Solved

porxy client problem in forefront tmg

Posted on 2010-11-28
13
1,177 Views
Last Modified: 2012-05-10
Dear sir

we have a windows server 2008 installed in hp server with forefront tmg
our client use secure net or web proxy to access the internet, and always the proxy server and port is 192.168.0.1:8080
but suddenly ,all the client can't access using the web proxy , if i change the port for the proxy from 8080 to 8099 , it is work in the client.

I don't know why the port 8080 become invalaible.

Any suggestions ??
0
Comment
Question by:spring80
  • 8
  • 4
13 Comments
 

Author Comment

by:spring80
ID: 34228012
when using 8080 as port for proxy server , and access a url from the client , a "http 400 bad request" message appear in the browser.
0
 
LVL 23

Expert Comment

by:Suliman Abu Kharroub
ID: 34228314
Go to FTMG console, networking --> internal network properties then web proxy tab. you an change the port back to  8080
0
 

Author Comment

by:spring80
ID: 34228352
i told you ,when using 8080 as port of the proxy, it is doesnt work, when i choose other port ,it is work
0
Announcing the Most Valuable Experts of 2016

MVEs are more concerned with the satisfaction of those they help than with the considerable points they can earn. They are the types of people you feel privileged to call colleagues. Join us in honoring this amazing group of Experts.

 
LVL 23

Expert Comment

by:Suliman Abu Kharroub
ID: 34228376
seems that another service is using the same port 8080.

keep the proxy port as 8099 and run netstat on the TMG server, can you find any service listening on port 8080 ?
0
 

Author Comment

by:spring80
ID: 34228451
i can't find any application listening to this port,but when i use a port checker software, and i want to check the port 8080 , it said that the port blocked by an application.

How can i know which application ?
0
 
LVL 5

Accepted Solution

by:
sabk earned 250 total points
ID: 34228474
use netstat -anb command to check which application has acquired 8080 port
0
 
LVL 23

Assisted Solution

by:Suliman Abu Kharroub
Suliman Abu Kharroub earned 250 total points
ID: 34228653
for more details, you can use netstat -b
0
 

Author Comment

by:spring80
ID: 34229054
when i use the netstat -anb command in dos, i can't check all the result ,only the last page, how browse page by page when using the cmd
0
 
LVL 23

Expert Comment

by:Suliman Abu Kharroub
ID: 34229059
netstat -anb | more

press space to go to the next page .
0
 

Author Comment

by:spring80
ID: 34230405
it is tomcat6.exe
0
 

Author Closing Comment

by:spring80
ID: 34230450
i don't know where from where the apache tomcat come to my server,i end task this program ,and the port 8080 become accessible, thanks for help
0
 

Author Comment

by:spring80
ID: 34230532
i found that the apache tomcat service come from HP MVAA , it is safe to disable this ??
0
 

Author Comment

by:spring80
ID: 34230618
or if i can change the port for it ?
0

Featured Post

Free Tool: Path Explorer

An intuitive utility to help find the CSS path to UI elements on a webpage. These paths are used frequently in a variety of front-end development and QA automation tasks.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

ISA Server detected routes through the network adapter LAN that do not correlate with the network to which this network adapter belongs What does this mean and how can one go about correcting it? In simple terms, this error message indicates t…
Forefront Threat Management Gateway 2010 or FTMG comes with some very neat troubleshooting tools built-in when trying to identify what is actually happening behind the scenes within the product when traffic is passing through its interfaces. To the …
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
I've attached the XLSM Excel spreadsheet I used in the video and also text files containing the macros used below. https://filedb.experts-exchange.com/incoming/2017/03_w12/1151775/Permutations.txt https://filedb.experts-exchange.com/incoming/201…

829 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question