Solved

new to ISA 2004

Posted on 2006-10-30
2
159 Views
Last Modified: 2013-11-16
I'm new to ISA and have installed it on a SBS 2003.  After installing, none of the users on the network were able to connect to the internet, although I never specified anything like that in the wizard.  What should I do?

Also, I have a program that needs access to a certain port.  How do I set this up?
0
Comment
Question by:colin911
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 

Author Comment

by:colin911
ID: 17835097
I installed ISA 2004 from the premium technologies cd.
0
 
LVL 5

Accepted Solution

by:
cjtraman earned 250 total points
ID: 17857143
You need to create access rules once you installed ISA 2004. By default, it is configured to deny all. If the program uses the standard IANA ports, then you can identify the port in ISA port list to be added to the access rule. You need to specify source, destination, users, protocols etc for creating single access rule. If the port is not listed in port, then you can create your own port witn right protocol (tcp/udp).
0

Featured Post

How to Defend Against the WCry Ransomware Attack

On May 12, 2017, an extremely virulent ransomware variant named WCry 2.0 began to infect organizations. Within several hours, over 75,000 victims were reported in 90+ countries. Learn more from our research team about this threat & how to protect your organization!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
802.1X auth setup and configuration 3 88
Intune and ActiveSync 2 19
Application of a group policy 11 70
Lost or Stolen Laptops 13 44
Recently, Microsoft released a best-practice guide for securing Active Directory. It's a whopping 300+ pages long. Those of us tasked with securing our company’s databases and systems would, ideally, have time to devote to learning the ins and outs…
Auditing domain password hashes is a commonly overlooked but critical requirement to ensuring secure passwords practices are followed. Methods exist to extract hashes directly for a live domain however this article describes a process to extract u…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question