Re: who can help me ?

  • From: "Jim Harrison" <jim@xxxxxxxxxxxx>
  • To: "[ISAserver.org Discussion List]" <isalist@xxxxxxxxxxxxx>
  • Date: Sun, 3 Nov 2002 12:43:59 -0800

You still haven't sent a snip from the WEB log in ISA.
Without that, I can't tell you what else is happening.
The "12202" error is still what I described to you earlier; the client
request is explicitly or implicitly denied by the ISA based on the rules
that are defined.
You've been notably quiet about:
1. where the client is with respect to the ISA server
2. how the client makes the request
3. the details of the request
4. the log entries that represent the request and ISA response to it

 Jim Harrison
 MCP(NT4, W2K), A+, Network+, PCG
 http://isaserver.org/pages/author_index.asp?aut=3
 http://isatools.org
 Read the help / books / articles!

----- Original Message -----
From: Qusai Ali AL Haddad
To: [ISAserver.org Discussion List]
Sent: Sunday, November 03, 2002 9:32 AM
Subject: [isalist] Re: who can help me ?


http://www.ISAserver.org


dear Jim
thanx thanx alot for the reply
and next time u welcome to Bahrain ..
so when u come there Just call me i will do the rest

i read ur mail and i make some changes in the isa
and it shows same 12202 i dont know why ?
and also i am not using ISA as web server there is sepraate web server which
is redirect to it

********************************************
Server Name : QNET
 Created : 02/11/2002 09:05:20 ص
 Type : Standard Edition

Outgoing Web Requests

 Use the same listener configuration for all internal IP Addresses : True
 Server Name : QNET
 Use integrated Windows authentication

 TCP Port : 8080
 SSL Port : 0
 Number of connections : Unlimited
 Connection Timeout  ( seconds )  : 120
 Ask unauthenticated users for identification : False
 Resolve requests in array before routing : True

Incoming Web Requests

 Use the same listener configuration for all IP Addresses : True
 Server Name : QNET
 Use integrated Windows authentication

 TCP Port : 80
 SSL Port : 0
 Number of connections : Unlimited
 Connection Timeout  ( seconds )  : 120
 Ask unauthenticated users for identification : False
 Resolve requests in array before routing : False

Pulish automatic discovery infomation : True
Port for automatic discovery requests : 80

ALERTS
****************************************************************
Server Name : QNET

Alert Name : Server Publishing Recovery
 Description : The server publishing rule can now be applied.
 Active Since : 03/11/2002 08:20:06 م

Alert Name : Service shutdown
 Description : The service was stopped gracefully.
 Active Since : 03/11/2002 08:24:21 م

Alert Name : Service started
 Description : Service started.
 Active Since : 03/11/2002 08:24:25 م

Alert Name : Resource allocation failure
 Description : A resource allocation failure has occurred. For example,
insufficient memory resources.
 Active Since : 03/11/2002 08:21:35 م

SITE AND CONTENT RULES
****************************************************************
Site and Content Rule Name : Allow rule

 Enabled : True
 Rule Applies to : All Destinations
 Access to the specified destinations : Allowed
 Rule Applies to : Any Request
 Rule Applies to : All Content Types

Site and Content Rule Name : Public web site

 Enabled : True
 Rule Applies to : Selected Destination Set
 Destination Set Used : www.bahrain.msft
 Access to the specified destinations : Allowed
 Rule Applies to : Any Request
 Rule Applies to : All Content Types

****************************************************************
PROTOCOL RULES
****************************************************************
Protocol Rule Name : AccessPolicy

 Enabled : True
 Action taken with requests : Allow
 Rule applies to : Selected Protocols
 Protocols : Any RPC Server , AOL Instant Messenger , Archie , Chargen(TCP)
, Chargen(UDP) , Daytime(TCP) , Daytime(UDP) , Discard(TCP) , Discard(UDP) ,
DNS Query , DNS Query Server , DNS Zone Transfer , DNS Zone Transfer Server
, Echo (TCP) , Echo (UDP) , Exchange RPC Server , Finger , FTP , FTP
Download only , FTP Server , Gopher , H.323 Protocol , HTTP , HTTP IN ,
HTTPS , HTTPS Server , ICA , ICQ , ICQ 2000 , Ident , IMAP4 , IMAP4 Server ,
IMAPS , IMAPS Server , IRC , Kerberos-Adm(TCP) , Kerberos-Adm(UDP) ,
Kerberos-IV , Kerberos-Sec(TCP) , Kerberos-Sec(UDP) , LDAP , LDAP GC (Global
Catalog) , LDAPS , LDAPS GC (Global Catalog) , Microsoft SQL Server , MMS -
Windows Media , MMS - Windows Media Server , MSN , MSN Messenger , Net2Phone
, Net2Phone registration , NetBios Datagram , NetBios Name Service , NetBios
Session , NNTP , NNTP Server , NNTPS , NNTPS Server , NTP (UDP) , PNM -
RealNetworks protocol (Client) , PNM - RealNetworks protocol (Server) , POP2
, POP3 , POP3 Server , POP3S , POP3S Server , Quote (TCP) , Quote (UDP) ,
RADIUS , RADIUS Accounting , RDP (Terminal Services) , RIP , Rlogin , RTSP ,
RTSP Server , SMTP , SMTP Server , SMTPS , SMTPS Server , SNMP , SNMP Trap ,
SSH , Telnet , Telnet Server , TFTP , Time (TCP) , Time (UDP) , WhoIs ,
 Rule Applies to : Any Request

****************************************************************
IP PACKET FILTERS
****************************************************************
Enable Packet Filtering : True
Enable Intrusion detection : True
Enable IP routing : True

Enable filtering of IP fragments : False
Enable filtering IP options : False
Log packets from 'Allow' Filters : False

Enable detection of the selected attacks :
 Windows out-of-band  ( WinNuke )  : False
 Land : False
 Ping of Death : False
 IP Half Scan : False
 UDP Bomb : False
 Port Scan : False

PPTP though ISA firewall : True

Packet Filter Name : DHCP Client

 Enabled : False
 Filter Mode : Allow
 Filter Type : Custom
 Protocol : UDP
 Direction : Inbound and Outbound
 Local Port : 68
 Remote Port : 67
 Local Computer Filter Applies to this IP : 0.0.0.0
 Remote Computer Filter Applies to : All Remote Computers

Packet Filter Name : DNS filter

 Enabled : True
 Filter Mode : Allow
 Predefined Filter : DNS Lookup
 Local Computer Filter Applies to : Default External IP
 Remote Computer Filter Applies to : All Remote Computers

Packet Filter Name : DNS2GO

 Enabled : True
 Filter Mode : Allow
 Filter Type : Custom
 Protocol : TCP
 Direction : Inbound and Outbound
 Local Port : Dynamic port  ( 1024 - 5000 )
 Remote Port : 1227
 Local Computer Filter Applies to : Default External IP
 Remote Computer Filter Applies to : All Remote Computers

Packet Filter Name : HTTP

 Enabled : True
 Filter Mode : Allow
 Filter Type : Custom
 Protocol : TCP
 Direction : Inbound
 Local Port : 80
 Remote Port : Any Port
 Local Computer Filter Applies to : Default External IP
 Remote Computer Filter Applies to : All Remote Computers

Packet Filter Name : ICMP outbound

 Enabled : True
 Filter Mode : Allow
 Predefined Filter : ICMP all outbound
 Local Computer Filter Applies to : Default External IP
 Remote Computer Filter Applies to : All Remote Computers

Packet Filter Name : ICMP ping response (in)

 Enabled : True
 Filter Mode : Allow
 Predefined Filter : ICMP ping response
 Local Computer Filter Applies to : Default External IP
 Remote Computer Filter Applies to : All Remote Computers

Packet Filter Name : ICMP source quench

 Enabled : True
 Filter Mode : Allow
 Predefined Filter : ICMP source quench
 Local Computer Filter Applies to : Default External IP
 Remote Computer Filter Applies to : All Remote Computers

Packet Filter Name : ICMP timeout in

 Enabled : True
 Filter Mode : Allow
 Predefined Filter : ICMP timeout
 Local Computer Filter Applies to : Default External IP
 Remote Computer Filter Applies to : All Remote Computers

Packet Filter Name : ICMP unreachable in

 Enabled : True
 Filter Mode : Allow
 Predefined Filter : ICMP unreachable
 Local Computer Filter Applies to : Default External IP
 Remote Computer Filter Applies to : All Remote Computers

Packet Filter Name : SecureNAT PPTP

 Enabled : True
 Filter Mode : Allow
 Predefined Filter : PPTP call
 Local Computer Filter Applies to : Default External IP
 Remote Computer Filter Applies to : All Remote Computers

****************************************************************
WEB PUBLISHING RULES
****************************************************************
Web Publishing Rule Name : Public Web Site

 Enabled : True
 Rule Applies to : Selected Destination Set
 Destination Set Used : www.bahrain.msft
 Action : Redirect to 192.168.1.1
 Send Original Host Header : True
 HTTP Redirect Port : 80
 SSL Redirect Port : 443
 FTP Redirect Port : 21
 Redirect HTTP requests as : HTTP Requests
 Redirect SSL requests as : SSL Requests
 Require SSL for Published Site : False
 Rule Applies to : Any Request

Web Publishing Rule Name : Default rule

 Enabled : True
 Rule Applies to : All Destinations
 Action : Discard the request
 Redirect HTTP requests as : HTTP Requests
 Redirect SSL requests as : HTTP Requests
 Require SSL for Published Site : False
 Rule Applies to : Any Request

****************************************************************
SERVER PUBLISHING RULES
****************************************************************
Server Publishing Rule Name : Public Web Site

 Enabled : False
 IP Address of Internal Server : 192.168.1.1
 External IP Address on ISA Server : 217.17.238.225
 Protocol Used : HTTP IN
 Primary Port Used by Protocol : 80
 Rule Applies to : Any Request

****************************************************************
BANDWIDTH RULES
****************************************************************
Enable Bandwidth Control : False

BandWidth Rule Name : Default rule

 Enabled : True
 Rule applies to : All IP Traffic
 Rule Applies to : All Destinations
 Rule Applies to : Any Request
 Rule Applies to : All Content Types
 BandWidthPriority : Default bandwidth priority

DESTINATION SETS
****************************************************************
Destination Set Name : www.bahrain.msft

 DomainName: www.bahrain.msft
 DomainName: bahrain.msft


CUSTOM PROTOCOL DEFINITIONS
****************************************************************
Protocol Definition Name : HTTP IN

 Initial Connection Port Number : 80
 Initial Protocol Type : TCP
 Initial Direction : Inbound

APPLICATION FILTERS
****************************************************************
Application Filter Name : SMTP Filter

 Description : Filters SMTP traffic
 Enabled : False

Application Filter Name : SOCKS V4 Filter

 Description : Enables SOCKS 4 communication
 Enabled : True

Application Filter Name : Streaming Media Filter

 Description : Enables streaming protocols
 Enabled : True

Application Filter Name : HTTP Redirector Filter

 Description : Redirects requests from Firewall and SecureNAT clients to the
Web Proxy service
 Enabled : True

Application Filter Name : FTP Access Filter

 Description : Enables FTP protocols (client and server)
 Enabled : True

Application Filter Name : DNS intrusion detection filter

 Description : Intercepts and analyzes DNS traffic destined for the internal
 network
 Enabled : True

Application Filter Name : POP intrusion detection filter

 Description : Checks for POP buffer overflow attacks
 Enabled : True

Application Filter Name : RPC Filter

 Description : Enables publishing of RPC servers
 Enabled : True

Application Filter Name : H.323 Filter

 Description : Microsoft H.323 filter
 Enabled : True

****************************************************************
WEB FILTERS
****************************************************************
Web Filter Name : ISA Monitor

 Description : ISA Monitor
 Enabled : True
 Order : 1
 Vendor : GFI Software Ltd.

****************************************************************
NETWORK CONFIGURATION
****************************************************************
To route requests to upstream servers :
 Use Primary Connection
****************************************************************
ROUTING RULES
****************************************************************
Routing Rule Name : Default rule

 Enabled : True
 Order : 1
 Rule Applies to : All Destinations
 Process Requests by : Retrieving them directly from the specified
destination
 Use DialUp Entry for Primary Route : False
 Use DialUp Entry for Backup Route : False

 Search cache for : A valid version of the object, retrieve if necessary
 Cache Content : If source and request headers indicate to cache
 Redirect HTTP requests as : HTTP Requests
 Redirect SSL requests as : HTTP Requests
 Require SSL for Published Site : False

****************************************************************
LAT
****************************************************************
 Description : None
 From : 192.168.0.0
 To : 192.168.255.255

 Description : None
 From : 192.168.1.0
 To : 192.168.1.255

****************************************************************
LDT
****************************************************************
 Description : None
 Local Domain : *.bahrain.msft

 Description : None
 Local Domain : *.isa.bahrain.msft

Regards
Qusai

------------------------------------------------------
List Archives: http://www.webelists.com/cgi/lyris.pl?enter=isalist
ISA Server Newsletter: http://www.isaserver.org/pages/newsletter.asp
ISA Server FAQ: http://www.isaserver.org/pages/larticle.asp?type=FAQ
------------------------------------------------------
Exchange Server Resource Site: http://www.msexchange.org/
Windows Security Resource Site: http://www.windowsecurity.com/
Windows 2000/NT Fax Solutions: http://www.ntfaxfaq.com
------------------------------------------------------
You are currently subscribed to this ISAserver.org Discussion List as:
jim@xxxxxxxxxxxx
To unsubscribe send a blank email to $subst('Email.Unsub')



Other related posts: