Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

what rules are recommended for outgoing?

Posted on 2013-02-03
2
Medium Priority
?
517 Views
Last Modified: 2013-02-03
Hello.
i'm configuring my tmg I have two stages.

a) A server farm, nobody are accesing from inside, only are being accessed from Internet
.
b) An Office with TMG, Domain controller, Exchange, sharepoint and Remote Desktop. Here are computer inside that need use Internet. I want to protect the nor safe connections (troyans, spam, etc...)

I need to know:

a) the outgoing trafic for the servers as: time syncronization, DNS, RIP?? ...

b) the outgoing safe trafic for the inside computers.

I have ForeFront TMG 2010 and a zywall USG 100 in both stages.

Thanks
0
Comment
Question by:limmontreefree
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 51

Accepted Solution

by:
Keith Alabaster earned 2000 total points
ID: 38848645
Generally the only outbound are ntp, dns, http, https, smtp (or smtp/pop depending on your environment). Other local apps you may want to allow out are obviously only known to you....

Others you may need to consider could be tcp port 80 (as opposed to http protocol which uses tcp port 80 but is subject to the TMG http filter) and possibly ftp.

As always, it is down to the security profile applied by your company.

RIP? Not a chance - also as part of the basic setup you will have disabled netbios on the TMG external nic.

For the inbound to the published sites, allow nothing bar the services you want to be made acccessible.

Lastly, you will need to add access rules from the internal to localhost for remote admin etc. (Shown as terminal services in the protocols list within TMG).

Keith
0
 

Author Closing Comment

by:limmontreefree
ID: 38849010
Thanks a lot.
0

Featured Post

Concerto's Cloud Advisory Services

Want to avoid the missteps to gaining all the benefits of the cloud? Learn more about the different assessment options from our Cloud Advisory team.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Microsoft's ISA Server has been its pre-eminent security product for about a decade and is still regarded amongst the well-informed as one of the best software firewalls and application gateways ever released, by any manufacturer. ISA Server has bee…
Forefront Threat Management Gateway 2010 or FTMG comes with some very neat troubleshooting tools built-in when trying to identify what is actually happening behind the scenes within the product when traffic is passing through its interfaces. To the …
Have you created a query with information for a calendar? ... and then, abra-cadabra, the calendar is done?! I am going to show you how to make that happen. Visualize your data!  ... really see it To use the code to create a calendar from a q…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
Suggested Courses

671 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question