ISA 2006 Web proxy error

Posted on 2011-10-18
Last Modified: 2012-06-27
hi Experts,

Internet access via ISA2006 yielded proxy error - Temp blocking content-type: text/html
for certain websites (especially for

Log attached Web Proxy Log Fields.xls

Observation from Web proxy log:
HTTP Status Code - 5
Action - Failed
Error information includes – 0x480, 0x400, 0xd00, 0x402, 0xd80, 0xd82, 0x482

Appreciate your help to guide me in the troubleshooting process and identify the cause of error

Question by:kenny_klbn
    LVL 6

    Expert Comment

    Hope this works ...................................


    worked for me in FC7


    I resolved the problem using percent encoding. As my FULL email address is my username, the above format would expand as below, with two '@'s, so yum would treat as password, which would fail.


    I encoded the first '@' as '%40', which worked. I specified the http_proxy and ftp_proxy variables in /etc/bashrc and exported them as follows:

    http_proxy= r

    Yum works fine. But Yumex doesnt, as it relies on /etc/yum.conf, which does NOT have the proxy information. If proxy is mentioned in /etc/yum.conf, it gives non-numeric port error. And Yumex probably doesnt handle either two '@'s or percent encoding in URL, when declared in it's own configuration.

    If someone's proxy username or password contains any special characters, percent encoding might work.

    Author Comment

    hi infoplateform,

    I did not understand your explanation and was not able to correlate this to ISA 2006.
    LVL 7

    Accepted Solution

    can you try creating new firewall access policy that allow the access from your computer ip address to external with all outbound traffic and see if that resolve your issue, also make sure when you test the rule that your using the correct rule while trying to access the website.

    Author Comment

    hi elawad,

    I will try as suggested and revert back once i have results.

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    6 Surprising Benefits of Threat Intelligence

    All sorts of threat intelligence is available on the web. Intelligence you can learn from, and use to anticipate and prepare for future attacks.

    Shoutout to Emily Plummer ( for giving me this article! She did most of it, I just finished it up and posted it for her :)    Introduction In a previous article (http://www.experts-exchang…
    Envision that you are chipping away at another e-business site with a team of pundit developers and designers. Everything seems, by all accounts, to be going easily.
    The viewer will get a basic understanding of what section 508 compliance can entail, learn about skip navigation links, alt text, transcripts, and font size controls.
    The viewer will learn how to create a basic form using some HTML5 and PHP for later processing. Set up your basic HTML file. Open your form tag and set the method and action attributes.: (CODE) Set up your first few inputs one for the name and …

    779 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    14 Experts available now in Live!

    Get 1:1 Help Now