Solved

what rules are recommended for outgoing?

Posted on 2013-02-03
2
489 Views
Last Modified: 2013-02-03
Hello.
i'm configuring my tmg I have two stages.

a) A server farm, nobody are accesing from inside, only are being accessed from Internet
.
b) An Office with TMG, Domain controller, Exchange, sharepoint and Remote Desktop. Here are computer inside that need use Internet. I want to protect the nor safe connections (troyans, spam, etc...)

I need to know:

a) the outgoing trafic for the servers as: time syncronization, DNS, RIP?? ...

b) the outgoing safe trafic for the inside computers.

I have ForeFront TMG 2010 and a zywall USG 100 in both stages.

Thanks
0
Comment
Question by:limmontreefree
2 Comments
 
LVL 51

Accepted Solution

by:
Keith Alabaster earned 500 total points
ID: 38848645
Generally the only outbound are ntp, dns, http, https, smtp (or smtp/pop depending on your environment). Other local apps you may want to allow out are obviously only known to you....

Others you may need to consider could be tcp port 80 (as opposed to http protocol which uses tcp port 80 but is subject to the TMG http filter) and possibly ftp.

As always, it is down to the security profile applied by your company.

RIP? Not a chance - also as part of the basic setup you will have disabled netbios on the TMG external nic.

For the inbound to the published sites, allow nothing bar the services you want to be made acccessible.

Lastly, you will need to add access rules from the internal to localhost for remote admin etc. (Shown as terminal services in the protocols list within TMG).

Keith
0
 

Author Closing Comment

by:limmontreefree
ID: 38849010
Thanks a lot.
0

Featured Post

Live: Real-Time Solutions, Start Here

Receive instant 1:1 support from technology experts, using our real-time conversation and whiteboard interface. Your first 5 minutes are always free.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I have been asked to explain on many, many occasions the correct way to setup network cards and DNS settings on ISA Server 2004, 2006 and forefront Threat management gateway (FTMG) and have willing done so. I have also promised my self everytime tha…
Forefront Threat Management Gateway 2010 or FTMG comes with some very neat troubleshooting tools built-in when trying to identify what is actually happening behind the scenes within the product when traffic is passing through its interfaces. To the …
This Micro Tutorial demonstrates using Microsoft Excel pivot tables, how to reverse engineer competitors' marketing strategies through backlinks.
A short tutorial showing how to set up an email signature in Outlook on the Web (previously known as OWA). For free email signatures designs, visit https://www.mail-signatures.com/articles/signature-templates/?sts=6651 If you want to manage em…

786 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question