Solved

Microsoft Forefront TMG LONG DELAY when applying Firewall Policy

Posted on 2010-09-13
4
1,064 Views
Last Modified: 2013-12-04
This is a fresh install of MS Forefront TMG 2010 on a test lab and am experiencing a long delay after enabling or disabling firewall policies.  I have created an allow PING rule from the perimeter network to the local machine.  I can enable this policy and it takes 40 seconds before the client is able to ping successfully.  I disable the policy and it takes a whopping 1 minute and 40 seconds before the client's ability to ping is again blocked.

Is this delay normal for TMG?
0
Comment
Question by:CANI
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 

Accepted Solution

by:
CANI earned 0 total points
ID: 33683124
I found the solution here:

http://blogs.technet.com/b/isablog/archive/2010/07/18/synchronous-configuration-changes.aspx

Since we're using the enterprise version of TMG the system does not update itself immediately.  Rather, it queues the changes and they are applied automatically during the next update cycle.  You can check on the status of your current changes via Monitoring > Configuration tab.
0
 

Author Closing Comment

by:CANI
ID: 33683132
I found the answer myself.
0

Featured Post

What Is Transaction Monitoring and who needs it?

Synthetic Transaction Monitoring that you need for the day to day, which ensures your business website keeps running optimally, and that there is no downtime to impact your customer experience.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…

729 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question