Solved

Internet connection issue

Posted on 2006-11-19
5
177 Views
Last Modified: 2013-11-29
I have a computer that is used to connect to internet with no problem, but after ISA server was installed it can not connect to internet anymore.

the question is if I was not told that ISA server was installed, how would I find out the reason why the computer can not connect to internet , which tools should I use or should I have used to find out?

thanks
0
Comment
Question by:jskfan
5 Comments
 
LVL 1

Expert Comment

by:dacz
Comment Utility
get the IP address of your ISA server and make it your proxy server address to have an internet connection.
0
 
LVL 1

Assisted Solution

by:dacz
dacz earned 35 total points
Comment Utility
0
 
LVL 6

Assisted Solution

by:_iskywalker_
_iskywalker_ earned 35 total points
Comment Utility
first it is nice to know if you have an ip, then if you can ping your host or gateway, then you should contact the admin of the gateway to let you go through the internet. if you can you can ping www.experts-exchange.com and see if  it works, then you can traceroute this address and see which wroute it takes.
0
 

Author Comment

by:jskfan
Comment Utility
my question was:
 How do I know that it was ISA server  blocking access to internet if I was not told by someone else that ISA server was installed in the computer?



0
 
LVL 79

Accepted Solution

by:
lrmoore earned 180 total points
Comment Utility
That depends. Do you mean as a single end-user only - how can you determine that something was blocking your Internet access?
or as a systems administrator, what tools can you use to determine why you can't get Internet access, and could have determined that ISA had been installed somewhere?
or as a systems administrator, what tools can you use to know when something gets installed on one of your servers without you knowing about it?

All of these are really tough questions without simple answers.
Basically, if your Internet access goes down, then start by using the good old 7-layer OSI model, ground up.
Start with Layer1 - check/test all cables, outlets, plugs, etc
Layer2 = protocol checks, vlans, packet errors (duplex mismatch) etc
Layer3 = IP subnets/routes - ping/traceroute/route print/ ipconfig
Layer4 = name resolution/DNS/ firewall rules / proxy rules - Sniffer/Ethereal
Layer5-7 = permissions, credentials and applications. What's wrong with credentials/login? What's new application wise? What changed in any applications? What's different in this system that works and that one that doesn't? Group Policy is new, etc.  Sniffer/Ethereal can help determine these type issues
Layer 8 - 9 = politics, money and religion. Who make the new rules without communicating them to the masses? What governs most changes? Money, politics and religion. (Religion in the way some are religous Microsoft fanatics, some are religously anti-Microsoft fanatics, Cisco fanantics, anti-Cisco fanatics, etc)

None of those tools may ever tell you that it was specifically an unexpected ISA server showing up that was causing the problem. You might determine the IP address/mac-address of whatever it is blocking traffic, then you'd have to manually look at that system to see what was happening.

Do you have a change management process? If you did, then it would never allow that something as potentially disruptive to production as installing ISA could happen without everyone knowing about it. There are other automated tools available to determine and report system changes.
0

Featured Post

6 Surprising Benefits of Threat Intelligence

All sorts of threat intelligence is available on the web. Intelligence you can learn from, and use to anticipate and prepare for future attacks.

Join & Write a Comment

This is an article about my experiences with remote access to my clients (so that I may serve them) and eventually to my home office system via Radmin Remote Control. I have been using remote access for over 10 years and have been improving my metho…
Let’s list some of the technologies that enable smooth teleworking. 
Viewers will learn how to properly install and use Secure Shell (SSH) to work on projects or homework remotely. Download Secure Shell: Follow basic installation instructions: Open Secure Shell and use "Quick Connect" to enter credentials includi…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

744 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now