Hi William, The answer is *always* to create a split DNS. The ISA firewall really doesn't like looping back through itself for requests from Internal network clients. As you're noticed, when SecureNAT clients try to loop back through the ISA firewall, it doesn't work because the ISA firewall isn't proxying the request. It will work at times with the Firewall client (since its acting as a Winsock proxy) and will always work with the Web Proxy client. Also, the ISA firewall doesn't have an integrated mode. You also get all firewall features with the ISA firewall, although you can cripple it by installing it in single NIC mode. HTH, Tom -----Original Message----- From: William Holmes [mailto:wtholmes@xxxxxxxxxxxxxx] Sent: Monday, August 09, 2004 7:25 PM To: [ISAserver.org Discussion List] Subject: [isalist] ISA Publish Scenario http://www.ISAserver.org Hello, I am setting up ISA 2004 to publish several web servers. I have a diagram at: http://www.cs.cornell.edu/~wtholmes/publishingsetup.htm With this setup there is a split routing problem and I was wondering if there is a way to fix this within ISA. The external listener on the ISA server is on the DMZ network. When a web request comes into this listener from an external client everything works as expected. The request goes through the Checkpoint firewall to the DMZ to the ISA server which requests the page from the appropriate back-end web server. However when the request comes from an internal client it passes through the checkpoint firewall to the ISA server which responds its internal interface. This creates a split route. The checkpoint firewall seeing the incoming request but never seeing the outgoing request drops the connection. The ISA server sees a request coming to its external interface from a subnet that should only appear on its internal interface and also drops the connection. Solutions not involving ISA: 1. Create a split DNS so that requests for http://isaserver_listener_address from an internal host are directed to the internal network interface on the ISA server. 2. Modify the routing tables in the CISCO router to redirect requests to the DMZ listener's address on the ISA server to the internal ISA server address. 3. Configure all clients to use the ISA server as their web proxy. My question: Is there a way to configure ISA so that requests received on its external interface are answered on its external interface regardless of the source IP. In other words when publishing a web site can you ignore normal IP routing. The answer is likely a no but I just thought I would ask. Thanks Bill William Holmes (MCP) Department of Computer Science 310 Upson Hall Cornell University Ithaca, NY 14853 wtholmes@xxxxxxxxxxxxxx 607 255-1757 (o) 607 227-6049 (c) ------------------------------------------------------ List Archives: http://www.webelists.com/cgi/lyris.pl?enter=isalist ISA Server Newsletter: http://www.isaserver.org/pages/newsletter.asp ISA Server FAQ: http://www.isaserver.org/pages/larticle.asp?type=FAQ ------------------------------------------------------ Other Internet Software Marketing Sites: World of Windows Networking: http://www.windowsnetworking.com Leading Network Software Directory: http://www.serverfiles.com No.1 Exchange Server Resource Site: http://www.msexchange.org Windows Security Resource Site: http://www.windowsecurity.com/ Network Security Library: http://www.secinf.net/ Windows 2000/NT Fax Solutions: http://www.ntfaxfaq.com ------------------------------------------------------ You are currently subscribed to this ISAserver.org Discussion List as: tshinder@xxxxxxxxxxxxxxxxxx To unsubscribe visit http://www.webelists.com/cgi/lyris.pl?enter=isalist Report abuse to listadmin@xxxxxxxxxxxxx