Solved

Bandwidth Distribution using ISA 2004

Posted on 2007-11-23
3
771 Views
Last Modified: 2012-06-21
I have ISA Server 2004 behind a router with 2 MB ADSL connection and about 30 users using work group.
some users use download managers that consume all the bandwidth and others get no connection at all.
the problem is :
1- I need to distribute the avaliable bandwidth equally to the online users ( i mean that I don't want the speed to be limited to 15k/sec or else ... I need all the users downloading at a time to have the same speed in a fair distribution.
2- I would like to know how to block an application Like ( Internet Download Manager IDman.exe )

Thank You
0
Comment
Question by:HaithamEgy
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 51

Accepted Solution

by:
Keith Alabaster earned 125 total points
ID: 20341214
1. Without getting a 3rd party add-in, you cannot balance/alloacate the traffic through ISA as ISA does not care about the bandwidth.

2. to block the program, if you are the admin, then remove their programs.

3. if you want to block their activity then first you need to be able to identify the traffic.
You say you are on ISA2004 so you need the added elements supplied with SP3 if you haven't already installed it.

If necessary, install the downloader on your own PC so you can generate the traffic to monitor.
Open the ISA gui - select monitoring - logging - click start query to start the realtime log
Watch the traffic that is going through - can you oidentify the sites that are being visited to get the downloads from?

On your PC...
Make a connection from the client and try and do a download using the program
Watch the traffic go out then click on the line in the log. In the bottom section you the drill down and identify the http headers and see if their is a common user agent associated with it.. You may need to check a number of the linhes and drill down. Once you have the user agent name for the program your laughing. You can then add a rule and use the configure http option (for that rule) to block the user agent name.

Job done - repeat for each occurrence.
0
 

Author Comment

by:HaithamEgy
ID: 20341396
It's Ok for the second question and I will try your solution.

for the first question .. can you recommend a 3rd party software to do that ... somebody told me that surfcontrol can do it but I couldn't configure it to work with ISA.

please recommend me another 3rd party software or help me configure surfcontrol to work with ISA
0
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 20342093
That is a different question and needs to be posted as such for the installation of a 3rd party product.
Be aware though that Surfcontrol has been purchased by websense and some of the surfcontrol products are being discontinued from January.

Read the websense and GFI Monitor reviews and see what best fits your requiemnents.

http://www.gfi.com/webmon/?adv=40&loc=19&adclickid=14906126
http://www.websense.com/global/en/Partners/TAPartners/ViewPartners/Partner.php?Partner=Microsoft
0

Featured Post

Free Backup Tool for VMware and Hyper-V

Restore full virtual machine or individual guest files from 19 common file systems directly from the backup file. Schedule VM backups with PowerShell scripts. Set desired time, lean back and let the script to notify you via email upon completion.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.
In this article, I am going to show you how to simulate a multi-site Lab environment on a single Hyper-V host. I use this method successfully in my own lab to simulate three fully routed global AD Sites on a Windows 10 Hyper-V host.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
There's a multitude of different network monitoring solutions out there, and you're probably wondering what makes NetCrunch so special. It's completely agentless, but does let you create an agent, if you desire. It offers powerful scalability …
Suggested Courses

632 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question