Solved

ISA 2004 build question.

Posted on 2006-11-09
4
151 Views
Last Modified: 2013-11-16
Hello,

Is it ok to build an ISA 2004 box by itself then add it to the domain later or should I add it to the domain 1st then install ISA?  I wanted to get a bunch of these built at my office for multiple locations and then delply them.

W
0
Comment
Question by:hmcnasty
  • 3
4 Comments
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 17912336
Personally I build them with the OS then add them on the domain, ship to site first then add ISA. Had too many issues with people supplying incorrect configuration information regarding ip's etc in the past for remote offices/locations. However, for clients, I install ISA first (on a workgroup) based upon their ip addressing scheme in  a test environment. I ALWAYS install a rule that allows me to RDP into the ISA server so that I can configure remotely to add to the domain as necessary. If I have access to the external router then I can set up the necessary external forwarding rule to the ISA external NIC; if I don't have that access, the client has to set that rule up for me. Once connected, I can add the box to the domain myself but remotely

Rgds
Keith

0
 
LVL 51

Accepted Solution

by:
Keith Alabaster earned 500 total points
ID: 17921088
Anything else you need?
0
 

Author Comment

by:hmcnasty
ID: 17929382
Thanks Keith
0
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 17929527
You're welcome :)
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Wikipedia defines 'Script Kiddies' in this informal way: "In hacker culture, a script kiddie, occasionally script bunny, skiddie, script kitty, script-running juvenile (SRJ), or similar, is a derogatory term used to describe those who use scripts or…
To setup a SonicWALL for policy based routing to be used with the Websense Content Gateway there are several steps that need to be completed. Below is a rough guide for accomplishing this. One thing of note is this guide is intended to assist in the…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

821 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question