TMG not allowing certain traffic from VPN

Hi,

This is my first EBS 2008 installation and my first time working with Forefront-TMG so please bear with me!

We have a number of users who use VPN to access their Outlook mailboxes. Whilst I am planning on moving them to direct connection (RPC / Outlook Anywhere etc) for the moment, it is convenient to continue like this.

I have setup rules etc as best I can and the VPN now appears to be mainly ok but I am noticing certain protocols & traffic are being blocked. I have checked the logs and from what I can tell, this traffic does not appear to be "named" as the user.

By this I mean when logging in to the VPN remotely I can ping hosts on this network, I can RDP, I can NetBIOS onto all the servers etc, but when I try and use outlook, TMG does not see my VPN username (when viewing in the log) and therefor the Outlook traffic hits the default rule and gets blocked.

I have attached both a text log of this and a screenshot as I'm finding it hard to explain! The log as the most info in and is best viewed with word wrap off, the screenshot just underlines what I'm trying to say.

I have setup the VPN to have the same addresses as the LAN and it gets these via DHCP so the IP address in these logs (192.168.0.90) is my home server connected via VPN. In the screenshot you can see all the allowed traffic in black with the domain & username listed but on the failed Outlook RPC packets it does not have the admin listed although it is still coming in via the VPN and is listed as the "VPN Clients" network (it has to be hitting via VPN or else it would not have an internal IP against it)

I am guessing I must have to add another rule or something but I am blowed if I can work out how to do this! In effect this traffic is internal to internal so I don't see how to add this.

Many thanks

Stephan
Academy Networks
Screenshot.jpg
log.txt
academynetworksAsked:
Who is Participating?
I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

academynetworksAuthor Commented:
Anyone? :)
0
academynetworksAuthor Commented:
Ok I worked it out. I believe I had to add an allow all outbound from VPN clients to internal for this to work. I already had an allow all outbound to external so I just added to this. Anyone know if this is considered safe?...

Allow > All Networks (and localhost) + VPN Clients > External & inbound.

I am guessing it's all outbound so is ok, but a confirmation would be great.
0

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today
Microsoft Forefront ISA Server

From novice to tech pro — start learning today.