Re: who can help me ?

  • From: "Qusai Ali AL Haddad" <qusai@xxxxxxxxxxxxxx>
  • To: "[ISAserver.org Discussion List]" <isalist@xxxxxxxxxxxxx>
  • Date: Sun, 3 Nov 2002 20:32:22 +0300

dear Jim
thanx thanx alot for the reply
and next time u welcome to Bahrain ..
so when u come there Just call me i will do the rest

i read ur mail and i make some changes in the isa
and it shows same 12202 i dont know why ?
and also i am not using ISA as web server there is sepraate web server which
is redirect to it

********************************************
Server Name : QNET
 Created : 02/11/2002 09:05:20 ص
 Type : Standard Edition

Outgoing Web Requests

 Use the same listener configuration for all internal IP Addresses : True
 Server Name : QNET
 Use integrated Windows authentication

 TCP Port : 8080
 SSL Port : 0
 Number of connections : Unlimited
 Connection Timeout  ( seconds )  : 120
 Ask unauthenticated users for identification : False
 Resolve requests in array before routing : True

Incoming Web Requests

 Use the same listener configuration for all IP Addresses : True
 Server Name : QNET
 Use integrated Windows authentication

 TCP Port : 80
 SSL Port : 0
 Number of connections : Unlimited
 Connection Timeout  ( seconds )  : 120
 Ask unauthenticated users for identification : False
 Resolve requests in array before routing : False

Pulish automatic discovery infomation : True
Port for automatic discovery requests : 80

ALERTS
****************************************************************
Server Name : QNET

Alert Name : Server Publishing Recovery
 Description : The server publishing rule can now be applied.
 Active Since : 03/11/2002 08:20:06 م

Alert Name : Service shutdown
 Description : The service was stopped gracefully.
 Active Since : 03/11/2002 08:24:21 م

Alert Name : Service started
 Description : Service started.
 Active Since : 03/11/2002 08:24:25 م

Alert Name : Resource allocation failure
 Description : A resource allocation failure has occurred. For example,
insufficient memory resources.
 Active Since : 03/11/2002 08:21:35 م

SITE AND CONTENT RULES
****************************************************************
Site and Content Rule Name : Allow rule

 Enabled : True
 Rule Applies to : All Destinations
 Access to the specified destinations : Allowed
 Rule Applies to : Any Request
 Rule Applies to : All Content Types

Site and Content Rule Name : Public web site

 Enabled : True
 Rule Applies to : Selected Destination Set
 Destination Set Used : www.bahrain.msft
 Access to the specified destinations : Allowed
 Rule Applies to : Any Request
 Rule Applies to : All Content Types

****************************************************************
PROTOCOL RULES
****************************************************************
Protocol Rule Name : AccessPolicy

 Enabled : True
 Action taken with requests : Allow
 Rule applies to : Selected Protocols
 Protocols : Any RPC Server , AOL Instant Messenger , Archie , Chargen(TCP)
, Chargen(UDP) , Daytime(TCP) , Daytime(UDP) , Discard(TCP) , Discard(UDP) ,
DNS Query , DNS Query Server , DNS Zone Transfer , DNS Zone Transfer Server
, Echo (TCP) , Echo (UDP) , Exchange RPC Server , Finger , FTP , FTP
Download only , FTP Server , Gopher , H.323 Protocol , HTTP , HTTP IN ,
HTTPS , HTTPS Server , ICA , ICQ , ICQ 2000 , Ident , IMAP4 , IMAP4 Server ,
IMAPS , IMAPS Server , IRC , Kerberos-Adm(TCP) , Kerberos-Adm(UDP) ,
Kerberos-IV , Kerberos-Sec(TCP) , Kerberos-Sec(UDP) , LDAP , LDAP GC (Global
Catalog) , LDAPS , LDAPS GC (Global Catalog) , Microsoft SQL Server , MMS -
Windows Media , MMS - Windows Media Server , MSN , MSN Messenger , Net2Phone
, Net2Phone registration , NetBios Datagram , NetBios Name Service , NetBios
Session , NNTP , NNTP Server , NNTPS , NNTPS Server , NTP (UDP) , PNM -
RealNetworks protocol (Client) , PNM - RealNetworks protocol (Server) , POP2
, POP3 , POP3 Server , POP3S , POP3S Server , Quote (TCP) , Quote (UDP) ,
RADIUS , RADIUS Accounting , RDP (Terminal Services) , RIP , Rlogin , RTSP ,
RTSP Server , SMTP , SMTP Server , SMTPS , SMTPS Server , SNMP , SNMP Trap ,
SSH , Telnet , Telnet Server , TFTP , Time (TCP) , Time (UDP) , WhoIs ,
 Rule Applies to : Any Request

****************************************************************
IP PACKET FILTERS
****************************************************************
Enable Packet Filtering : True
Enable Intrusion detection : True
Enable IP routing : True

Enable filtering of IP fragments : False
Enable filtering IP options : False
Log packets from 'Allow' Filters : False

Enable detection of the selected attacks :
 Windows out-of-band  ( WinNuke )  : False
 Land : False
 Ping of Death : False
 IP Half Scan : False
 UDP Bomb : False
 Port Scan : False

PPTP though ISA firewall : True

Packet Filter Name : DHCP Client

 Enabled : False
 Filter Mode : Allow
 Filter Type : Custom
 Protocol : UDP
 Direction : Inbound and Outbound
 Local Port : 68
 Remote Port : 67
 Local Computer Filter Applies to this IP : 0.0.0.0
 Remote Computer Filter Applies to : All Remote Computers

Packet Filter Name : DNS filter

 Enabled : True
 Filter Mode : Allow
 Predefined Filter : DNS Lookup
 Local Computer Filter Applies to : Default External IP
 Remote Computer Filter Applies to : All Remote Computers

Packet Filter Name : DNS2GO

 Enabled : True
 Filter Mode : Allow
 Filter Type : Custom
 Protocol : TCP
 Direction : Inbound and Outbound
 Local Port : Dynamic port  ( 1024 - 5000 )
 Remote Port : 1227
 Local Computer Filter Applies to : Default External IP
 Remote Computer Filter Applies to : All Remote Computers

Packet Filter Name : HTTP

 Enabled : True
 Filter Mode : Allow
 Filter Type : Custom
 Protocol : TCP
 Direction : Inbound
 Local Port : 80
 Remote Port : Any Port
 Local Computer Filter Applies to : Default External IP
 Remote Computer Filter Applies to : All Remote Computers

Packet Filter Name : ICMP outbound

 Enabled : True
 Filter Mode : Allow
 Predefined Filter : ICMP all outbound
 Local Computer Filter Applies to : Default External IP
 Remote Computer Filter Applies to : All Remote Computers

Packet Filter Name : ICMP ping response (in)

 Enabled : True
 Filter Mode : Allow
 Predefined Filter : ICMP ping response
 Local Computer Filter Applies to : Default External IP
 Remote Computer Filter Applies to : All Remote Computers

Packet Filter Name : ICMP source quench

 Enabled : True
 Filter Mode : Allow
 Predefined Filter : ICMP source quench
 Local Computer Filter Applies to : Default External IP
 Remote Computer Filter Applies to : All Remote Computers

Packet Filter Name : ICMP timeout in

 Enabled : True
 Filter Mode : Allow
 Predefined Filter : ICMP timeout
 Local Computer Filter Applies to : Default External IP
 Remote Computer Filter Applies to : All Remote Computers

Packet Filter Name : ICMP unreachable in

 Enabled : True
 Filter Mode : Allow
 Predefined Filter : ICMP unreachable
 Local Computer Filter Applies to : Default External IP
 Remote Computer Filter Applies to : All Remote Computers

Packet Filter Name : SecureNAT PPTP

 Enabled : True
 Filter Mode : Allow
 Predefined Filter : PPTP call
 Local Computer Filter Applies to : Default External IP
 Remote Computer Filter Applies to : All Remote Computers

****************************************************************
WEB PUBLISHING RULES
****************************************************************
Web Publishing Rule Name : Public Web Site

 Enabled : True
 Rule Applies to : Selected Destination Set
 Destination Set Used : www.bahrain.msft
 Action : Redirect to 192.168.1.1
 Send Original Host Header : True
 HTTP Redirect Port : 80
 SSL Redirect Port : 443
 FTP Redirect Port : 21
 Redirect HTTP requests as : HTTP Requests
 Redirect SSL requests as : SSL Requests
 Require SSL for Published Site : False
 Rule Applies to : Any Request

Web Publishing Rule Name : Default rule

 Enabled : True
 Rule Applies to : All Destinations
 Action : Discard the request
 Redirect HTTP requests as : HTTP Requests
 Redirect SSL requests as : HTTP Requests
 Require SSL for Published Site : False
 Rule Applies to : Any Request

****************************************************************
SERVER PUBLISHING RULES
****************************************************************
Server Publishing Rule Name : Public Web Site

 Enabled : False
 IP Address of Internal Server : 192.168.1.1
 External IP Address on ISA Server : 217.17.238.225
 Protocol Used : HTTP IN
 Primary Port Used by Protocol : 80
 Rule Applies to : Any Request

****************************************************************
BANDWIDTH RULES
****************************************************************
Enable Bandwidth Control : False

BandWidth Rule Name : Default rule

 Enabled : True
 Rule applies to : All IP Traffic
 Rule Applies to : All Destinations
 Rule Applies to : Any Request
 Rule Applies to : All Content Types
 BandWidthPriority : Default bandwidth priority

DESTINATION SETS
****************************************************************
Destination Set Name : www.bahrain.msft

 DomainName: www.bahrain.msft
 DomainName: bahrain.msft


CUSTOM PROTOCOL DEFINITIONS
****************************************************************
Protocol Definition Name : HTTP IN

 Initial Connection Port Number : 80
 Initial Protocol Type : TCP
 Initial Direction : Inbound

APPLICATION FILTERS
****************************************************************
Application Filter Name : SMTP Filter

 Description : Filters SMTP traffic
 Enabled : False

Application Filter Name : SOCKS V4 Filter

 Description : Enables SOCKS 4 communication
 Enabled : True

Application Filter Name : Streaming Media Filter

 Description : Enables streaming protocols
 Enabled : True

Application Filter Name : HTTP Redirector Filter

 Description : Redirects requests from Firewall and SecureNAT clients to the
Web Proxy service
 Enabled : True

Application Filter Name : FTP Access Filter

 Description : Enables FTP protocols (client and server)
 Enabled : True

Application Filter Name : DNS intrusion detection filter

 Description : Intercepts and analyzes DNS traffic destined for the internal
 network
 Enabled : True

Application Filter Name : POP intrusion detection filter

 Description : Checks for POP buffer overflow attacks
 Enabled : True

Application Filter Name : RPC Filter

 Description : Enables publishing of RPC servers
 Enabled : True

Application Filter Name : H.323 Filter

 Description : Microsoft H.323 filter
 Enabled : True

****************************************************************
WEB FILTERS
****************************************************************
Web Filter Name : ISA Monitor

 Description : ISA Monitor
 Enabled : True
 Order : 1
 Vendor : GFI Software Ltd.

****************************************************************
NETWORK CONFIGURATION
****************************************************************
To route requests to upstream servers :
 Use Primary Connection
****************************************************************
ROUTING RULES
****************************************************************
Routing Rule Name : Default rule

 Enabled : True
 Order : 1
 Rule Applies to : All Destinations
 Process Requests by : Retrieving them directly from the specified
destination
 Use DialUp Entry for Primary Route : False
 Use DialUp Entry for Backup Route : False

 Search cache for : A valid version of the object, retrieve if necessary
 Cache Content : If source and request headers indicate to cache
 Redirect HTTP requests as : HTTP Requests
 Redirect SSL requests as : HTTP Requests
 Require SSL for Published Site : False

****************************************************************
LAT
****************************************************************
 Description : None
 From : 192.168.0.0
 To : 192.168.255.255

 Description : None
 From : 192.168.1.0
 To : 192.168.1.255

****************************************************************
LDT
****************************************************************
 Description : None
 Local Domain : *.bahrain.msft

 Description : None
 Local Domain : *.isa.bahrain.msft

Regards 
Qusai

Other related posts: