Nice article by Chris Blankenship on how duplicate addresses on the network horked his hork mode firewall. Hey Chris! Great job in finding out the solution to the problem, but you need to get that ISA firewall fixed and bag the hork mode. The firewall is more secure than any other firewall on market today, so why caponize it by deploying in hork mode?
Check out Chris' article at:
Thomas W Shinder, M.D., MCSE
Sr. Consultant / Technical Writer
Prowess Consulting www.prowessconsulting.com
PROWESS CONSULTING documentation | integration | virtualization
Email: [email protected]
MVP — Forefront Edge Security (ISA/TMG/IAG)