Gopinath,

What does the rule look like? What rule drops/rejects
the traffic? Do you have a user defined? What is the
authentication method? Do you get rejected before or
after you press [Enter] for authentication?

You can see where I'm going with this...more info.

Robert

- -
Robert P. MacDonald, Network Engineer
e-Business Infrastructure
G o r d o n   F o o d    S e r v i c e
Voice: +1.616.261.7987 email: [EMAIL PROTECTED]

>>> "Gopinath Pulyankote" <[EMAIL PROTECTED]> 6/27/00 6:57:17 PM >>>
>
>Hi all,
>       Am trying to setup FW-1 as a reverse proxy. Followed the steps mentioned in
>phoneboy's site. But after creating the required rules & adding the http
>servers under Policy properties setup, I get the following error in the log:
>Reject "reason Not allowed by rulebase resource
>http://firewall:80/proxied-name 
>
>The web browser client prompts for authentication while attempting to access
>but always gets rejected, with the above lines in the log files.
>
>Can someone guide me through what I am missing here.
>
>Thanks in advance
>Gopinath




================================================================================
     To unsubscribe from this mailing list, please see the instructions at
               http://www.checkpoint.com/services/mailing.html
================================================================================

Reply via email to