To work around this issue, use one of the following methods, as appropriate for your situation.
Method 1: Redirect HTTP to HTTPS
If you are running ISA Server 2006, you can use the new feature that is included with ISA Server 2006 to redirect HTTP to HTTPS. To do this, follow these steps:
- Click Start, point to Programs, point to Microsoft ISA Server, and then click ISA Server Management.
- Expand Microsoft Internet Security and Acceleration Server 2006, expand Server Name, and then click Firewall Policy.
Note For ISA Server 2006 Enterprise Edition, expand Microsoft Internet Security and Acceleration Server 2006, expand Arrays, expand Array Name, and then click Firewall Policy. - On the Toolbox tab, click Network Objects, expand Web Listeners, right-click the Web listener, and then click Properties.
- Select Enable HTTP connections on port, and then confirm that the listening port for HTTP is 80. Confirm that Enable SSL (HTTPS) connections on port is selected and is listening on port 443.
- Select Redirect all traffic from HTTP to HTTPS.
- Click OK, and then click Apply to save the changes and to update the configuration.
If you are running Microsoft Forefront Threat Management Gateway Medium Business Edition or Windows Essential Business Server 2008, you can use the same feature that was introduced with ISA Server 2006 to redirect HTTP to HTTPS. To do this, follow these steps:
- Click Start, click Programs, and then click Microsoft Forefront Threat Management Gateway, Medium Business Edition Management under Microsoft Forefront Threat Management Gateway, Medium Business Edition.
- Expand Microsoft Forefront Threat Management Gateway, Medium Business Edition, expand Arrays, expand Array Name, and then click Firewall Policy.
- On the Toolbox tab, click Network Objects, expand Web Listeners, right-click the Web listener, and then click Properties.
- Select Enable HTTP connections on port, and then confirm that the listening port for HTTP is 80.
- Confirm that Enable SSL (HTTPS) connections on port is selected and is listening on port 443.
- Select Redirect all traffic from HTTP to HTTPS.
- Click OK, and then click Apply to save the changes and to update the configuration.
Method 2: Add explicit mappings
Add explicit mappings to the link translation dictionary. These explicit mappings will avoid an endless loop that is created when ISA server, Microsoft Forefront Threat Management Gateway Medium Business Edition, or Windows Essential Business Server 2008 translates SSL requests to HTTP requests and redirects them to the Web server.
For example, add an explicit "do nothing" string mapping such as
https://www.contoso.com to
https://www.contoso.com. This "do nothing" mapping overrides the unwanted translation that causes the endless loop. To do this, follow these steps:
- Click Start, point to Programs, point to Microsoft ISA Server, and then click ISA Server Management.
- Expand Microsoft Internet Security and Acceleration Server 2006 or Microsoft Internet Security and Acceleration Server 2004, expand Server Name, and then click Firewall Policy.
- In the details pane, click the applicable Web publishing rule.
- On the Tasks tab, click Edit Selected Rule.
- On the Link Translation tab, click Configure, and then click Add.
- In the Replace this text box, type the explicit string that you want to add to the link translation dictionary. For example, type https://www.contoso.com.
- In the With this text box, type the same string that you added in step 6. For example, type https://www.contoso.com again.
Note When you type the same string in the Replace this text box and the With this text box, the ISA server does not translate SSL requests to HTTP requests for that string entry. - Click OK two times.
- Click Apply, and then click OK.
For Microsoft Forefront Threat Management Gateway Medium Business Edition or Windows Essential Business Server 2008, follow
these steps:
- Click Start, click Programs, and then click Microsoft Forefront Threat Management Gateway, Medium Business Edition Management under Microsoft Forefront Threat Management Gateway, Medium Business Edition.
- Expand Microsoft Forefront Threat Management Gateway, Medium Business Edition, expand Arrays, expand Array Name, and then click Firewall Policy.
- In the details pane, click the applicable Web publishing rule.
- On the Tasks tab, click Edit Selected Rule.
- On the Link Translation tab, click Configure, and then click Add.
- In the Replace this text box, type the explicit string that you want to add to the link translation dictionary. For example, type https://www.contoso.com.
- In the With this text box, type the same string that you added in step 6. For example, type https://www.contoso.com again.
Note When you type the same string in the Replace this text box and the With this text box, the FTMG or WEBS 2008 server does not translate SSL requests to HTTP requests for that string entry.
- Click OK two times.
-
Click Apply, and then click OK.