Solved

user is disconnected from isa server 2004

Posted on 2011-02-17
12
248 Views
Last Modified: 2012-05-11
I have 2 users  that are constantly being disconnected from ISA.(total of 16 in the domain) Error reported is red X on the ISA graphic and "internet connection has stopped working". CAL licensing is not an issue as there are 20 seats. Any ideas? Both these clients are using AKAMI and the other domain users do not use this app. I believe that the issue is with ISA as I sometimes see disconnection events in the ISA log.

Thanks
0
Comment
Question by:S_Duncan
  • 6
  • 6
12 Comments
 
LVL 29

Expert Comment

by:pwindell
ID: 34927163
Red X on what ISA graphic?
0
 

Author Comment

by:S_Duncan
ID: 34927183
Yes, that is correct.
0
 
LVL 29

Expert Comment

by:pwindell
ID: 34927519
I mean what graphic?
0
 

Author Comment

by:S_Duncan
ID: 34928090
There is only 1 ISA graphic per/desktop. Are you familiar with the ISA graphic when it is connected or disconnected to the ISA server?
0
 
LVL 29

Expert Comment

by:pwindell
ID: 34929002
Ok, you mean the Firewall Client software showing down by the clock.

That is only related to the Firewall Service.  the Web Proxy Service and SecureNAT Services are separate from that.

So that will do that if one of two things happen:

1. You have a network problem causing the Client machine to have actual connectivity problems to the ISA at the network level

2. The is a DNS issue going on with the LAN where either the Firewall Client cannot resolve the ISA's name to the IP# or the user account fails to authenticate.  Both of those can be causes by faulty DNS operation whereby authetication fails,....AD depends on DNS working properly.
0
 
LVL 29

Expert Comment

by:pwindell
ID: 34929030
I have no idea what AKAMI is,...so I have no idea if it is relavant.
0
Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

 

Author Comment

by:S_Duncan
ID: 34929234
I have just found out that the 2 workstations have AKAMAI installed. The application is in the start menu, and does require the user to log in. I advised 1 user not to log into the application, and simply click through it, and Log in to the domain only. The other user has made no changes so I have 2 dis-similar
workstations. I believe that AKAMAI is a proxy server used mostly as a download manager. My experience with web servers/proxy servers and ISA is that they do not play nice together. Would you agree? Thanks for the info so far but I do not think the issue is pertinent to dns but I could be very wrong in my thinking. If it is a dns issue, how would you go about proving it , and then solving it?
0
 
LVL 29

Accepted Solution

by:
pwindell earned 500 total points
ID: 34929254
If AKAMI is some kind of proxy,...then it is most likely the cause.  It,...as a proxy,...could easliy screwup the Domain's required DNS resolution and also the authentication,...and get in the way of using the ISA.
0
 

Author Comment

by:S_Duncan
ID: 34929325
Thanks, your response goes along with my thinking. I am going to uninstall that app from the 1 workstation, and monitor the perf logs. I will post back to you with I hope a final resolution to this issue.

Thanks...
0
 

Author Comment

by:S_Duncan
ID: 34960855
I did not uninstall AKAMi from the workstations but I did disable AKAMI services. Then a clean boot. No performance issues have been reported since by the users. Proxy's and Poxy based Firewalls do not play nice together. Still monitoring.
0
 
LVL 29

Assisted Solution

by:pwindell
pwindell earned 500 total points
ID: 34961691
sounds good.
0
 

Author Closing Comment

by:S_Duncan
ID: 35107955
pwindell's responses were parallel to mine.
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Suggested Solutions

I have been asked to explain on many, many occasions the correct way to setup network cards and DNS settings on ISA Server 2004, 2006 and forefront Threat management gateway (FTMG) and have willing done so. I have also promised my self everytime tha…
There are several problems reported according slow link speeds or poor performance in TMG 2010, UAG 2010 or ISA 2006. I want to collect here some of the common issues together to give a brief overview what can be the reason. Nevertheless, not all of…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

757 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now