Solved

ISA Placement Question

Posted on 2006-10-20
8
199 Views
Last Modified: 2013-11-16
Currently we have an ISA server setup in a DMZ on a PIX 515.  It use to be a frontend for OWA, but now I would like to use it to monitor web use, and block websites that users shouldn't be using while at work.  I understand that in order for this to happen I will need to have the ISA between the PIX and the rest of the network, but we use our PIX for a Site to Site tunnel and I don't want to block traffic going through the tunnel to our servers on our network.  Any ideas on the best way to accomplish my goals?

Thanks
0
Comment
Question by:tfa8rva
  • 3
  • 3
  • 2
8 Comments
 
LVL 51

Expert Comment

by:Keith Alabaster
Comment Utility
Are you using two nic's in the ISA (like an internal firewall) or just using it as a proxy device? Also, which version of ISA are you using?
0
 

Author Comment

by:tfa8rva
Comment Utility
We are using ISA 2004, and more specificly V4.0.2163.213.  It has two nics, one going to the PIX and one going to the internal network, but currently it isn't being used for anything.
0
 
LVL 11

Accepted Solution

by:
prueconsulting earned 500 total points
Comment Utility
Simply point web traffic towards the ISA internal NIC for monitoring web access . This can be done as simply as checking the proxy server box in your browser and pointing it to the ISA server .

0
 
LVL 51

Expert Comment

by:Keith Alabaster
Comment Utility
I'll leave it to you then Prue. If the user still has an issue after you have finished I'll jump back in and go through the ISA side.
0
PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

 

Author Comment

by:tfa8rva
Comment Utility
Prue, I will give that a shot to see if it works.  Thanks.
0
 

Author Comment

by:tfa8rva
Comment Utility
Thanks, that works.  I was making it out to be harder than it really was.
0
 
LVL 11

Expert Comment

by:prueconsulting
Comment Utility
Glad to hear..
0
 
LVL 51

Expert Comment

by:Keith Alabaster
Comment Utility
Me too. Means I can leave the ISA qestions to someone else now and get on with some of the others :)
0

Featured Post

What Security Threats Are You Missing?

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

Join & Write a Comment

Suggested Solutions

To setup a SonicWALL for policy based routing to be used with the Websense Content Gateway there are several steps that need to be completed. Below is a rough guide for accomplishing this. One thing of note is this guide is intended to assist in theā€¦
This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
This video discusses moving either the default database or any database to a new volume.
When you create an app prototype with Adobe XD, you can insert system screens -- sharing or Control Center, for example -- with just a few clicks. This video shows you how. You can take the full course on Experts Exchange at http://bit.ly/XDcourse.

763 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now