Solved

ISA/proxy solution recommendations?

Posted on 2011-03-02
6
729 Views
Last Modified: 2013-11-05
Experts,

I've been tasked to research and find various proxy solutions, both server and appliances, and figure out the pro's and con's.
The only major requirements are that:
1) we would need to proxy owa thru the dmz
2) we would possibly also need to proxy internal websites (like sharepoint) as well
3) it would need to integrate with ActiveDirectory and smartcards, as all the applications in the dmz would require smart card for access

I'm not network engineer by any means (and i don't yet have strong knowledge on servers and network connections - I did more workstation related stuff prior), so I'm not sure where to start off. I initially looked at Forefront, but am confused as to which specific product would actually meet our needs, and I'm not exactly sure what other products are available that I could take a look at.

Can anyone provide me a good starting list of proxy solutions that I can take a look at?
And is there anything you'd recommend over the other?

Any kind of help at all would be really really helpful. Thanks!
0
Comment
Question by:ThinkPaper
6 Comments
 
LVL 38

Expert Comment

by:Justin Smith
Comment Utility
ISA has been rebranded into the Forefront group of products:  http://www.microsoft.com/forefront/threat-management-gateway/en/us/default.aspx

This sounds like a somewhat heavy project.  I'd advise you to seek professional, in person counsel.
0
 
LVL 38

Assisted Solution

by:Justin Smith
Justin Smith earned 166 total points
Comment Utility
Microsoft has another product called Universal Access Gateway, which differes a bit from Threat Management Gateway.  UAG handles more of the authentication methods.

http://www.microsoft.com/forefront/unified-access-gateway/en/us/default.aspx

Here is a good video:  http://technet.microsoft.com/en-us/edge/forefront-tmg-rtm-overview-interview.aspx
0
 
LVL 6

Accepted Solution

by:
sabby447 earned 167 total points
Comment Utility
Forefront Unified Access gateway is the best product in the market to meet your needs, If you still looking extra then look for Checkpoint or Cisco ASA firewall/proxy, Check this post to have clear understanding between TMG and UAG : http://derek858.blogspot.com/2009/05/isa-vs-tmg-vs-iag-vs-uag-are-you.html

I would advice to attach Forefront security for SharePoint too for inside protection for virus/spyware on Sharepoint server and database. let me know if you need implementation help and i will be glad to share my card

~Sabby

EDITED: Please do not include personal email addresses in your posts
Keith_Alabaster
EE Networking Zones Advisor
0
IT, Stop Being Called Into Every Meeting

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

 
LVL 2

Assisted Solution

by:LukeUS
LukeUS earned 167 total points
Comment Utility
I would say if you are using OWA and Sharepoint the Microsoft TMG/ISA is probably the easiest way to achieve your goal as these products are better  integrated with  OWA & Sharepoint,  you also have  the option to use smart cards.

Using other proxy devices might get "messy" if going for other options such as Bluecoat or Squid.

This link you might find useful: http://technet.microsoft.com/en-us/library/cc441642.aspx

I would advise as pointed out by ACH1LLES you are probably best to seek  professional help from a reseller/integrator as they will be able to look at your requirements and give you options and offer installation services if necessary.
0
 
LVL 16

Author Closing Comment

by:ThinkPaper
Comment Utility
Thanks for the info. I simply wanted a starting ground of what products I could look into. I will follow up with contacting the vendors themselves to see if and what products would meet our needs.
0
 
LVL 38

Expert Comment

by:Justin Smith
Comment Utility
You deffinately got a starting ground.....wondering why you sent a "B".
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

Utilizing an array to gracefully append to a list of EmailAddresses
Local Continuous Replication is a cost effective and quick way of backing up Exchange server data. The following article describes the steps required to configure Local Continuous Replication. Also, the article tells you how to restore from a backup…
To show how to create a transport rule in Exchange 2013. We show this process by using the Exchange Admin Center. Log into Exchange Admin Center.: First we need to log into the Exchange Admin Center. Navigate to the Mail Flow >> Rules tab.:  To cr…
The basic steps you have just learned will be implemented in this video. The basic steps are shown to configure an Exchange DAG in a live working Exchange Server Environment and manage the same (Exchange Server 2010 Software is used in a Windows Ser…

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now