?
Solved

Issue with forced web proxy authentication - ISA 2004

Posted on 2006-11-20
2
Medium Priority
?
1,080 Views
Last Modified: 2012-06-21
Hi Experts,

I am very new to ISA 2004 and to ISA in general.  We just upgraded to from SBS standard to SBS premium, we did it mainly for the sql server, but it also comes with ISA 2004 so we are going to start using it for web control.

So far this is what I have accomplished:
ISA is set up in single network adapter mode, my internal network is 10.10.0.X, so I have my internal network defined in isa as 10.10.0.0 to 10.10.0.255.  I then set up a group policy that forces IE to use the ISA server as a web proxy.  At that point I was seeing clients in the web proxy logging but everyone was showing up as anonymous.  So then I went in the properties of the local network in ISA and clicked the web proxy tab, then authentication, and ticked the box to require authentication.  Then usernames magically started showing up in the logs using windows integrated authentication.

Now my problem is this is small buisness server, so we also have an internal web site running and outlook web access.  We would like some upper level management to not run through the proxy, but for some reason they get blocked from internal websites then.  They get a 403 error saying ISA has blocked the URL.  In the log in ISA I see the denied http request, but there is no rule associated with the deny, and of course the username is anonymous.

I tried modifying my local network to exclude the server, but then I can't browse the web from the server.  So is there anyway to force this authentication but still allow anonymous requests to the server?  If you need any more explanation please ask, I tried to explain this the best I could.
0
Comment
Question by:lukeca
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 51

Accepted Solution

by:
Keith Alabaster earned 2000 total points
ID: 17993644
If you have users for whom you want to bypass the authentication then exclude their machines from the group policy you have created. As you have only one nic in the SBS server (thats unusual these days for sbs 2003 premium) the default gateway on your machines will be pointing at the router, not the SBS box as is normally the case.

0
 
LVL 7

Author Comment

by:lukeca
ID: 17995641
Sorry, guess I didn't explain it well enough, I already know how to exclude users from using the proxy.  The problem is that the users that are excluded from using the proxy can not view the internal website hosted on the server.  They get an access denied message from the ISA server.  It seems as if all the web traffic from the server is going through ISA and if I force authentication, then users that are not going through the proxy never get authenticated and ISA denies them from viewing websites hosted on the server.  I still want to force authentication, but I want to allow non-authenticated users to view websites hosted on the server.

And I have already tried publishing the web site, it doesn't work.  The rules never get applied, it just instantly denies it because it see this anonymous request.  The problem I think is I forced authentication on the local network and I can't exclude the server on the local network because that just causes other problems.  But now I think I just thought of something, I wonder if I can create another network set that does exclude the server and force authentication on that.  I'll give that a try and see what happens.
0

Featured Post

Enroll in August's Course of the Month

August's CompTIA IT Fundamentals course includes 19 hours of basic computer principle modules and prepares you for the certification exam. It's free for Premium Members, Team Accounts, and Qualified Experts!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Do you have a windows based Checkpoint SmartCenter for centralized Checkpoint management?  Have you ever backed up the firewall policy residing on the SmartCenter?  If you have then you know the hassles of connecting to the server, doing an upgrade_…
The DROP (Spamhaus Don't Route Or Peer List) is a small list of IP address ranges that have been stolen or hijacked from their rightful owners. The DROP list is not a DNS based list.  It is designed to be downloaded as a file, with primary intention…
NetCrunch network monitor is a highly extensive platform for network monitoring and alert generation. In this video you'll see a live demo of NetCrunch with most notable features explained in a walk-through manner. You'll also get to know the philos…
If you’ve ever visited a web page and noticed a cool font that you really liked the look of, but couldn’t figure out which font it was so that you could use it for your own work, then this video is for you! In this Micro Tutorial, you'll learn yo…
Suggested Courses

765 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question