- If you have a firewall in between, which usually would be advisable , you may have the option to do some kind of full http-tracing , as in the firewall logs or other (e.g.) , possibly including data traffic if your firewall permits this level of analysis . This then might provide more insights as to why ISE is doing this. (Well that was one step beyond the guessing-class ... (smile))
M.
-- Each morning when I wake up and look into the mirror I always say ' Why am I so brilliant ? '
When the mirror will then always repond to me with ' The only thing that exceeds your brilliance is your beauty! '