Restart the Web Proxy service and the urlcache folder and it’s contents will be recreated (albeit empty)
After-math and clear ISA cache
Restart the Web Proxy service and the urlcache folder and it’s contents will be recreated (albeit empty)
大易网志
About ISA Server
To prevent an attacker from changing the MTU value, ISA Server 2004 disables path MTU (PMTU) discovery. This setting is documented in Microsoft security bulletin MS05-019. To see this bulletin, visit the following Microsoft Web site:
http://www.microsoft.com/technet/security/Bulletin/MS05-019.mspx
Notes
Firewall Client software uses a control channel for communication between the Firewall client and ISA Server (UDP or TCP port 1745). If a client application wants to connect to an external computer on TCP port 23 (i.e. telnet protocol) , the control channel is used to negotiate a new dynamic port for this specific traffic (after ISA rule verification, of course). After this negotiation, telnet traffic goes through the above negotiated port. Let’s call this the data connection.
Now, what happens to the control channel TCP connection? It is left open until one of the peers closes the data connection.
To leave the control channel open, the Firewall client has to periodically send a KeepAlive packet to ISA Server. This is done by the Firewall client every 10 minutes. If a device between the client and ISA Server has an idle connection timeout configured for less than 10 Minutes, then this device will force the closing of the control channel, with the result that ISA Server and the firewall client drop the data connection shortly thereafter (depending on the third party device timeout value).
To correct this behavior always ensure that the third party device has an idle timeout greater than 10 minutes.
Franck Heilmann
Escalation Engineer EMEA ISA team
Installation Difficulties
If you don’t get confirmation the Plug-in was not successfully installed or network problems prevented the confirmation applet from loading. To resolve these problems first visit the trouble shooting page at http://java.sun.com/j2se/1.4.1/jre/install-windows.html and confirm that your computer meets the stated minimum requirements. If your computer does meet the minimum requirements and you have followed the installation instructions as laid out in the troubleshooting guide, and you are still not receiving the confirmation screen then the problem may be network related. Network Related Difficulties Many companies use Microsoft’s ISA Server to provide access to the internet. This server has a user authentication scheme that is incompatible with the current version of the Java Plug-in. To confirm that this is the cause of the problem, follow these steps:
Support for electronic submission of tender responses over proxies supporting only NTLM authentication will be possible by mid-June. |
Source: https://www.lgtenderbox.com.au/faqs/browse.do, https://www.tenders.sa.gov.au/tenders/faqs/browse.do#59
Problem: ISA Server unexpectedly prompts users to input credentials.
Cause: If incorrect client credentials are cached on the client computer, clients making requests through ISA Server may be prompted for alternative credentials, even though the ISA Server COM property ReturnAuthRequiredIfAuthUserDenied is set to its default false value for outbound traffic.
Solution: Clear the cached credentials, as follows:
1. |
Click Start, and then click Run. |
2. |
In the Run dialog box, type control keymgr.dll. Then click OK. |
3. |
In the Stored User Names and Passwords dialog box, select the entry that you want to remove, and then click Remove. |
4. |
Click Close to close the Stored User Names and Passwords dialog box. |
5. |
Restart the client computer. |
For more information on the ReturnAuthRequiredIfAuthUserDenied COM property, see the ISA Server SDK documentation (http://msdn2.microsoft.com/en-us/library/ms826234.aspx).
Source: http://www.microsoft.com/technet/isa/2004/plan/ts_client_rules.mspx