?
Solved

new to ISA 2004

Posted on 2006-10-30
2
Medium Priority
?
164 Views
Last Modified: 2013-11-16
I'm new to ISA and have installed it on a SBS 2003.  After installing, none of the users on the network were able to connect to the internet, although I never specified anything like that in the wizard.  What should I do?

Also, I have a program that needs access to a certain port.  How do I set this up?
0
Comment
Question by:colin911
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 

Author Comment

by:colin911
ID: 17835097
I installed ISA 2004 from the premium technologies cd.
0
 
LVL 5

Accepted Solution

by:
cjtraman earned 750 total points
ID: 17857143
You need to create access rules once you installed ISA 2004. By default, it is configured to deny all. If the program uses the standard IANA ports, then you can identify the port in ISA port list to be added to the access rule. You need to specify source, destination, users, protocols etc for creating single access rule. If the port is not listed in port, then you can create your own port witn right protocol (tcp/udp).
0

Featured Post

New feature and membership benefit!

New feature! Upgrade and increase expert visibility of your issues with Priority Questions.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Article by: Justin
In light of the WannaCry ransomware attack that affected millions of Windows machines, you might wonder if your Mac needs protecting. Yes, it does and here is how to do it.
Let's recap what we learned from yesterday's Skyport Systems webinar.
This video Micro Tutorial shows how to password-protect PDF files with free software. Many software products can do this, such as Adobe Acrobat (but not Adobe Reader), Nuance PaperPort, and Nuance Power PDF, but they are not free products. This vide…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses
Course of the Month11 days, 12 hours left to enroll

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question