[Okta Webinar] Learn how to a build a cloud-first strategyRegister Now


install ISA as a proxy with 1 NIC

Posted on 2009-05-01
Medium Priority
Last Modified: 2012-05-06
dear experts
i am incharge of the implementation of a new proxy solution for internet access.
i choose to implement the ISA solution but i have one server with one NIC
is there any step by step tutorial on how to configure ISA as proxy with one NIC ?

Question by:skintwido
  • 3
LVL 12

Expert Comment

ID: 24281109
Do you want to use the server as a firewall or just a proxy?
You can not use any of the firewall services with only one nic.

Author Comment

ID: 24281162
hi nealerocks
well i want to use ISA as a proxy only
my question is is there any additional configuration because i have a domain environment not a workgroup ?
is there any step by step tutorial how to install isa as proxy in a domain environment?
LVL 12

Expert Comment

ID: 24281192
A domain environment is easier i think. What version of ISA do you have?
LVL 12

Accepted Solution

nealerocks earned 1000 total points
ID: 24281474
if you have ISA 2004 it has a configuration wizard built in that will set it up to work with a single NIC. Then you just need to configure the access rules that you want and assign the proxy address to the users. Usually via group policy.

Featured Post

Threat Trends for MSPs to Watch

See the findings.
Despite its humble beginnings, phishing has come a long way since those first crudely constructed emails. Today, phishing sites can appear and disappear in the length of a coffee break, and it takes more than a little know-how to keep your clients secure.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Tech spooks aren't just for those who are tech savvy, it also happens to those of us running a business. Check out the top tech spooks for business owners.
When you put your credit card number into a website for an online transaction, surely you know to look for signs of a secure website such as the padlock icon in the web browser or the green address bar.  This is one way to protect yourself from oth…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…
Suggested Courses

873 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question