Solved

Can I configure the port 443 in diferent ways for each rules in TMG 2010?

Posted on 2013-01-15
2
427 Views
Last Modified: 2013-01-16
Hello I want to use the port 443 in diferent way in same rules.

In some rule I want to authenticate with html form for validate user to access to sharepoint for example. But in other rules like Outlook Anywhere and ActiveSync I need use the 443 port without authentication.


The problem is that I want to restrict the access to the sharepoint  from outside and actually I do it using another port i.e. 444  authenticating users in teh TMG with html form.

I'm trying to simplify the url removing the port.

actually          https://intranet.myweb.com:444
I  want           http://intranet.myweb.com

Thanks
0
Comment
Question by:limmontreefree
2 Comments
 
LVL 16

Accepted Solution

by:
PaciB earned 500 total points
ID: 38781875
Hi,

I'm not sure about Sharepoint publishing  but as it works for OWA publishing it should work also.

You can publish OWA with form-based authentication, ActiveSync and OutlookAnywhere with standard authentication, using the same listening port configured for Form-based authentication.
In fact, TMG is able to identify the type of Web client and use the correct authentication method.
For web browsers (IE, Chrome, etc...) the listening port will use the type of authentication that is configured on the listening port, let's say Form-Based.
For other type of clients (mobile phone ActiveSync client, OutlookAnywhere) the TMG listening port will use basic authentication even if the listening port is configured for Form-Based.

But, in all cases it must be authenticated.
So what you ask for (form-based authentication for sharepoint and NO authentication for others) is not possible with only ONE ip address and ONE ip port.

Have a good day.
0
 

Author Closing Comment

by:limmontreefree
ID: 38785073
Thanks
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
internal dns requests through isa 2004 6 701
Forefront TMG URL mapping for internal website pages 3 197
RDP to TMG Firewall 6 288
Block access to Facebook using TMG 2010 1 234
I have been asked to explain on many, many occasions the correct way to setup network cards and DNS settings on ISA Server 2004, 2006 and forefront Threat management gateway (FTMG) and have willing done so. I have also promised my self everytime tha…
In Africa (and potentially where you live…), reliability of ISPs is questionable.  With the increased reliance on e-mail as one of the primary forms of communication, the costs to business are significant based on interuption of ISP Connectivity.  T…
This is used to tweak the memory usage for your computer, it is used for servers more so than workstations but just be careful editing registry settings as it may cause irreversible results. I hold no responsibility for anything you do to the regist…
Both in life and business – not all partnerships are created equal. As the demand for cloud services increases, so do the number of self-proclaimed cloud partners. Asking the right questions up front in the partnership, will enable both parties …

911 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now