Solved

Port 8080 Denied Connection

Posted on 2008-10-14
11
956 Views
Last Modified: 2012-05-05
I just installed ISA 2006 on a client's network. Everything seems to be working fine but when I look at the logs, I'm seeing that for every connection to the internet, ISA first sends a request to the web server over port 8080, which gets denied, and then over port 80, which gets accepted. Is this normal? If it is normal, why does it do that? If it is not normal, what do I do to fix this?
0
Comment
Question by:victornegri
  • 6
  • 5
11 Comments
 
LVL 51

Expert Comment

by:Keith Alabaster
Comment Utility
open the ISA gui
select configuration - networks - internal - web proxy
what port have you set. 80 or 8080?
0
 
LVL 10

Author Comment

by:victornegri
Comment Utility
8080
0
 
LVL 51

Expert Comment

by:Keith Alabaster
Comment Utility
OK so its at the default.

Is ISA a domain member or a standalone box>
What authentication have you placed on the outbound rules?
0
 
LVL 10

Author Comment

by:victornegri
Comment Utility
Yeah, it's at the default 8080 (which is what we had the old ISA2000 box set to.

The computer is a domain member and I have Integrated Authentication on the outbound rules.
0
 
LVL 51

Accepted Solution

by:
Keith Alabaster earned 500 total points
Comment Utility
Just as a test, can you remove the authenticated users and replace with all users?

Sounds like the web proxy service is attempting connecting as anonymous - which is fine - realising it requires authentication so requests the credentials from the client - then remakes the attempt correctly. Nothing actually to worry about though.

I assume you are not running the ISA fwc?
0
Backup Your Microsoft Windows Server®

Backup all your Microsoft Windows Server – on-premises, in remote locations, in private and hybrid clouds. Your entire Windows Server will be backed up in one easy step with patented, block-level disk imaging. We achieve RTOs (recovery time objectives) as low as 15 seconds.

 
LVL 10

Author Comment

by:victornegri
Comment Utility
We are running the ISA FWC... some computers have the old version (the one that came with ISA2k) and some have the latest version.

We have many rules set up on ISA. Most users are not allowed to connect to the internet. Some are only allowed to connect to certain sites. A few are allowed to connect to anything they want. We have rules set up that limit a user to certain sites based on their group membership... so to answer your question, some rules apply to "All Users" while others apply to specific domain groups. None have "Authenticated Users".

So I can just filter out the 8080 requests in the log monitor? I just want to make sure we're not going to be showing up on firewall logs as attempting some hack attempt over 8080 on the websites my users are trying to access.
0
 
LVL 51

Expert Comment

by:Keith Alabaster
Comment Utility
No, I would suggest that if you review the log, the call is made from internal (on 8080) to localhost rather than internal to external - can you confirm?
0
 
LVL 10

Author Comment

by:victornegri
Comment Utility
You're right. They all seem to be from internal to localhost. I could have sworn that I saw some from localhost to external but I guess I just read it incorrectly.

So I can ignore it?
0
 
LVL 51

Expert Comment

by:Keith Alabaster
Comment Utility
yes - your clear :)
0
 
LVL 10

Author Comment

by:victornegri
Comment Utility
Thanks.
0
 
LVL 51

Expert Comment

by:Keith Alabaster
Comment Utility
Welcome :)

Keith
0

Featured Post

Control application downtime with dependency maps

Visualize the interdependencies between application components better with Applications Manager's automated application discovery and dependency mapping feature. Resolve performance issues faster by quickly isolating problematic components.

Join & Write a Comment

Prologue It is often required to host multiple websites on a single instance of IIS, mostly in development environments instead of on production servers. I am sure it is not much a preferred solution on production servers but this is at least a pos…
Common practice undertaken by most system administrators is to document the configurations and final solutions of anything performed by them for their future use and reference. So here I am going to explain how to export ISA Server 2004 Firewall pol…
It is a freely distributed piece of software for such tasks as photo retouching, image composition and image authoring. It works on many operating systems, in many languages.
This video discusses moving either the default database or any database to a new volume.

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now