Improve company productivity with a Business Account.Sign Up

x
?
Solved

Port 8080 Denied Connection

Posted on 2008-10-14
11
Medium Priority
?
1,953 Views
Last Modified: 2012-05-05
I just installed ISA 2006 on a client's network. Everything seems to be working fine but when I look at the logs, I'm seeing that for every connection to the internet, ISA first sends a request to the web server over port 8080, which gets denied, and then over port 80, which gets accepted. Is this normal? If it is normal, why does it do that? If it is not normal, what do I do to fix this?
0
Comment
Question by:victornegri
  • 6
  • 5
11 Comments
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 22713566
open the ISA gui
select configuration - networks - internal - web proxy
what port have you set. 80 or 8080?
0
 
LVL 10

Author Comment

by:victornegri
ID: 22713588
8080
0
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 22713616
OK so its at the default.

Is ISA a domain member or a standalone box>
What authentication have you placed on the outbound rules?
0
Free Tool: Port Scanner

Check which ports are open to the outside world. Helps make sure that your firewall rules are working as intended.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

 
LVL 10

Author Comment

by:victornegri
ID: 22713671
Yeah, it's at the default 8080 (which is what we had the old ISA2000 box set to.

The computer is a domain member and I have Integrated Authentication on the outbound rules.
0
 
LVL 51

Accepted Solution

by:
Keith Alabaster earned 2000 total points
ID: 22713701
Just as a test, can you remove the authenticated users and replace with all users?

Sounds like the web proxy service is attempting connecting as anonymous - which is fine - realising it requires authentication so requests the credentials from the client - then remakes the attempt correctly. Nothing actually to worry about though.

I assume you are not running the ISA fwc?
0
 
LVL 10

Author Comment

by:victornegri
ID: 22713773
We are running the ISA FWC... some computers have the old version (the one that came with ISA2k) and some have the latest version.

We have many rules set up on ISA. Most users are not allowed to connect to the internet. Some are only allowed to connect to certain sites. A few are allowed to connect to anything they want. We have rules set up that limit a user to certain sites based on their group membership... so to answer your question, some rules apply to "All Users" while others apply to specific domain groups. None have "Authenticated Users".

So I can just filter out the 8080 requests in the log monitor? I just want to make sure we're not going to be showing up on firewall logs as attempting some hack attempt over 8080 on the websites my users are trying to access.
0
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 22713845
No, I would suggest that if you review the log, the call is made from internal (on 8080) to localhost rather than internal to external - can you confirm?
0
 
LVL 10

Author Comment

by:victornegri
ID: 22713954
You're right. They all seem to be from internal to localhost. I could have sworn that I saw some from localhost to external but I guess I just read it incorrectly.

So I can ignore it?
0
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 22713966
yes - your clear :)
0
 
LVL 10

Author Comment

by:victornegri
ID: 22713976
Thanks.
0
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 22713988
Welcome :)

Keith
0

Featured Post

Free Tool: Subnet Calculator

The subnet calculator helps you design networks by taking an IP address and network mask and returning information such as network, broadcast address, and host range.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

First of all, clustering IIS is something you should rarely consider doing. In almost all cases, Microsoft Network Load Balancing (NLB) (http://technet.microsoft.com/en-us/library/cc758834(WS.10).aspx) is a much better solution when you need to p…
Preparing an email is something we should all take special care with – especially when the email is for somebody you may not know very well. The pressures of everyday working life stacked with a hectic office environment can make this a real challen…
Free Data Recovery software is an advanced solution from Kernel Tools to recover data and files such as documents, emails, database, media and pictures, etc. It supports recovery from physical & logical drive after a hard disk crash, accidental/inte…
Watch the software video of Kernel Import PST to Office 365 tools which can easily import PST and OST files to Office 365 for bulk mailboxes. The process of migration is simple and user can map source and destination mailboxes and easily import data…

606 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question