Solved

what rules are recommended for outgoing?

Posted on 2013-02-03
2
505 Views
Last Modified: 2013-02-03
Hello.
i'm configuring my tmg I have two stages.

a) A server farm, nobody are accesing from inside, only are being accessed from Internet
.
b) An Office with TMG, Domain controller, Exchange, sharepoint and Remote Desktop. Here are computer inside that need use Internet. I want to protect the nor safe connections (troyans, spam, etc...)

I need to know:

a) the outgoing trafic for the servers as: time syncronization, DNS, RIP?? ...

b) the outgoing safe trafic for the inside computers.

I have ForeFront TMG 2010 and a zywall USG 100 in both stages.

Thanks
0
Comment
Question by:limmontreefree
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 51

Accepted Solution

by:
Keith Alabaster earned 500 total points
ID: 38848645
Generally the only outbound are ntp, dns, http, https, smtp (or smtp/pop depending on your environment). Other local apps you may want to allow out are obviously only known to you....

Others you may need to consider could be tcp port 80 (as opposed to http protocol which uses tcp port 80 but is subject to the TMG http filter) and possibly ftp.

As always, it is down to the security profile applied by your company.

RIP? Not a chance - also as part of the basic setup you will have disabled netbios on the TMG external nic.

For the inbound to the published sites, allow nothing bar the services you want to be made acccessible.

Lastly, you will need to add access rules from the internal to localhost for remote admin etc. (Shown as terminal services in the protocols list within TMG).

Keith
0
 

Author Closing Comment

by:limmontreefree
ID: 38849010
Thanks a lot.
0

Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

In this tutorial I will show you with short command examples how to obtain a packet footprint of all traffic flowing thru your Juniper device running ScreenOS. I do not know the exact firmware requirement, but I think the fprofile command is availab…
Network traffic routing plays key role in your network, if you have single site with heavy browsing or multiple sites, replicating important application data from your Primary Default Gateway ,you have to route your other network traffic from your p…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
Finds all prime numbers in a range requested and places them in a public primes() array. I've demostrated a template size of 30 (2 * 3 * 5) but larger templates can be built such 210  (2 * 3 * 5 * 7) or 2310  (2 * 3 * 5 * 7 * 11). The larger templa…

740 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question