Solved

ISA 2004 build question.

Posted on 2006-11-09
4
154 Views
Last Modified: 2013-11-16
Hello,

Is it ok to build an ISA 2004 box by itself then add it to the domain later or should I add it to the domain 1st then install ISA?  I wanted to get a bunch of these built at my office for multiple locations and then delply them.

W
0
Comment
Question by:hmcnasty
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
4 Comments
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 17912336
Personally I build them with the OS then add them on the domain, ship to site first then add ISA. Had too many issues with people supplying incorrect configuration information regarding ip's etc in the past for remote offices/locations. However, for clients, I install ISA first (on a workgroup) based upon their ip addressing scheme in  a test environment. I ALWAYS install a rule that allows me to RDP into the ISA server so that I can configure remotely to add to the domain as necessary. If I have access to the external router then I can set up the necessary external forwarding rule to the ISA external NIC; if I don't have that access, the client has to set that rule up for me. Once connected, I can add the box to the domain myself but remotely

Rgds
Keith

0
 
LVL 51

Accepted Solution

by:
Keith Alabaster earned 500 total points
ID: 17921088
Anything else you need?
0
 

Author Comment

by:hmcnasty
ID: 17929382
Thanks Keith
0
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 17929527
You're welcome :)
0

Featured Post

When ransomware hits your clients, what do you do?

MSPs: Endpoint security isn’t enough to prevent ransomware.
As the impact and severity of crypto ransomware attacks has grown, Webroot has fought back, not just by building a next-gen endpoint solution capable of preventing ransomware attacks but also by being a thought leader.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you are like regular user of computer nowadays, a good bet that your home computer is on right now, all exposed to world of Internet to be exploited by somebody you do not know and you never will. Internet security issues has been getting worse d…
To setup a SonicWALL for policy based routing to be used with the Websense Content Gateway there are several steps that need to be completed. Below is a rough guide for accomplishing this. One thing of note is this guide is intended to assist in the…
This video Micro Tutorial shows how to password-protect PDF files with free software. Many software products can do this, such as Adobe Acrobat (but not Adobe Reader), Nuance PaperPort, and Nuance Power PDF, but they are not free products. This vide…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…

705 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question