Solved

Wich rules are needed to navigate a newly installed TMG 2010

Posted on 2011-09-08
7
323 Views
Last Modified: 2012-08-13
I installed a TMG 2010, I think the  network cards Ip is correct.

  What rules should I put

thanks
0
Comment
Question by:limmontreefree
  • 3
  • 3
7 Comments
 
LVL 51

Assisted Solution

by:Keith Alabaster
Keith Alabaster earned 50 total points
ID: 36509575
Anything that is appropriate and aligned to the agreed It security policy you are looking to implement.
0
 

Author Comment

by:limmontreefree
ID: 36509603
no security policy. It's a test environment from scratch.
From the host machine sailed perfectly.

Have I to route by hand something?

Thanks
0
 
LVL 29

Expert Comment

by:pwindell
ID: 36510642
It sounds like a cliche',...but,...read the documentation.  Even the built-in Help in the product gives pretty good documentation.  We are happy to help with specific questions about specific issues,...but we can't take you from "nothing" to "somewhere".  If you don't understand the concepts then you won't understand what we would be telling you anyway.   You said it is a test environment, therefore the purpose is to learn the product,...and that begins by reading.

Before wasting your time with rules,...read/learn about the 3 Client Types, how they work, why they are used, and when they are used,...then focus on the Rules and the different types of Rules and the "when, why, and where" of the Rules.
0
Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

 

Author Comment

by:limmontreefree
ID: 36511141
Hi, thanks for your answer.

You may be right on something, but I do not share much of what you say.

I can not master the tool, just trying to start testing,

I have read much of the documentation and I have that problem

 I've seen other TMG running with the rule " FROM  all networks, TO all networks, all protocols, all users " 

but I can't do TMG work

I have read several manuals but most tell you how well does the TMG many things, at the moment I do not care about.

But do not tell you what to do when something goes wrong.

I Just asking, in case, I'm missing something obvious rookie.

I do not want to disturb unnecessarily

 thank you very much everyone
0
 
LVL 29

Accepted Solution

by:
pwindell earned 450 total points
ID: 36511210
There is no way we can explain it better than the documentation.  If you don't understand the documentation then there is no way you would understand us.

It sounds like you have never tried reading the built-in Help Docs,...those were not written by marketing people, the were written to show how to use the product.

You can look at these too.  They are about ISA2006 and ISA2004,...but TMG operates the same way.

Internal Client Concepts in ISA Server 2006
http://technet.microsoft.com/en-us/library/bb794762.aspx

Understanding the ISA 2004 Access Rule Processing
http://www.isaserver.org/articles/ISA2004_AccessRules.html

http://technet.microsoft.com/en-us/library/cc302436(TechNet.10).aspx
      ISA2006
http://technet.microsoft.com/en-us/library/bb898433(TechNet.10).aspx

What is the ISA 2006 Firewall?
http://www.isaserver.org/articles/What-is-ISA-2006-Firewall.html 

0
 

Author Closing Comment

by:limmontreefree
ID: 36511284
my book is Microsoft Forefront Theat Management Gateway (TMG) Administrator's Companion.

 thank you very much to heart everbody
0
 
LVL 29

Expert Comment

by:pwindell
ID: 36511315
my book is Microsoft Forefront Theat Management Gateway (TMG) Administrator's Companion.

That was written by some friends of mine.  It should serve you well,...you just may have to go over it several times until you understand it.   ISA & TMG is a complex product.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
internal dns requests through isa 2004 6 700
tmg evaluation 10 542
How to remove PUP.Optional.MySearchDial A? 1 1,852
Spam Email 2 241
I have been asked to explain on many, many occasions the correct way to setup network cards and DNS settings on ISA Server 2004, 2006 and forefront Threat management gateway (FTMG) and have willing done so. I have also promised my self everytime tha…
Forefront is the brand name for Microsoft's major security product. Forefront covers a number of specific security areas and has 'swallowed' a number of applications under this umbrella including Antigen, ISA Server, the Integrated Access Gateway (t…
You have products, that come in variants and want to set different prices for them? Watch this micro tutorial that describes how to configure prices for Magento super attributes. Assigning simple products to configurable: We assigned simple products…
This is a video describing the growing solar energy use in Utah. This is a topic that greatly interests me and so I decided to produce a video about it.

930 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now