Solved

TMG 2010

Posted on 2010-09-03
3
539 Views
Last Modified: 2012-05-10
I have never seen TMG 2010 until earlier this week.  I want to use the TMG to provide two form
authentication usinig RSA.  I installed TMG on a test machine configured with 2 NICs.  I found an
installation guide detailing how to do this by creating a web publishing rule.  

After configuring the TMG and OWA per the guide I cannot get the two form authentication
screen for OWA.  The web page times out.  When I run the traffic simulator on TMG using an IP
that is external the result is Access Denied.  When I look at the diagnostic there is a message that
says the web publishing rule is being skipped.  Is this a normal message for the traffic
simulator and I am wasting my time trying to fix it, or is there something in the TMG setup that I
need to do.  The guide I am using is titled 'Publishing Exchange OWA with Microsoft TMG..'
0
Comment
Question by:mikesells
  • 2
3 Comments
 
LVL 10

Accepted Solution

by:
simonlimon earned 500 total points
ID: 33604424
Where are you accessing the website from? The tmg machine or a remote client?

Try monitoring the session from the tmg console logs andreports -> logging tab

As for traffic simulator i prefer to use the session monitoring as traffic simulator does not tell you about the networking rules problems.
0
 
LVL 10

Assisted Solution

by:simonlimon
simonlimon earned 500 total points
ID: 33650232
CAn you first try using Forms authentication with Windows Authentication. MAybe you have some RSA problems.
0
 

Author Comment

by:mikesells
ID: 33717948
I got the TMG rules configured correctly to work with RSA and Exchange 2010.  When I have my 'mail' address pointed to the TMG, OWA with RSA does work correctly.  However I did observe that when I run the Traffic Simulator, I get a Traffic Denied response even though it appears to work with Web Access.
0

Featured Post

Three Reasons Why Backup is Strategic

Backup is strategic to your business because your data is strategic to your business. Without backup, your business will fail. This white paper explains why it is vital for you to design and immediately execute a backup strategy to protect 100 percent of your data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Common practice undertaken by most system administrators is to document the configurations and final solutions of anything performed by them for their future use and reference. So here I am going to explain how to export ISA Server 2004 Firewall pol…
A procedure for exporting installed hotfix details of remote computers using powershell
This tutorial will walk an individual through locating and launching the BEUtility application and how to execute it on the appropriate database. Log onto the server running the Backup Exec database. In a larger environment, this would generally be …
This tutorial will walk an individual through configuring a drive on a Windows Server 2008 to perform shadow copies in order to quickly recover deleted files and folders. Click on Start and then select Computer to view the available drives on the se…

726 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question