replace proxy ISA server with PA500?

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Announcements

replace proxy ISA server with PA500?

L3 Networker

Can I replace MS ISA server with PA500 like proxy, is that recommended and what is the benefit of kind implementation?

1 accepted solution

Accepted Solutions

L0 Member

I replaced an ISA server with a 2020 box and it works good.

A key benefit is you have a lot more control and visability with the Palo than the ISA server.

I have even moved my exchange ssl cert to the Palo box from ISA.

The Palo will provide application aware protection for your network.

D

View solution in original post

4 REPLIES 4

L0 Member

I replaced an ISA server with a 2020 box and it works good.

A key benefit is you have a lot more control and visability with the Palo than the ISA server.

I have even moved my exchange ssl cert to the Palo box from ISA.

The Palo will provide application aware protection for your network.

D

Hi Dallen,

I have more questions to clarify request of my customer.

They want to replace ISA server with PA in order to keep user settings of browsers, that's means that they want to keep authentication process and port 8080 in IE proxy settings and regularly connect through PA that now act proxy.

Is this scenario posibble or they need to give clients computers PA like gateway? 

I too was using the ISA as a proxy utilizing port 8080 through IE settings.

I put my Palo inline and made a default route to the interface I created. Then I just set the IE settings to none. There is an LDAP utility to handle the authentication process for the Palo.

I am sure you could keep your port 8080 settings but I cannot confirm for sure as I have not set it up that way.

Hope that helps...

Cyber Elite
Cyber Elite

The PaloAlto does not offer traditional proxy connectivity, so your IE settings would need to change.

The advantage of having a PaloAlto is having more visibility, control and safety on your user's internet connectivity since we offer URL categorisation, threat prevention (av, malware, vulnerabilities), user identification (transparant by polling AD login events and corelating these to IP addresses or via captive portal), application based rulebases and much more.

Tom Piens
PANgurus - Strata specialist; config reviews, policy optimization
  • 1 accepted solution
  • 3326 Views
  • 4 replies
  • 0 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!