Tech or Treat! Write an article about your scariest tech disaster to win gadgets!Learn more

x
?
Solved

Microsoft Forefront TMG LONG DELAY when applying Firewall Policy

Posted on 2010-09-13
4
Medium Priority
?
1,081 Views
Last Modified: 2013-12-04
This is a fresh install of MS Forefront TMG 2010 on a test lab and am experiencing a long delay after enabling or disabling firewall policies.  I have created an allow PING rule from the perimeter network to the local machine.  I can enable this policy and it takes 40 seconds before the client is able to ping successfully.  I disable the policy and it takes a whopping 1 minute and 40 seconds before the client's ability to ping is again blocked.

Is this delay normal for TMG?
0
Comment
Question by:CANI
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 

Accepted Solution

by:
CANI earned 0 total points
ID: 33683124
I found the solution here:

http://blogs.technet.com/b/isablog/archive/2010/07/18/synchronous-configuration-changes.aspx

Since we're using the enterprise version of TMG the system does not update itself immediately.  Rather, it queues the changes and they are applied automatically during the next update cycle.  You can check on the status of your current changes via Monitoring > Configuration tab.
0
 

Author Closing Comment

by:CANI
ID: 33683132
I found the answer myself.
0

Featured Post

Moving data to the cloud? Find out if you’re ready

Before moving to the cloud, it is important to carefully define your db needs, plan for the migration & understand prod. environment. This wp explains how to define what you need from a cloud provider, plan for the migration & what putting a cloud solution into practice entails.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

OfficeMate Freezes on login or does not load after login credentials are input.
How does someone stay on the right and legal side of the hacking world?
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
Suggested Courses

647 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question