Solved

TMG 2010 Configure

Posted on 2012-03-28
2
449 Views
Last Modified: 2012-04-02
Dear All,

Good Day,

i am new to TMG 2010, i am installing TMG 2010 Stranded Edition, whiling installing its asking me to configure Network Setting there are 4 option to choose
•      Edge Firewall
•      3-Leg Perimeter      (Option Disabled)
•      Back Firewall
•      Single Network Adapter

Could you please tell me which one I can choose.

In our Org we have Domain(OS 2003), Exchange (planning to install 2010) & CRM 2011, Via old ISA 2004 we are access outlook from anywhere (OWA & OMA) and CRM also. Could you please guide which option I can choose in TMG 2010 and that should help outlook & CMR to access from anywhere.

Thanks
Kumar
0
Comment
Question by:Ram Kumar Chellam
2 Comments
 
LVL 40

Accepted Solution

by:
als315 earned 250 total points
ID: 37775463
Normally TMG is installed as Edge Firewall. There are schemas in master, you can compare your network configuration with proposed variants.
0
 
LVL 23

Assisted Solution

by:Suliman Abu Kharroub
Suliman Abu Kharroub earned 250 total points
ID: 37776128
If you need to take the benifits of the the TMG firewall, then using edge topology is a must.
0

Featured Post

Active Directory Webinar

We all know we need to protect and secure our privileges, but where to start? Join Experts Exchange and ManageEngine on Tuesday, April 11, 2017 10:00 AM PDT to learn how to track and secure privileged users in Active Directory.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

ISA Server detected routes through the network adapter LAN that do not correlate with the network to which this network adapter belongs What does this mean and how can one go about correcting it? In simple terms, this error message indicates t…
In Africa (and potentially where you live…), reliability of ISPs is questionable.  With the increased reliance on e-mail as one of the primary forms of communication, the costs to business are significant based on interuption of ISP Connectivity.  T…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

820 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question