[Last Call] Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

ISA Firewall/web proxy and securenat client

Posted on 2011-03-11
2
Medium Priority
?
1,119 Views
Last Modified: 2013-11-16
do I have to installed any software to go with Firewall connection ? currenly i have one network card setup and all my users showing as proxy client and securenat client .

do i have to installed the firewall client software in order to setup the firewall client in the ISA server ?
how can i setup the user login prompt to enter username and password when we click on the browser  on securenat setup (like linux web proxy ). is it posible

0
Comment
Question by:cur
2 Comments
 
LVL 23

Assisted Solution

by:Suliman Abu Kharroub
Suliman Abu Kharroub earned 248 total points
ID: 35113819
No, ISA firewall client is not necessary.  

here is a question answered by me; describe the deferences  between the three types:

http://www.experts-exchange.com/Microsoft/Server_Applications/Q_24595724.html

You can't use secure NAT to authenticate users, only firewall client and webproxy support authentication.

from the general node --.> networks --> internal ( properties) you can configure authentication there.
0
 
LVL 51

Accepted Solution

by:
Keith Alabaster earned 252 total points
ID: 35115057
You cannot do what you are attempting.
A securenat client is a device that has its default gateway pointing to the ISA Server. As the ISA Server is only a single nic unit it cannot be the default gateway, ifr you tried to make it so then all non-proxy traffic or exemptions will bounce around your newtork for the next million years.

If you want proper securenat use then the ISA requires two nics.
0

Featured Post

 The Evil-ution of Network Security Threats

What are the hacks that forever changed the security industry? To answer that question, we created an exciting new eBook that takes you on a trip through hacking history. It explores the top hacks from the 80s to 2010s, why they mattered, and how the security industry responded.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Common practice undertaken by most system administrators is to document the configurations and final solutions of anything performed by them for their future use and reference. So here I am going to explain how to export ISA Server 2004 Firewall pol…
Many of us in IT utilize a combination of roaming profiles and folder redirection to ensure user information carries over from one workstation to another; in my environment, it was to enable virtualization without needing a separate desktop for each…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…
Suggested Courses

830 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question