Setting up the server
In this section |
|
Enabling the web listener | 15 |
Enabling the firewall client listener | 16 |
Creating an Internet access rule | 16 |
HP Virus Throttle | 17 |
Available verified | 18 |
Additional documentation available from HP | 19 |
Enabling the web listener
A web listener is software that accepts connections from web browsers on the LAN configured to use the ProLiant DL320 Security Server as a web proxy server. The web browser sends requests to connect to the Internet directly to the IP address on the ProLiant DL320 Security Server, listening for outbound web requests. Some advantages of configuring the web browser to use the ProLiant DL320 Security Server as a web proxy include:
•The client computer connecting to the server does not rely on its default gateway configuration to connect to the Internet. The client computer must only know the route to the internal IP address of the server.
•
•You can use RADIUS to authenticate web browsers connecting through the web proxy. Microsoft® implements RADIUS as part of its IAS servers, which is a service available on Microsoft® Windows Server™ 2003 and Microsoft® Windows® 2000 Server family products.
•You can configure:
•A connection
•A limit on the number of simultaneous connections
To enable and configure the web proxy listener:
1.In the scope pane of the ISA Server 2004 management console, expand your server name, expand the Configuration node, and then click the Networks node.
2.In the details pane on the Networks page, click the Networks tab.
3.In the list of networks,
4.In the Internal Properties dialog box, click the Web Proxy tab.
5.Select the Enable Web Proxy clients checkbox.
6.Select the Enable HTTP checkbox.
7.Verify that the default port number in the HTTP port text box is 8080.
8.Click the Authentication button.
9.In the Authentication dialog box, verify that the Integrated checkbox is selected.
10.Select the Basic checkbox.
11.Click Yes in the ISA Server Configuration dialog box warning you that passwords are transmitted in clear text when sent by means of basic authentication. Clear text communications can be captured
Setting up the server 15