?
Solved

Forefront TMG 2010 DR between two physical sites and two DMZs

Posted on 2011-03-01
7
Medium Priority
?
780 Views
Last Modified: 2012-06-27
Hi All

Looking at implemneting DR for Forefront TMG 2010 Enterprise. This needs to be between two physical sites (same domain) both of which the TMG will be located inside a separate DMZ - theat is 2 x sites, 1 x domain, 2 x DMZ.
I believe using EMS (1 at each site for DR purposes), can set up an Enterprise EMS with two separate arrays ? But how is the synchronization managed between the TMGs in different DMZs ?

Other option is use DNS round-robin. If so, would it be best to use two separate stand-alone TMGs and sync manually the policies/rules, or again, set up an EMS or stand-alone array ?

Confused and any help welcomed - especially if any articles on best practice in this scenario.

0
Comment
Question by:TheGeezer2010
  • 5
  • 2
7 Comments
 
LVL 29

Expert Comment

by:pwindell
ID: 35014787
If done with an Array that would require 5 nics in each TMG.  That can become a lot of complexity to try to deal with,...and Arryas can be a "handful" already to begin with.  I'm not saying it can't be done,...I'm saying that you need to consider the complexity of what monster you may create.
0
 
LVL 11

Author Comment

by:TheGeezer2010
ID: 35025058
Turns out cannot do an array as only have Standard version of TMG. I have manually exported/imported the rules, listeners and farms - these will not change at all due to the nature of the solution so manual process is acceptable. Will now test Round Robin DNS to see the effect on the iPhones. Will advise outcome.
0
 
LVL 11

Author Comment

by:TheGeezer2010
ID: 35096411
Testing round-robin tomorrow.
0
What does it mean to be "Always On"?

Is your cloud always on? With an Always On cloud you won't have to worry about downtime for maintenance or software application code updates, ensuring that your bottom line isn't affected.

 
LVL 11

Accepted Solution

by:
TheGeezer2010 earned 0 total points
ID: 35181480
Round robin works pretty much flawlessly. Some considerations if you DON'T join domain and install/configure TMG OUTSIDE of the DMZ.
When you join domain inside DMZ, it may appear to have joined the domain correctly, but the SPNs will not be registered in AD and therefore KERBEROS authentication will not work (and therefore neither will anything such as OWA publishing which requires authentication). This is because a random set of ports will be used for the RPC connections between the TMG box and the DC/GC (on W2008 these are restricted to 49152-65535 TCP). You will therefore need to reboot the TMG box with these ports OPENED on the external FW, then, once the SPNs are correctly registered (you will no longer get events 5788/9), re-close the ports on the external FW.
I am going to close this with no points awarded as worked this out myself.

Thank you to those who did respond.
0
 
LVL 11

Author Comment

by:TheGeezer2010
ID: 35190629
Final issue was that users with iPhones IOS between 4.21 and 4.24 were getting prompted for cert when connecting to other TMG. This is because Apple changed to using per host authentication instead of per cert. Resolved this by upgrading to latest version of IOS which uses per cert.
0
 
LVL 29

Expert Comment

by:pwindell
ID: 35191631
Ok.
Very good.
0
 
LVL 11

Author Closing Comment

by:TheGeezer2010
ID: 35221163
Self-resolved
0

Featured Post

Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

ISA Server detected routes through the network adapter LAN that do not correlate with the network to which this network adapter belongs What does this mean and how can one go about correcting it? In simple terms, this error message indicates t…
Forefront Threat Management Gateway 2010 or FTMG comes with some very neat troubleshooting tools built-in when trying to identify what is actually happening behind the scenes within the product when traffic is passing through its interfaces. To the …
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…
Suggested Courses

862 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question