sir/mam can anyone help me with my problem i have installed isa 2006 and i am only new with its access rules. my problem is that i want to make my torrent program works for downloading important files. pls can anyone help me to configure my rules in a simple manner thanks in advance
Typically, when you open the .torrent file in your bittorrent client, this client will connect to the tracker to download a list of peers(seeds and leechers). A HTTP GET request to the port the tracker is listening to will be issued by the client. For example if I want to download Vyatta using bittorrent, their tracker uses 6969 if I remember correctly.
If you configure your bittorrent client to use ISA as a proxy, likely you are going to nail it, as after the client download the list of peers, the client will issue CONNECT requests to the remote peers on the ports on which they listen, typically higher TCP ports. ISA only allows such requests to port 443(per draft).
Also, in your bittorrent client you can configure a port for incoming connections. If you want to allow this, you need to forward this port to your machine(using server publishing rules), TCP and UDP(if you want to use DHT).
As outbound rule, your best bet is to create an allow all access rule for your bittorrent client machine, as it's hard to know in advance what ports the remote peers use(as said before higher TCP and UDP(if DHT is used) ports. Once you figure how things work, you may "restrict" this rule(likely a big number of ports would still be needed).
It would be a good idea to isolate this machine on an ISA network. I'm not saying you are downloading warez, just this machine would be allowed to connect quite unrestricted to the Internet, so it would be good to isolate it.
If you want to download the .torrent file from a web server, make sure, in case you configured some allowed content types, that application/x-bittorrent is allowed.
Right click Protocol Definitions and enter a name for the protocol def, then enter the Port and protocol information
The protocol definitions you create are then used with the protocol rules to allow or deny clients using these protocols. To check to verify that your protocol rule is set to allow the new definition, display the properties of your protocol rule, click the protocol tab and verify that the rule applies to "all ip traffic". All IP traffic is defined as all the protocols you've defined under Policy elements, protocol definitions.