ISA Server的自动发现功能

Automatic Discovery for Firewall and Web Proxy Clients

Published: June 28, 2004
On This Page
Overview
Concepts and Procedures

Overview

Microsoft Internet Security and Acceleration (ISA) Server 2004 supports automatic discovery to allow Firewall clients and Web Proxy clients to automatically locate an ISA Server computer to use for client requests.

ISA Server uses the Web Proxy Automatic Discovery (WPAD) protocol, which allows automatic discovery of Web Proxy servers. ISA Server uses WPAD to provide a mechanism for clients to locate a WPAD entry containing a URL that points to a server on which the Wpad.dat and Wspad.dat files are generated. The Wpad.dat file is a Java script. file containing a default URL template, constructed by Internet Explorer. The Wpad.dat file is used by Web Proxy clients for automatic discovery information. The ISA Server WinSock Proxy Autodetect (WSPAD) implementation uses the Wpad.dat file, and creates a Wspad.dat file to provide automatic discovery information to Firewall clients. For more information about the WPAD protocol, see the Web Proxy Auto-Discovery Protocol document.

Concepts and Procedures

This section includes:

Configuring automatic discovery

Web Proxy clients

Firewall clients

Client support

Configuring WPAD entries

Configuring a WPAD server

References

Configuring Automatic Discovery

There are a number of configuration steps involved in setting up automatic discovery support for clients:

Configure Web Proxy clients and Firewall clients for automatic discovery.

Create WPAD entries containing a URL that points to a WPAD server on which the Wpad.dat and Wspad.dat files are located. You can create a WPAD entry in DNS, in DHCP, or in both.

Configure a WPAD server. The URL specified in the WPAD entry points to the WPAD server, which is the computer on which the WPAD and WSPAD files can be located. There are a number of possible configurations for the WPAD server:

In the simplest configuration, the WPAD server is located on the ISA Server computer that will service client requests.

Alternatively, the WPAD server might be located on a computer separate from the ISA Server computer.

If the ISA Server computer will act as the WPAD server, configure ISA Server to listen for automatic discovery requests, by publishing automatic discovery information on a specified port.

These configuration steps are outlined in detail in the sections that follow.

Web Proxy Clients

For Web Proxy clients, Internet Explorer uses the WPAD protocol to locate a WPAD entry in DHCP or DNS that contains the location of the Wpad.dat script. file. When found, Internet Explorer connects to the ISA Server computer specified in the Wpad.dat file for Web requests. Web browser clients make a call to http://wpad:port/wpad.dat, where port is the port listening for automatic discovery requests. For DNS entries, you must listen on port 80. DHCP can listen on any port. (By default ISA Server listens on port 8080). You can type this URL (specify the appropriate port) into the Web browser to view the proxy settings for the specified client, and a list of domain names configured for direct access.

In Internet Explorer, you can enable automatic discovery, or you can specify manually a proxy server that Web Proxy clients should use. On Firewall Client computers, you can configure the Web Proxy settings for the Firewall client in the Firewall Client dialog box.

If automatic discovery fails, Web Proxy clients can fall back on a SecureNAT configuration if the client computer has a suitably configured default gateway. Automatic discovery is supported for Internet Explorer 5 and later.

Enable Web Proxy Automatic Discovery in Internet Explorer

On Web Proxy client computers running Internet Explorer 5 or later, do the following.

1.

On the Tools menu, click Internet Options.

2.

Click the Connections tab.

3.

Click LAN Settings.

4.

Click to select the Automatically detect settings check box, and then click OK two times.

Enable Web Proxy Automatic Discovery on Firewall Client for ISA Server 2004 Computers

To enable Web Proxy automatic discovery on a Firewall client, do the following.

1.

In the Web Browser tab of the Microsoft Firewall Client for ISA Server 2004 dialog box, select Enable Web browser automatic configuration.

2.

To apply settings immediately, click Configure now.

Firewall Clients

To implement automatic discovery for Firewall clients, ISA Server uses the WPAD protocol to locate a WPAD entry in DHCP or DNS. If a Firewall Client computer has automatic discovery enabled, the following occurs:

1.

When the client makes a Winsock request, the client connects to the DNS or DHCP server.

2.

The WPAD entry URL returned to the client contains the address of a WPAD server (a server on which the Wpad.dat and Wspad.dat files are located).

3.

The client computer requests the automatic configuration information held in Wspad.dat, with a call to http://wpad:port/wspad.dat on the WPAD server, where port is the port listening for automatic discovery requests. For DNS entries, you must listen on port 80. DHCP can listen on any port. (By default ISA Server listens on port 8080). You can manually type this URL into the Firewall Client browser to check that Firewall Client settings on the ISA Server computer are displayed as expected.

4.

The ISA Server computer identified in the Wspad.dat file is then used to service Winsock connections for all applications on the client computer configured to use the Firewall Client.

In addition to configuring Firewall clients for automatic detection, the automatic discovery process can be initiated manually on Firewall Client computers, by clicking Detect Now in the Firewall Client properties dialog box. If automatic detection fails, Firewall clients can fall back on a SecureNAT configuration if the client computer has a suitably configured default gateway.

Enable Automatic Discovery for Firewall Clients in ISA Server 2004

To enable automatic discovery for Firewall clients for ISA Server 2004, do the following.

1.

In the console tree of ISA Server Management, click Configuration, and then click Networks.

2.

In the details pane, click the Networks tab.

3.

On the Tasks tab, click Edit Selected Network.

4.

On the Firewall Client tab, select Automatically detect settings, if the client computer should automatically attempt to find the ISA Server computer.

Enable Automatic Discovery for Firewall Clients in ISA Server 2000

To enable automatic discovery for Firewall clients for ISA Server 2000, do the following.

1.

In ISA Server Management, click the ISA Server computer name, and then click Client Configuration.

2.

In the details pane, right-click Firewall Client and then click Properties.

3.

On the General tab, select Enable automatic discovery in Firewall Clients.

Client Support

The following table summarizes automatic discovery support for Firewall and Web Proxy clients for various operating systems, such as Microsoft Windows Server„2003, Windows® XP, Windows 2000, Windows NT® Server 4.0, Windows Millennium Edition, Windows 98, and Windows 95.

Operating systemInternet Explorer 5 and laterFirewall Client 2000Firewall Client 2004

Windows Server 2003

All users

All users (DNS)

Admin users only (DHCP)

All users

Windows XP

All users

All users (DNS)

Admin users only (DHCP)

All users

Windows 2000

All users (DNS)

Admin users only (DHCP)

All users (DNS)

Admin users only (DHCP)

All users

Windows NT 4.0

All users

All users (DNS only)

All users (DNS only)

Windows Me

All users

All users

All users

Windows 98 (Second Edition)

All users

All users

All users

Windows 98

All users

All users

All users

Windows 95

All users

All users (DNS static only)

No Firewall Client support

Note
In ISA Server 2000, the following DHCP limitation applies: Web Proxy clients on computers running Windows 2000 can only use automatic discovery for users who are members of the Administrators or Power Users group. In Windows XP, the Network Configuration Operators group also has permission to issue DHCP queries. For more information, see article 307502, "Automatically Detect Settings Does Not Work if You Configure DHCP Option 252," in the Microsoft Knowledge Base.

Configuring WPAD Entries

You can create WPAD entries in DHCP, DNS, or both. There are advantages and disadvantages to both approaches:

To use DNS, ISA Server must publish automatic discovery information (listen for automatic discovery requests) on port 80. Using DHCP, you can specify any port. Note that by default the ISA Server computer listens on port 8080 for automatic discovery requests.

If clients are spread over multiple domains, you need to configure a DNS entry for each domain containing clients with automatic discovery enabled.

Clients enabled for automatic discovery must be able to directly access or query the DHCP server for option 252. Remote access and VPN clients cannot access the DHCP server to directly obtain option 252. If automatic discovery is configured using DHCP only, remote access clients will not be able to use this feature.

Generally, using DHCP servers with automatic detection works best for local area network (LAN)

来自 “ ITPUB博客 ” ,链接:http://blog.itpub.net/23034/viewspace-246610/,如需转载,请注明出处,否则将追究法律责任。

下一篇: 关于AD所用端口
user_pic_default.png
请登录后发表评论 登录
全部评论
<%=items[i].createtime%>

<%=items[i].content%>

<%if(items[i].items.items.length) { %>
<%for(var j=0;j
<%=items[i].items.items[j].createtime%> 回复

<%=items[i].items.items[j].username%>   回复   <%=items[i].items.items[j].tousername%><%=items[i].items.items[j].content%>

<%}%> <%if(items[i].items.total > 5) { %>
还有<%=items[i].items.total-5%>条评论 ) data-count=1 data-flag=true>点击查看
<%}%>
<%}%> <%}%>

转载于:http://blog.itpub.net/23034/viewspace-246610/

Python网络爬虫与推荐算法新闻推荐平台:网络爬虫:通过Python实现新浪新闻的爬取,可爬取新闻页面上的标题、文本、图片、视频链接(保留排版) 推荐算法:权重衰减+标签推荐+区域推荐+热点推荐.zip项目工程资源经过严格测试可直接运行成功且功能正常的情况才上传,可轻松复刻,拿到资料包后可轻松复现出一样的项目,本人系统开发经验充足(全领域),有任何使用问题欢迎随时与我联系,我会及时为您解惑,提供帮助。 【资源内容】:包含完整源码+工程文件+说明(如有)等。答辩评审平均分达到96分,放心下载使用!可轻松复现,设计报告也可借鉴此项目,该资源内项目代码都经过测试运行成功,功能ok的情况下才上传的。 【提供帮助】:有任何使用问题欢迎随时与我联系,我会及时解答解惑,提供帮助 【附带帮助】:若还需要相关开发工具、学习资料等,我会提供帮助,提供资料,鼓励学习进步 【项目价值】:可用在相关项目设计中,皆可应用在项目、毕业设计、课程设计、期末/期中/大作业、工程实训、大创等学科竞赛比赛、初期项目立项、学习/练手等方面,可借鉴此优质项目实现复刻,设计报告也可借鉴此项目,也可基于此项目来扩展开发出更多功能 下载后请首先打开README文件(如有),项目工程可直接复现复刻,如果基础还行,也可在此程序基础上进行修改,以实现其它功能。供开源学习/技术交流/学习参考,勿用于商业用途。质量优质,放心下载使用。
1、资源项目源码均已通过严格测试验证,保证能够正常运行; 2、项目问题、技术讨论,可以给博主私信或留言,博主看到后会第一时间与您进行沟通; 3、本项目比较适合计算机领域相关的毕业设计课题、课程作业等使用,尤其对于人工智能、计算机科学与技术等相关专业,更为适合; 4、下载使用后,可先查看README.md或论文文件(如有),本项目仅用作交流学习参考,请切勿用于商业用途。 5、资源来自互联网采集,如有侵权,私聊博主删除。 6、可私信博主看论文后选择购买源代码。 1、资源项目源码均已通过严格测试验证,保证能够正常运行; 2、项目问题、技术讨论,可以给博主私信或留言,博主看到后会第一时间与您进行沟通; 3、本项目比较适合计算机领域相关的毕业设计课题、课程作业等使用,尤其对于人工智能、计算机科学与技术等相关专业,更为适合; 4、下载使用后,可先查看README.md或论文文件(如有),本项目仅用作交流学习参考,请切勿用于商业用途。 5、资源来自互联网采集,如有侵权,私聊博主删除。 6、可私信博主看论文后选择购买源代码。 1、资源项目源码均已通过严格测试验证,保证能够正常运行; 2、项目问题、技术讨论,可以给博主私信或留言,博主看到后会第一时间与您进行沟通; 3、本项目比较适合计算机领域相关的毕业设计课题、课程作业等使用,尤其对于人工智能、计算机科学与技术等相关专业,更为适合; 4、下载使用后,可先查看README.md或论文文件(如有),本项目仅用作交流学习参考,请切勿用于商业用途。 5、资源来自互联网采集,如有侵权,私聊博主删除。 6、可私信博主看论文后选择购买源代码。
1、资源项目源码均已通过严格测试验证,保证能够正常运行; 2、项目问题、技术讨论,可以给博主私信或留言,博主看到后会第一时间与您进行沟通; 3、本项目比较适合计算机领域相关的毕业设计课题、课程作业等使用,尤其对于人工智能、计算机科学与技术等相关专业,更为适合; 4、下载使用后,可先查看README.md或论文文件(如有),本项目仅用作交流学习参考,请切勿用于商业用途。 5、资源来自互联网采集,如有侵权,私聊博主删除。 6、可私信博主看论文后选择购买源代码。 1、资源项目源码均已通过严格测试验证,保证能够正常运行; 2、项目问题、技术讨论,可以给博主私信或留言,博主看到后会第一时间与您进行沟通; 3、本项目比较适合计算机领域相关的毕业设计课题、课程作业等使用,尤其对于人工智能、计算机科学与技术等相关专业,更为适合; 4、下载使用后,可先查看README.md或论文文件(如有),本项目仅用作交流学习参考,请切勿用于商业用途。 5、资源来自互联网采集,如有侵权,私聊博主删除。 6、可私信博主看论文后选择购买源代码。 1、资源项目源码均已通过严格测试验证,保证能够正常运行; 2、项目问题、技术讨论,可以给博主私信或留言,博主看到后会第一时间与您进行沟通; 3、本项目比较适合计算机领域相关的毕业设计课题、课程作业等使用,尤其对于人工智能、计算机科学与技术等相关专业,更为适合; 4、下载使用后,可先查看README.md或论文文件(如有),本项目仅用作交流学习参考,请切勿用于商业用途。 5、资源来自互联网采集,如有侵权,私聊博主删除。 6、可私信博主看论文后选择购买源代码。
各种安全相关思维导图整理收集。渗透步骤,web安全,CTF,业务安全,人工智能,区块链安全,数据安全,安全开发,无线安全,社会工程学,二进制安全,移动安全,红蓝对抗,运维安全,风控安全,linux安全.zip项目工程资源经过严格测试可直接运行成功且功能正常的情况才上传,可轻松复刻,拿到资料包后可轻松复现出一样的项目,本人系统开发经验充足(全领域),有任何使用问题欢迎随时与我联系,我会及时为您解惑,提供帮助。 【资源内容】:包含完整源码+工程文件+说明(如有)等。答辩评审平均分达到96分,放心下载使用!可轻松复现,设计报告也可借鉴此项目,该资源内项目代码都经过测试运行成功,功能ok的情况下才上传的。 【提供帮助】:有任何使用问题欢迎随时与我联系,我会及时解答解惑,提供帮助 【附带帮助】:若还需要相关开发工具、学习资料等,我会提供帮助,提供资料,鼓励学习进步 【项目价值】:可用在相关项目设计中,皆可应用在项目、毕业设计、课程设计、期末/期中/大作业、工程实训、大创等学科竞赛比赛、初期项目立项、学习/练手等方面,可借鉴此优质项目实现复刻,设计报告也可借鉴此项目,也可基于此项目来扩展开发出更多功能 下载后请首先打开README文件(如有),项目工程可直接复现复刻,如果基础还行,也可在此程序基础上进行修改,以实现其它功能。供开源学习/技术交流/学习参考,勿用于商业用途。质量优质,放心下载使用。
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值