Solved

Perimeter network access to internal network in a Back firewall configuration (ISA 2006)

Posted on 2008-10-07
5
636 Views
Last Modified: 2008-11-17
Hello,

I have a server in the perimeter network that requires access to the internal network.  Temporarily I want all traffic from this server to the internal network permitted.  I have setup a firewall rule to allow this, but it doesnt seem to work.  I have setup logging and access is denied to the internal network by the default deny rule.  

Do I need to setup any additional Network rules, other then the default rules?
0
Comment
Question by:AC_Nova
  • 3
  • 2
5 Comments
 
LVL 11

Expert Comment

by:EricTViking
Comment Utility
The sort of rule you probably need is allow all outbound traffic, from server in perimeter network, to internal for all users. That should be the only rule you need.
0
 
LVL 5

Author Comment

by:AC_Nova
Comment Utility
Thats what I have, but its not working.
0
 
LVL 11

Expert Comment

by:EricTViking
Comment Utility
Could you describe the topology of your network in a bit more detail? What networks do you have and what are their IP ranges? And where abouts on the network are your servers?
0
 
LVL 5

Author Comment

by:AC_Nova
Comment Utility
ISA
Ethernet adapter External:
   IP Address. . . . . . . . . . . . : 10.58.9.5
   Subnet Mask . . . . . . . . . . . : 255.255.255.0
   Default Gateway . . . . . . . . . : 10.58.9.1
Ethernet adapter Internal:
   IP Address. . . . . . . . . . . . : 10.59.69.1
   Subnet Mask . . . . . . . . . . . : 255.255.255.0
   Default Gateway . . . . . . . . . :
   DNS Servers . . . . . . . . . . . : 10.59.57.46
                                       10.59.57.47

server that I wish to access in the dmz
10.59.9.7
255.255.255.0
10.59.9.1

10.58.9.1 is a hardware firewall.

dns servers are internal:

10.59.57.46
 10.59.57.47

0
 
LVL 5

Accepted Solution

by:
AC_Nova earned 0 total points
Comment Utility
Dont worry I've sorted it.  It was a network route combined with a host add on the cisco kit.

cheers
0

Featured Post

What Security Threats Are You Missing?

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

Join & Write a Comment

Suggested Solutions

Forefront Threat Management Gateway 2010 or FTMG comes with some very neat troubleshooting tools built-in when trying to identify what is actually happening behind the scenes within the product when traffic is passing through its interfaces. To the …
There are several problems reported according slow link speeds or poor performance in TMG 2010, UAG 2010 or ISA 2006. I want to collect here some of the common issues together to give a brief overview what can be the reason. Nevertheless, not all of…
In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…
When you create an app prototype with Adobe XD, you can insert system screens -- sharing or Control Center, for example -- with just a few clicks. This video shows you how. You can take the full course on Experts Exchange at http://bit.ly/XDcourse.

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

7 Experts available now in Live!

Get 1:1 Help Now