How to setup rexec with forefront TMG

Hi,

We are implementing a solution where we are placing a forefront TMG machine between our clients
and our server and the clients are on a separate VLAN.

Now we are experiencing problems when the clients try doing a Rexec against our server and we believe
it has something to do with the fact that Rexec starts on port 512 but later on switches communication
to the stderr port and when this happens our server don't get a correct SYN ACK back from the client and
eventually the server times out the connection since no SYN ACK has reached the server.

Have anybody implemented a solution with forefront TMG and rexec that knows something about this?
IT-VASAsked:
Who is Participating?

Improve company productivity with a Business Account.Sign Up

x
 
IT-VASConnect With a Mentor Author Commented:
Hi,

We have solved the issue ourselves by changing traffic from the client to instead use Stdout port for Rexec communication.
Then there is no need to set up specific rules since everything is using port 512.

Br,
Johan
0
 
Suliman Abu KharroubIT Consultant Commented:
I hadn't implement that solution before, but hope the below will help:

You can define a new protocol using a primary port and secondary port from the new protocol wizard.

then add this protocol to that access rule.
0
 
IT-VASAuthor Commented:
Hi,

Thank you for the answer. We have thought of that solution, but the trouble is that the rexec protocol seems to choose
different stderr ports every timy in the range from 1024 and above so we don't know how to solve it without opening
a lot of ports in the forefront TMG.

It seems very hard to find material related to Rexec through firewall.

Br,
Johan
0
Free Tool: ZipGrep

ZipGrep is a utility that can list and search zip (.war, .ear, .jar, etc) archives for text patterns, without the need to extract the archive's contents.

One of a set of tools we're offering as a way to say thank you for being a part of the community.

 
Suliman Abu KharroubIT Consultant Commented:
emmmmmm,

you can reduce the risk by opening these ports only to a specific host no to all external.

create a new computer object with the server ip address, and create an access rule from internal to that computer.

If that is not an option for, the application documents should advice which ports are required to make it work correctly.
0
 
IT-VASAuthor Commented:
Hi again,

We have tried both suggestions, but with no success.

Forefront says Unidentified IP-trafic (TCP:512) Connection Established with result SUCCESS
But after that there is no more information in the logging and still no connection between client and server.

Br,
Johan
0
 
pwindellCommented:
I think you are seeing why it is just plain a bad idea to put a firewall between the Clients and their LAN Resources.   Firewalls are to protect the LAN from outside networks,...you should not be sticking them in the middle of the private LAN.  the fact that the users are a different subnet in this case is a given and the fact that the subnet (segment) was created by VLANing doesn't really matter.

Many applications that are designed to operate within a private LAN use protocols that are too complex to run over a firewall unless the Firewall has an Application Layer Filter to interpret and process the protocol's traffic pattern,...and there is no way you are going to come up with an Application Filter for a custom application such as this.
0
 
IT-VASAuthor Commented:
Not the perfect solution, but it only requires minor change in the clients to make it work.
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

All Courses

From novice to tech pro — start learning today.