Solved

Proxy Server

Posted on 2008-10-22
3
273 Views
Last Modified: 2012-05-05
Hello Experts,

I just installed a Fedora with samba which will act as a file server inside a Windows environment.  Now my problem is we are using MS-ISA as proxy and I need to know how to configure my Fedora to access the ISA proxy so that I can download OS patches without doing any config on the ISA.

As always, thank you for your time on this matter.
0
Comment
Question by:coperator
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 30

Expert Comment

by:Kerem ERSOY
ID: 22782979
What exactly do you need here? IS your ISA-PROXY does authetication against Active Directory? Is it ok if you can authenticate to domain ?

Cheers,
K.
0
 
LVL 1

Author Comment

by:coperator
ID: 22782990
The ISA does authenticate to the AD.  I've added the proxy info on the browser and it works but I can't download any patches.  Authenticating to the domain is okay.
0
 
LVL 30

Accepted Solution

by:
Kerem ERSOY earned 500 total points
ID: 22783116
Oh  the problem is: Yum does not use the Proxy configuration in browser. For yum to be able to use a proxy you should tell it to yum. It takes you to modify /etc/yum.conf.

Here's how-to do it:

http://docs.fedoraproject.org/yum/sn-yum-proxy-server.html

Cheers,
K.

0

Featured Post

On Demand Webinar: Networking for the Cloud Era

Did you know SD-WANs can improve network connectivity? Check out this webinar to learn how an SD-WAN simplified, one-click tool can help you migrate and manage data in the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

SSH (Secure Shell) - Tips and Tricks As you all know SSH(Secure Shell) is a network protocol, which we use to access/transfer files securely between two networked devices. SSH was actually designed as a replacement for insecure protocols that sen…
It’s 2016. Password authentication should be dead — or at least close to dying. But, unfortunately, it has not traversed Quagga stage yet. Using password authentication is like laundering hotel guest linens with a washboard — it’s Passé.
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.
Suggested Courses

631 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question