Solved

TMG 2010 Configure

Posted on 2012-03-28
2
451 Views
Last Modified: 2012-04-02
Dear All,

Good Day,

i am new to TMG 2010, i am installing TMG 2010 Stranded Edition, whiling installing its asking me to configure Network Setting there are 4 option to choose
•      Edge Firewall
•      3-Leg Perimeter      (Option Disabled)
•      Back Firewall
•      Single Network Adapter

Could you please tell me which one I can choose.

In our Org we have Domain(OS 2003), Exchange (planning to install 2010) & CRM 2011, Via old ISA 2004 we are access outlook from anywhere (OWA & OMA) and CRM also. Could you please guide which option I can choose in TMG 2010 and that should help outlook & CMR to access from anywhere.

Thanks
Kumar
0
Comment
Question by:Ram Kumar Chellam
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 40

Accepted Solution

by:
als315 earned 250 total points
ID: 37775463
Normally TMG is installed as Edge Firewall. There are schemas in master, you can compare your network configuration with proposed variants.
0
 
LVL 23

Assisted Solution

by:Suliman Abu Kharroub
Suliman Abu Kharroub earned 250 total points
ID: 37776128
If you need to take the benifits of the the TMG firewall, then using edge topology is a must.
0

Featured Post

Free Tool: Port Scanner

Check which ports are open to the outside world. Helps make sure that your firewall rules are working as intended.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

ISA Server detected routes through the network adapter LAN that do not correlate with the network to which this network adapter belongs What does this mean and how can one go about correcting it? In simple terms, this error message indicates t…
Forefront Threat Management Gateway 2010 or FTMG comes with some very neat troubleshooting tools built-in when trying to identify what is actually happening behind the scenes within the product when traffic is passing through its interfaces. To the …
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
This is my first video review of Microsoft Bookings, I will be doing a part two with a bit more information, but wanted to get this out to you folks.

724 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question