Такой вопрос, прокомментировать, что делает правило из предидущего поста, можно?
Я не понимаю, оно почему РАЗРЕШАЕТ
сигнатуры прог?
Создаем, из локалки во внешку, и конфигурируем сигнатуры в заголовках приложения.
Вроде простое правило, а его логика мне не ясна.
(оно
разрешает ходить в инет приложению с сигнатурой такой-то. И что?
У меня после применения правила сайты не оборзеваются никде
пришлось отменить)...
заколотил его наверх, снизу стоит обычное правило
разрешить ХТТП, ХТТПС изнутри вовне - шоб все ходили в тырнет и радовались.
МСН мессенджер все равно работает.
И второй способ тоже не канает
[more=простыня]Method 1: Create a new access rule and configure an HTTP policy rule that blocks MSN Messenger traffic and Windows Live Messenger traffic
Create the new access rule
1. Log on to the computer that is running ISA Server 2004 or ISA Server 2006 by using an account that has administrative permissions.
2. Click Start, point to All Programs, point to Microsoft ISA Server, and then click ISA Server Management.
3. In the left pane of the ISA Server Management console, expand ServerName.
Notes
* ServerName is a placeholder for the name of the computer that is running ISA Server.
* If you are running ISA Server 2004 Enterprise Edition, expand Arrays in the left pane, and then expand ServerName.
4. Click Firewall Policy.
5. Click the Tasks tab in the task pane, and then click Create New Access Rule.
6. On the Welcome to the New Access Rule Wizard page, enter the name for the rule in the Access Rule name box, and then click Next.
7. On the Rule Action page, click Allow, and then click Next.
8. On the Protocols page, click Selected protocols in the This rule applies to list, and then click Add.
9. In the Add Protocols dialog box, expand Common Protocols.
10. Double-click the HTTP protocol and the HTTPS protocol, click Close, and then click Next.
11. On the Access Rule Sources page, click Add.
12. In the Add Network Entities dialog box, expand Networks.
13. Double-click Internal, click Close, and then click Next.
14. On the Access Rule Destinations page, click Add.
15. In the Add Network Entities dialog box, expand Networks.
16. Double-click External, click Close, and then click Next.
17. On the User Sets page, click All Users in the This rule applies to requests from the following user sets list, click Remove, and then click Add.
18. In the Add Users dialog box, double-click All Authenticated Users, click Close, and then click Next.
19. On the Completing the New Access Rule Wizard page, click Finish.
Configure the HTTP policy rule that blocks MSN Messenger traffic and Windows Live Messenger traffic
1. In the left pane of the ISA Server Management console, right-click the access rule that you created, and then click Configure HTTP.
2. In the Configure HTTP policy for rule dialog box, click the Signatures tab, and then click Add.
3. In the Signature dialog box, enter a name for the signature in the Name field.
4. In the Search in list, click Request headers.
5. In the HTTP header box, type User-Agent:.
6. To block MSN Messenger traffic, type MSN Messenger in the Signature box.
7. To block Windows Live Messenger traffic, type Windows Live Messenger in the Signature box.
8. Click OK, and then click OK again.
9. In the ISA Server Management console, click Apply.
[/more]