Solved

TMG 2010 load balancing.

Posted on 2012-04-03
4
793 Views
Last Modified: 2012-04-04
Dear All,

I have TMG 2010 installed on two servers, I’m planning to configure a standalone array between them, then I want to configure NLB.

I want to ask, which is better, to configure the NLB through the TMG or through the Hardware Load Balancer?

I already have hardware load balancer in the site.

Thanks
0
Comment
Question by:ACS2012
  • 2
  • 2
4 Comments
 
LVL 6

Assisted Solution

by:emadallan
emadallan earned 500 total points
ID: 37803929
i think configuring TMG 2010 through Hardware Load Balancer is the best solution, it offer:
1. high perfomance comparing with soft NLB
2. real High Availability through allowing real failover and loag balancing
however keep in mind to make your HLB also high available by buying two appliances rather than one.
0
 
LVL 6

Accepted Solution

by:
emadallan earned 500 total points
ID: 37803977
however i forget to mention that TMG Firewall Client may have trouble when configuring TMG in NLB or HLB, for more info:
http://tmgblog.richardhicks.com/2010/07/09/load-balancing-and-forefront-tmg-firewall-clients/
good luck!
0
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 37804695
The obvious question is 'what are you load balancing?'

The internal nics to load balance the proxy and/or secure-NAT services or the external nics to load balance your internal services being accessed by your roaoming users or the general public? or both?
0
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 37805591
fair enough :)
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

There are three types of ISA client that can be configured - these can be individual clients or multiples of a client on each PC or server SecureNAT. A SecureNAT client for ISA server is a client machine, work station or server, that has its defa…
Forefront Threat Management Gateway 2010 or FTMG comes with some very neat troubleshooting tools built-in when trying to identify what is actually happening behind the scenes within the product when traffic is passing through its interfaces. To the …
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

708 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now