• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 684
  • Last Modified:

Allow iPhone Safara through Forefront with HTTP authorization

I am using Microsoft ForeFront TMG 2010 SP2 to access internet.

One of the rules looks lke this:
From: Local network
TO: Internet
Protocols: HTTP/HTTPS
Users: Authenticated users.
This rule is used to authorize users while accessing the web. (and have usernames in logs).

Is there a way to allow Safari browsers (e.g on iPhone) to access internet (HTTP) wile on WiFi? Safari is unable to authorize. Any ideas?
0
Ivica Vugrinec
Asked:
Ivica Vugrinec
1 Solution
 
Keith AlabasterEnterprise ArchitectCommented:
No one is seriously going to put such devices on their internal network - that would be lunacy.
Add another nic to the TMG box and let the internal wifi connect to that interface instead. Lets say you gave this a 192.168.100.0/24 address range.
Create a new network set in the TMG gui (for example wifi) for the ip addresses associated with the new network set.
In the new network set properties, add 192.168.100.0 - 192.168.100.255
Create http/httpsd access rule from wifi to external.
Create dns access rule from wifi to external
0
 
pwindellCommented:
Lunacy abounds at our place.   I have people that have bought "i-Stuff" and think they can run those things on our LAN.  When I tell them that Home-User "toys" don't work on a corporate LAN where authentication is required they think it is something that I arbitrarily decided on my own and "made it so",...they can't comprehend the fact that these devices just flat out are not capable.  Then inevitably I hear from them that they know of someone else's network allows them to work,...then how do I explain to them that the other people's network has dropped their security to let it happen and that it is a stupid thing to do?,...then they think I should be just as stupid with ours.  In their minds security is not something that protects them and keeps them safe,..it is just something that "gets in the way".


Anyway, GrdiRuda:

You have to allow anonymous outbound access for those to work. What Keith is describing is about the only way to do it safely,...but then,...just wait,...pretty soon the users with wireless nics in their machines will discover that they can connect thier machine to that same wireless device and get around your authentication,...so don't give anyone the WAP Key,...you can enter it into the "i-Stuff" yourself without letting them know what it was (assuming the "i-stuff" won't let them see it afterwards).
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Featured Post

Ultimate Tool Kit for Technology Solution Provider

Broken down into practical pointers and step-by-step instructions, the IT Service Excellence Tool Kit delivers expert advice for technology solution providers. Get your free copy now.

Tackle projects and never again get stuck behind a technical roadblock.
Join Now