Solved

PBR to ISA 2006 Not Proxying Client Web Traffic

Posted on 2012-03-23
1
743 Views
Last Modified: 2012-08-17
I have a ISA 2006 server set up with McAfee's Smartfilter software running to filter our organization's internet traffic.

In the past, we've had to enter the proxy setting into client web browsers. We don't want to do that anymore.

I thought I could just Policy Base Route clients' 80 & 443 traffic to the ISA server, and it would receive the traffic, run it through the filter, allow/disallow the access, and return either a block page or the desired webpage back to the client.

It is not working.

The question is, is it suppose to work? If so, what configuration settings am I missing.

I know for sure the PBR is working, because running WireShark on the ISA box shows that client traffic is getting to the proxy server, but then packets are being reset. So, it's something on the ISA server.

Would appreciate any assistance.

Thank you.
0
Comment
Question by:suma33
1 Comment
 
LVL 51

Accepted Solution

by:
Keith Alabaster earned 500 total points
ID: 37759347
Create a new protocol using TCP port 80 outbound (rather than the existing http protocol) - use it in an access rule and disable the web proxy filter. Bear in mind though that this will treat the traffic as layer 3 rather than layer 7.

The ISA MUST be either the default mgateway or on the default route path to the Internet.
0

Featured Post

Live: Real-Time Solutions, Start Here

Receive instant 1:1 support from technology experts, using our real-time conversation and whiteboard interface. Your first 5 minutes are always free.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Scenerio: You have a server running Server 2003 and have applied a retail pack of Terminal Server Licenses.  You want to change servers or your server has crashed and you need to reapply the Terminal Server Licenses. When you enter the 16-digit lic…
I've always wanted to allow a user to have a printer no matter where they login. The steps below will show you how to achieve just that. In this Article I'll show how to deploy printers automatically with group policy and then using security fil…
This Micro Tutorial demonstrates using Microsoft Excel pivot tables, how to reverse engineer competitors' marketing strategies through backlinks.
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

786 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question