Avatar of stebennettsjb
stebennettsjb

asked on 

ISA 2004 Open Port

Hi i need to open a port for a SSL to 2087, but so far i am getting no joy from what i thought would be a relativly simple process.

I have done the following things with no joy..

1: Created a new firewall policy with
https
clicking on the ports section and chaing it to Limit access to traffic from this range of source ports: 2087
from Internal
to anywhere

I put this as number 1 on the list of policys so it ran first but i still got the error message.

I then tried creating my own Protocol in the Toolbox calling is SSL 2087 and giving it the range 2087 and outbound.

i then created a another policy which had the same settings as the previous except that instead of using https and chaning the port it just goes to SSL 2087.

Again i put this first on the plicy list and again still no joy.. i get the same error message saying that ISA is blocking the port.

If i go to the monitoring section i get the following messages for when i try to access to port:

Initiated Connection
then Cloed Connection

Also under rules it is not coming up withanything?

Why is it not running the Firewall rule that i created?

Any ideas creatly recieved

thanks

Microsoft Forefront ISA Server

Avatar of undefined
Last Comment
Keith Alabaster
ASKER CERTIFIED SOLUTION
Avatar of Keith Alabaster
Keith Alabaster
Flag of United Kingdom of Great Britain and Northern Ireland image

Blurred text
THIS SOLUTION IS ONLY AVAILABLE TO MEMBERS.
View this solution by signing up for a free trial.
Members can start a 7-Day free trial and enjoy unlimited access to the platform.
See Pricing Options
Start Free Trial
Avatar of stebennettsjb
stebennettsjb

ASKER

you are a scholer and a gentleman

ty

works perfectly now

Welcome :)
Microsoft Forefront ISA Server
Microsoft Forefront ISA Server

Microsoft Forefront, formerly known as Internet Security and Acceleration Server (ISA Server), is a network router, firewall, antivirus program, VPN server and web cache that runs on Windows servers. It includes identity management and protection systems, and discontinued systems for threat management and network protection, along with protection for Sharepoint and Exchange. The scope of discussions includes forward and reverse proxy, application and service publishing, virtual private networks (VPNs), outbound access rules, SSL certificates and network routing within either a single node or an highly-available array pairing.

10K
Questions
--
Followers
--
Top Experts
Get a personalized solution from industry experts
Ask the experts
Read over 600 more reviews

TRUSTED BY

IBM logoIntel logoMicrosoft logoUbisoft logoSAP logo
Qualcomm logoCitrix Systems logoWorkday logoErnst & Young logo
High performer badgeUsers love us badge
LinkedIn logoFacebook logoX logoInstagram logoTikTok logoYouTube logo