Solved

how to block the .mp3 and .exe in ISA server 2004  and also access issue in VPN client

Posted on 2006-11-15
3
1,311 Views
Last Modified: 2013-12-04
Hi,

I am using the ISA server 2003 for proxy and firewall,  plz suggest how i can crete the rules to block the .exe and .mp3 form my ISA server 2004.
 Secondly i want to create the  rules to access the my office local machine from my home using VPN , I try to configure it and also able to login but not able to access my office local machine from my home

Regards,
Naresh


0
Comment
Question by:nareshver
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 14

Accepted Solution

by:
inbarasan earned 500 total points
ID: 17945380
Dear nareshver,

You can make use of HTTP filter.

Right mouse click on the rule that allows HTTP access in the Firewall Rules section of ISA management, then choose the "Configure HTTP".

Under the tab "Extensions" you can manage it.


Cheers!
0
 

Author Comment

by:nareshver
ID: 17955684
i have add the .exe and .mp3 but still isa does not block these file.

Thanks
Naresh

0
 
LVL 1

Expert Comment

by:houtanal
ID: 18012199
You can Create New Access Rule and block protocol,content-type and ... in it.
this article could be helpful.
http://support.microsoft.com/kb/925120
0

Featured Post

Is Your DevOps Pipeline Leaking?

Is your CI/CD pipeline a hodge-podge of randomly connected tools? You’ve likely got a tool to fix one problem & then a different tool to fix another, resulting in a cluster of tools with overlapping functionality. Learn how to optimize your pipeline with Gartner's recommendations

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Recently, a new law in my state forced us to get a top-to-bottom analysis of all of our contract client's networks. While we have documentation, it was spotty at best for some - and in any event it needed to be checked against reality. That was m…
Many people tend to confuse the function of a virus with the one of adware, this misunderstanding of the basic of what each software is and how it operates causes users and organizations to take the wrong security measures that would protect them ag…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …

726 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question