websites monitored
-Used in 197 countries
-Recommended by 98% of users

 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 17780642
I'll leave it to you then Prue. If the user still has an issue after you have finished I'll jump back in and go through the ISA side.
0
 

Author Comment

by:tfa8rva
ID: 17787921
Prue, I will give that a shot to see if it works.  Thanks.
0
 

Author Comment

by:tfa8rva
ID: 17789794
Thanks, that works.  I was making it out to be harder than it really was.
0
 
LVL 11

Expert Comment

by:prueconsulting
ID: 17789842
Glad to hear..
0
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 17790425
Me too. Means I can leave the ISA qestions to someone else now and get on with some of the others :)
0

Featured Post

Is your NGFW recommended by NSS Labs?

Ours is! NSS Labs Next Generation Firewall Test gives the WatchGuard Firebox M4600 a "Recommended" rating! Curious where your NGFW landed on the  Security Value Map? See the map and download the full report today!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

To setup a SonicWALL for policy based routing to be used with the Websense Content Gateway there are several steps that need to be completed. Below is a rough guide for accomplishing this. One thing of note is this guide is intended to assist in the…
This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
In this video we outline the Physical Segments view of NetCrunch network monitor. By following this brief how-to video, you will be able to learn how NetCrunch visualizes your network, how granular is the information collected, as well as where to f…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …

726 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question