?
Solved

ISA Firewall/web proxy and securenat client

Posted on 2011-03-11
2
Medium Priority
?
1,084 Views
Last Modified: 2013-11-16
do I have to installed any software to go with Firewall connection ? currenly i have one network card setup and all my users showing as proxy client and securenat client .

do i have to installed the firewall client software in order to setup the firewall client in the ISA server ?
how can i setup the user login prompt to enter username and password when we click on the browser  on securenat setup (like linux web proxy ). is it posible

0
Comment
Question by:cur
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 23

Assisted Solution

by:Suliman Abu Kharroub
Suliman Abu Kharroub earned 248 total points
ID: 35113819
No, ISA firewall client is not necessary.  

here is a question answered by me; describe the deferences  between the three types:

http://www.experts-exchange.com/Microsoft/Server_Applications/Q_24595724.html

You can't use secure NAT to authenticate users, only firewall client and webproxy support authentication.

from the general node --.> networks --> internal ( properties) you can configure authentication there.
0
 
LVL 51

Accepted Solution

by:
Keith Alabaster earned 252 total points
ID: 35115057
You cannot do what you are attempting.
A securenat client is a device that has its default gateway pointing to the ISA Server. As the ISA Server is only a single nic unit it cannot be the default gateway, ifr you tried to make it so then all non-proxy traffic or exemptions will bounce around your newtork for the next million years.

If you want proper securenat use then the ISA requires two nics.
0

Featured Post

Get your Disaster Recovery as a Service basics

Disaster Recovery as a Service is one go-to solution that revolutionizes DR planning. Implementing DRaaS could be an efficient process, easily accessible to non-DR experts. Learn about monitoring, testing, executing failovers and failbacks to ensure a "healthy" DR environment.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Are you one of those front-line IT Service Desk staff fielding calls, replying to emails, all-the-while working to resolve end-user technological nightmares? I am! That's why I have put together this brief overview of tools and techniques I use in o…
I'm a big fan of Windows' offline folder caching and have used it on my laptops for over a decade.  One thing I don't like about it, however, is how difficult Microsoft has made it for the cache to be moved out of the Windows folder.  Here's how to …
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
In this video, Percona Solution Engineer Dimitri Vanoverbeke discusses why you want to use at least three nodes in a database cluster. To discuss how Percona Consulting can help with your design and architecture needs for your database and infras…
Suggested Courses

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question