SlideShare a Scribd company logo
1 of 42
Introduzione a TMG 2010
Fabrizio Volpe
MVP Directory Services
fabrizio.volpe@gmx.com
Breve Storia della Perimeter Protection




           Proxy Server 1.0     Internet Security And Accelleration (ISA) 2000
           Proxy Server 2.0               Stateful Packet Inspection
                                             «Trusted Networks»




     ISA 2004
                                ISA 2006                Forefront Threat Management
 NO network traffic
                              Web Publishing                    Gateway 2010
  out of the box
Forefront Edge Security and Access Products
The Forefront Edge Security and Access products provide enhanced
network edge protection and application-centric, policy-based access to
corporate IT infrastructures

         Before                                           Now

                              Network
                             Protection
                                            Integrated and comprehensive
                                            protection from Internet-based threats




                              Network
                              Access
                                            Unified platform for all
                                            enterprise remote access needs
Forefront TMG ed UAG
 New features make Forefront TMG the ideal outbound access solution
 In contrast to ISA 2006, very little has been done in Forefront TMG in
 terms of improvements for inbound access control
 Exceptions :
    Secure Socket Tunneling Protocol (SSTP) for VPN client connections
    NAP Integration
 You will not see any other major changes in the Web or Server
 Publishing features when moving from ISA 2006 to Forefront TMG
 The majority of inbound access (remote access) effort is going into the
 Microsoft Forefront Unified Access Gateway (UAG) 2010
 It is expected that Forefront TMG will be used primarily for outbound
 access control and network firewall, and UAG will be used for inbound
 access (remote access) control



                                                                           4
Possibili Collocazioni nel Network Perimeter

                                       Back-end firewall behind
   Edge of the corporate network        another Forefront TMG
                                    firewall or third-party firewall


  As a parallel firewall on the      As a network service segment
     edge, next to another            firewall, providing a secure
 Forefront TMG or third-party      perimeter between client systems
            firewall                      and network services



          Multi-homed firewall that acts as the hub between
              multiple internal and perimeter networks




                                                                       5
Forefront TMG: caratteristiche
       Firewall – Control network policy access at the
       edge
                                                         Comprehensive
       Secure Web Gateway – Protect users from
       Web browsing threats

       Secure E-mail Relay – Protect users from
       e-mail threats                                     Integrated


       Remote Access Gateway – Enable users to
       remotely access corporate resources

       Intrusion Prevention – Protect desktops and
                                                          Simplified
       servers from intrusion attempts
Forefront TMG: Scenari di Implementazione

                       • All-in-one solution for medium businesses
  Unified Threat
                       • Firewall, VPN, Web security, IPS, e-mail relay
Management (UTM)         in a single box

                       • Authenticating proxy with security
    Secure Web
                       • Web antivirus and URL filtering
     Gateway           • Inspection of HTTP and HTTPS traffic

                       • Secure Web publishing
   Remote Access
                       • Dial-in VPN
     Gateway           • Site to site VPN

                       • Antispam
 Secure E-mail Relay   • Antivirus
                       • E-mail filtering
Forward, Reverse Proxy, Web Proxy, e Winsock
Proxy Server
                           • Application layer inspection
                           • For forward proxy connections, Web anti-
   Web proxy server          malware capabilities and URL filtering
 Reverse proxy services    • For reverse proxy SSL bridging
                           • For both HTTP protocol inspection

                           • Stateful packet and application layer inspection on
                             all traffic moving through the VPN
  Remote Access VPN        • User-based access controls (based on user name
       Server                or user group membership)
                           • Remote Access Quarantine Control and Network
                             Access Protection (NAP)


                          • Forefront TMG email gateway feature is powered by
                            the Edge Transport Server role of Exchange Server
 Secure E-mail Gateway      2010 together with Microsoft Forefront Protection
                            2010 for
Network Inspection System, Malware Inspection e
HTTPS Inspection
                       • Usa signatures of known vulnerabilities from the
  Network Inspection     Microsoft Malware Protection Center (MMPC) to
       System            help detect malicious traffic and then to take
                         action



                        • The Malware Inspection filter (Edge Malware
                          Protection) is a built-in Web filter
  Malware Inspection    • Delayed download, HTML progress page,
                          Trickling

                       • Forefront TMG introduces a new feature called
                         HTTPS inspection
                       • Is based on a trusted man-in-the-middle
   HTTPS Inspection      mechanism, in which Forefront TMG works as a
                         trusted man in the middle to be the SSL site for
                         the clientman in the middle to be the SSL site for
                         the client
Riepilogo delle funzionalità

• VoIP traversal         • HTTP antivirus/      • Exchange Edge         • Network
• Enhanced NAT             antispyware            integration             inspection
• ISP link               • URL filtering        • Antivirus               system
 redundancy              • HTTPS forward        • Antispam
                           inspection

                         Secure Web             E-mail                 Intrusion
Firewall                                                               Prevention
                         Access                 Protection



    • NAP integration          • Array management                 • Malware protection
      with client VPN          • Change tracking                  • URL filtering
    • SSTP integration         • Enhanced reporting               • Intrusion
                               • W2K8, native 64-bit                prevention

   Remote                    Deployment and                   Subscription
   Access                    Management                       Services
Riepilogo delle funzionalità
Confronto con ISA Server 2006              ISA Server
                                             2006
                                                        Forefront
                                                          TMG
  Network layer firewall                                 
  Application layer firewall                             
  Internet access protection (proxy)                     
  Basic OWA and SharePoint publishing                    
  Exchange publishing (RPC over HTTP)                    
  IPSec VPN (remote and site-to-site)                    
  Web caching, HTTP compression                          
  Windows Server® 2008 R2, 64-bit (only)                   New
  Web antivirus, antimalware                               New
  URL filtering                                            New
  E-mail antimalware, antispam                             New
  Network intrusion prevention                             New
  Enhanced UI, management, reporting                       New
Licenze
Two editions and Two Client Access Licenses (CALs)


                   Enterprise Edition
                Scalability and management


                              E

                   Standard Edition
                         Full UTM

                       Subscriptions

             Web protection       E-mail protection
Confronto tra le edizioni
                              Standard Edition              Enterprise Edition
Number of CPUs                  Up to 4 CPUs                     Unlimited

Array/NLB/CARP support                                              

Enterprise management                                 Yes, with added ability for EMS
                                                                to manage SEs

Publishing                                                          

VPN support                                                         

Forward proxy/cache,                                                
compression

Network IPS (NIS)                                                   

E-mail protection        Requires Microsoft® Exchange Server License (Server + CALs)
                                         and installation by the admin
Passaggio licenze da ISA 2006 a TMG 2010


    Today                                          At Launch

   ISA Server SE                              Forefront TMG 2010 SE


   ISA Server EE                              Forefront TMG 2010 EE


                   Covered by Software Assurance


        Available per user/device, per year   Forefront TMG 2010 EE
Installazione e configurazione iniziale
Requisiti di sistema
                             Minimum                                    Recommended
 Processor                   2 core (1 CPU x dual core)                 4 core (2 CPU x dual core or
                             64-bit processor                           1 CPU x quad core) 64-bit
                                                                        processor
 Memory                      2 gigabytes (GB) of memory                 4 gigabytes (GB) of memory

 Hard Disk Space             2.5 GB of available hard disk              2.5 GB of available hard disk
                             space*                                     space*

 Hard Disks                  One local hard disk partition              Two disks for system and logging,
                             formatted with NTFS                        and one for caching and malware
                                                                        inspection
 Network                     One network adapter for                    One network adapter for each
                             communicating with the                     network connected to the
                             internal network                           Forefront TMG 2010 server
 Operating System            Windows Server® 2008 x64 with Service Pack 2, or
                             Windows Server® 2008 R2

* Exclusive of the hard disk space used for caching and for storing temporary files

                                                                                                            16
Server Roles e Features richieste
                                Server roles and
                              features required by
                                                      Other software
                                 Forefront TMG
                                    include:

These server roles are                                                    Forefront TMG
installed during Forefront        Network Policy
                                                        Microsoft .NET    Preparation Tool
                                                        Framework 3.5
TMG installation; you do             Server
                                                             SP1
not need to install them in
advance
                                    Routing and
                                                        Windows Web
They are not removed if            Remote Access
                                                         Services API
                                      Service
you uninstall Forefront
TMG
                                  Active Directory
                                    Lightweight        Microsoft Update
                                 Directory Services                       Forefront TMG is not
                                                                          supported on a machine
                                                                          that is configured as a
                                   Network Load
                                                         Microsoft        domain controller, with
                                                      Windows Installer
                                    Balancing
                                                            4.5           the exception of a read-
                                                                          only domain controller,
                                                                          which requires that TMG
                                                                          Service Pack 1 be
                                     Windows
                                    PowerShell                            installed.


                                                                                                 17
Prerequisiti
  Basic installation
     Connected to the network, with DNS server settings configured
  For the Secure Mail Relay usage scenario
     Exchange Edge Transport Role
        Microsoft® Exchange Server 2007 with Service Pack 1, or
        Microsoft® Exchange Server 2010
     Microsoft® Forefront™ Protection 2010 for Exchange Server
Nota : Enterprise Management Server

   Both the Standard and Enterprise editions of Forefront TMG store
   their configurations in an Active Directory Lightweight Directories
   Services (AD LDS) database

   Standard Edition : the AD LDS database is always on the Forefront
   TMG firewall itself

   Enterprise Edition : option of installing the AD LDS configuration
   database on a firewall array member or on a separate computer.
   The separate computer hosting the AD LDS database is called the
   Enterprise Management Server (EMS)
Installazione




                20
Installazione




                21
Configurazione iniziale
Getting Started Wizard




                          22
Configurazione dei Network Settings
Network Setup (Template) Wizard
                                  Select the network
                                  topology used:
                                    Edge firewall
                                    3-Leg perimeter
                                    Back firewall
                                    Single network
                                    adapter




                                                       23
Configurazione dei Network Settings
Network Setup Wizard

                              Define the IP
                              configuration for
                              each network
                              adapter
                              Assign adapter to
                              the appropriate
                              network




                                                  24
Configurazione dei System Settings
System Configuration Wizard


                              Define host
                              name, domain
                              membership and
                              DNS suffix




                                               25
Configurazione dei Deployment Settings
Deployment Wizard
                            Activate subscription
                            licenses
                            Enable malware
                            protection and
                            intrusion prevention
                            Configure signature
                            update schedule and
                            response policy
                            Join the Customer
                            Experience
                            Improvement
                            Program (CEIP) and
                            the Microsoft
                            Telemetry Service

                                                    26
Configurazione dei Deployment Settings
Deployment Wizard




                                         27
Concetti base
Network Relationship

  TMG, defines a network as a logical representation of a network
  connection owned by the computer where TMG operates
   • These networks can be
     • a physical connection such as network interface card (NIC) or modem
     • a logical interface such as a dial-in or site-to-site VPN connection

  In each case, TMG must have a clear understanding of how to define
  and process the traffic that is received from a given network
   • The simplest definition for a network relationship is that relationship indicated by the
     source and destination hosts as defined in the traffic 5-tuple

  Note 5-tuple is an industry-standard standard term describing the
  criteria used to uniquely identify an Ip communication channel
   • This data includes:
     • n Source and destination IP addresses
     • n Source and destination ports (if used)
     • n Transport Protocol (TCP, UDP, and so on)


                                                                                                29
Configurazione
Network Rules

 Like firewall policy rules, network rules define how TMG will handle traffic between
 source and destination hosts



 Network rules are also processed in the order in which they are defined


 Because network rules form a primary criterion for traffic processing, they have
 Define allowed traffic flows the power to discard traffic before any firewall policy
 rule has the opportunity to evaluate it


 When this happens, the firewall log will not include a name in the rule field because
 no firewall policy rule processed the traffic


 As is the case with firewall policy rules, the order of network rules is critical to
 correct traffic evaluation by TMG


                                                                                         30
Configurazione
Network Rules



All network rule sets
will begin with the
same rule, Local Host
                                                                     Options presented for
Access, which defines
                                                                     a network rule source       No firewall policy
a route relationship
                                                                        and destination           elements which
for traffic that is
                                               When you run the      criteria are limited to   abstract the source or
sourced or
                                             Network Rule Wizard,     those items that are       destination into a
terminated by TMG        All network rules
                                                you are given the       defined as some            name (such as
itself                    operate in the
                                             opportunity to select   variation or grouping      domain or URL sets)
•This rule cannot be    context of network
                                              from a subset of the     of an IP address, IP       can be used for
 modified by the              objects
                                                  firewall policy      subnet, IP address          network rules
 TMG administrator                               network objects            range, or           because they cannot
                                                                        combinations of           represent literal
                                                                     these as in Computer      network membership
                                                                        or Network Sets




                                                                                                                    31
Configurazione
Network Adapters




  Forefront TMG supports unlimited network adapters
    Limited by hardware

                                                      32
Configurazione
Networks




  Networks configuration model the enterprise network
  infrastructure
    Contains all reachable IPs for network adapter
    Cannot overlap with other Networks
    Static or dynamic

                                                        33
Configurazione
Network Sets




  Network Sets are used to group one or more networks
     Defined by selecting the networks included in the set (Include) or a
     set of networks excluded from the set (Exclude)
     Used in the definition of network and policy rules


                                                                            34
Configurazione
Network Relationship
  Determine the relationship between two networks
     Route
       Bi-directional
       Source address not modified
     NAT
       Uni-directional
       Source address is modified
  Required for non-Web access and Server
  Publishing rules
     Web proxy filter ignores network rules



                                                    35
Configurazione
Network Rules




  New Feature: Enhanced NAT
    Specify the IP address to be used when doing NAT


                                                       36
Configurazione
Routing




  Display the routing table used between networks
    Set via route –p add command or GUI
                                                    37
Forefront TMG Policy
 Three types of rules:
  1. Network rules
  2. System policy
  3. Firewall policy




                         38
Installazione su server a singola scheda di rete
 Forefront TMG supports using a single network adapter
 Supported scenarios
    Secure Web Gateway (forward Web proxy and cache)
    Web Publishing (reverse Web proxy and cache)
    Remote client VPN access
 Unsupported scenarios
    Application layer inspection (except for Web proxy)
    Server publishing
    Non-Web clients
       Firewall client
       Secure NAT
    Site-to-site VPNs




                                                          39
Cosa Verificare in caso di Setup Failed
 During the installation process, TMG Setup stores information about each step that was performed in the %systemroot%temp folder


              The information in TMG Setup log files is based on Microsoft Windows Installer logging




  If you want to use the SMTP Protection feature on TMG, you need to install Microsoft Exchange Edge Transport Role and Forefront
                                                Protection 2010 for Exchange Server

 The log files for the Exchange component of the installation are stored at %systemdrive%ExchangeSetupLogs




  Forefront Protection 2010 for Exchange Server component add setup information in the file FssSetupLogYYMMDDTimeStamp .txt,
                 which is located in %sytemdrive%UsersAll UsersMicrosoftForefront Security for Exchange Server




               If TMG Setup fails for any reason, first read the description of the error message that appears onscreen




                                                                                                                                    40
Setup Log Files




                  41
Classici errori di configurazione
  Multiple default gateways
    Define only one default gateway
  Not adding reachable addresses to networks
    Ensure all reachable addresses added
  DNS resolution issues
    DNS server list is system wide, not per adapter
    Use the internal DNS servers, or host a DNS server service locally
    and use conditional forwarding




                                                                         42

More Related Content

What's hot

VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks
VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks
VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks VMworld
 
F5 - BigIP ASM introduction
F5 - BigIP ASM introductionF5 - BigIP ASM introduction
F5 - BigIP ASM introductionJimmy Saigon
 
Sonicwall wireless & sra
Sonicwall wireless & sraSonicwall wireless & sra
Sonicwall wireless & sraMotty Ben Atia
 
Asa sslvpn security
Asa sslvpn securityAsa sslvpn security
Asa sslvpn securityJack Melson
 
Cyberoam cr200ing
Cyberoam cr200ingCyberoam cr200ing
Cyberoam cr200ingHuu Hieu
 
Fortinet - Hk Product Overview Short V 1 6
Fortinet - Hk Product Overview Short V 1 6Fortinet - Hk Product Overview Short V 1 6
Fortinet - Hk Product Overview Short V 1 6Haris Khan
 
Web Socket ASM support lior rotkovitch
Web Socket ASM support   lior rotkovitchWeb Socket ASM support   lior rotkovitch
Web Socket ASM support lior rotkovitchLior Rotkovitch
 
Vfm palo alto next generation firewall
Vfm palo alto next generation firewallVfm palo alto next generation firewall
Vfm palo alto next generation firewallvfmindia
 
F5 Networks: architecture and risk management
F5 Networks: architecture and risk managementF5 Networks: architecture and risk management
F5 Networks: architecture and risk managementAEC Networks
 
Astaro Customer Presentation
Astaro Customer PresentationAstaro Customer Presentation
Astaro Customer Presentationtechworldvn
 
F5 Networks: Introduction to Silverline WAF (web application firewall)
F5 Networks: Introduction to Silverline WAF (web application firewall)F5 Networks: Introduction to Silverline WAF (web application firewall)
F5 Networks: Introduction to Silverline WAF (web application firewall)F5 Networks
 
Forefront Protection for Office Overview
Forefront Protection for Office OverviewForefront Protection for Office Overview
Forefront Protection for Office OverviewCurtis Parker
 

What's hot (20)

VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks
VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks
VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks
 
Bezpečnostní architektura F5
Bezpečnostní architektura F5Bezpečnostní architektura F5
Bezpečnostní architektura F5
 
F5 - BigIP ASM introduction
F5 - BigIP ASM introductionF5 - BigIP ASM introduction
F5 - BigIP ASM introduction
 
Sonicwall wireless & sra
Sonicwall wireless & sraSonicwall wireless & sra
Sonicwall wireless & sra
 
Asa sslvpn security
Asa sslvpn securityAsa sslvpn security
Asa sslvpn security
 
Cyberoam cr200ing
Cyberoam cr200ingCyberoam cr200ing
Cyberoam cr200ing
 
Fortinet - Hk Product Overview Short V 1 6
Fortinet - Hk Product Overview Short V 1 6Fortinet - Hk Product Overview Short V 1 6
Fortinet - Hk Product Overview Short V 1 6
 
Web Socket ASM support lior rotkovitch
Web Socket ASM support   lior rotkovitchWeb Socket ASM support   lior rotkovitch
Web Socket ASM support lior rotkovitch
 
Inside forti os-v524-r5
Inside forti os-v524-r5Inside forti os-v524-r5
Inside forti os-v524-r5
 
Firewall
FirewallFirewall
Firewall
 
F5 DDoS Protection
F5 DDoS ProtectionF5 DDoS Protection
F5 DDoS Protection
 
Forti web
Forti webForti web
Forti web
 
Vfm palo alto next generation firewall
Vfm palo alto next generation firewallVfm palo alto next generation firewall
Vfm palo alto next generation firewall
 
Why choose pan
Why choose panWhy choose pan
Why choose pan
 
Implementing Application Security
Implementing Application SecurityImplementing Application Security
Implementing Application Security
 
F5 Networks: architecture and risk management
F5 Networks: architecture and risk managementF5 Networks: architecture and risk management
F5 Networks: architecture and risk management
 
Astaro Customer Presentation
Astaro Customer PresentationAstaro Customer Presentation
Astaro Customer Presentation
 
F5 Networks: Introduction to Silverline WAF (web application firewall)
F5 Networks: Introduction to Silverline WAF (web application firewall)F5 Networks: Introduction to Silverline WAF (web application firewall)
F5 Networks: Introduction to Silverline WAF (web application firewall)
 
Forefront Protection for Office Overview
Forefront Protection for Office OverviewForefront Protection for Office Overview
Forefront Protection for Office Overview
 
Vpn
VpnVpn
Vpn
 

Viewers also liked

Tmg 2010
Tmg 2010Tmg 2010
Tmg 2010Dac Sah
 
Microsoft Forefront - Threat Management Gateway 2010 Datasheet
Microsoft Forefront - Threat Management Gateway 2010 DatasheetMicrosoft Forefront - Threat Management Gateway 2010 Datasheet
Microsoft Forefront - Threat Management Gateway 2010 DatasheetMicrosoft Private Cloud
 
VWork: Bewertung der Vorteile flexiblen Arbeitens
VWork: Bewertung der Vorteile flexiblen ArbeitensVWork: Bewertung der Vorteile flexiblen Arbeitens
VWork: Bewertung der Vorteile flexiblen ArbeitensRegus
 
Arquitectura Romana
Arquitectura RomanaArquitectura Romana
Arquitectura RomanaClamuse
 
Presentación Maja
Presentación MajaPresentación Maja
Presentación MajaScarlet15
 
IVR Software - Pronexus VBVoice a Natural Choice for CenturiSoft’s Unified Co...
IVR Software - Pronexus VBVoice a Natural Choice for CenturiSoft’s Unified Co...IVR Software - Pronexus VBVoice a Natural Choice for CenturiSoft’s Unified Co...
IVR Software - Pronexus VBVoice a Natural Choice for CenturiSoft’s Unified Co...Pronexus
 
KAL PRO Pitch Deck_April2016
KAL PRO Pitch Deck_April2016KAL PRO Pitch Deck_April2016
KAL PRO Pitch Deck_April2016Mark O'Reilly
 
Exposición navidad CEIP CERVANTES 2014
Exposición navidad CEIP CERVANTES 2014Exposición navidad CEIP CERVANTES 2014
Exposición navidad CEIP CERVANTES 2014ceipcervantespto
 
Historia del ferrocarril en puerto rico
Historia del ferrocarril en puerto ricoHistoria del ferrocarril en puerto rico
Historia del ferrocarril en puerto ricomargarita perez
 
Data scientist enablement dse 400 week 3 roadmap
Data scientist enablement   dse 400   week 3 roadmapData scientist enablement   dse 400   week 3 roadmap
Data scientist enablement dse 400 week 3 roadmapDr. Mohan K. Bavirisetty
 
PresentationNigelMiddlemiss
PresentationNigelMiddlemissPresentationNigelMiddlemiss
PresentationNigelMiddlemissSerge Cornelus
 
Archivo leyes
Archivo leyesArchivo leyes
Archivo leyessan mateo
 
MaríA José Juan SáNchez DiseñO Y Delito
MaríA José Juan SáNchez DiseñO Y DelitoMaríA José Juan SáNchez DiseñO Y Delito
MaríA José Juan SáNchez DiseñO Y Delitokarla79
 

Viewers also liked (20)

Tmg 2010
Tmg 2010Tmg 2010
Tmg 2010
 
Microsoft Forefront - Threat Management Gateway 2010 Datasheet
Microsoft Forefront - Threat Management Gateway 2010 DatasheetMicrosoft Forefront - Threat Management Gateway 2010 Datasheet
Microsoft Forefront - Threat Management Gateway 2010 Datasheet
 
TMG Server by Daniel
TMG Server by DanielTMG Server by Daniel
TMG Server by Daniel
 
Portfolio Work
Portfolio WorkPortfolio Work
Portfolio Work
 
VWork: Bewertung der Vorteile flexiblen Arbeitens
VWork: Bewertung der Vorteile flexiblen ArbeitensVWork: Bewertung der Vorteile flexiblen Arbeitens
VWork: Bewertung der Vorteile flexiblen Arbeitens
 
Arquitectura Romana
Arquitectura RomanaArquitectura Romana
Arquitectura Romana
 
Presentación Maja
Presentación MajaPresentación Maja
Presentación Maja
 
IVR Software - Pronexus VBVoice a Natural Choice for CenturiSoft’s Unified Co...
IVR Software - Pronexus VBVoice a Natural Choice for CenturiSoft’s Unified Co...IVR Software - Pronexus VBVoice a Natural Choice for CenturiSoft’s Unified Co...
IVR Software - Pronexus VBVoice a Natural Choice for CenturiSoft’s Unified Co...
 
Wilshire fireplace shops catalogs
Wilshire fireplace shops catalogsWilshire fireplace shops catalogs
Wilshire fireplace shops catalogs
 
Standard
StandardStandard
Standard
 
KAL PRO Pitch Deck_April2016
KAL PRO Pitch Deck_April2016KAL PRO Pitch Deck_April2016
KAL PRO Pitch Deck_April2016
 
La dieta
La dietaLa dieta
La dieta
 
Exposición navidad CEIP CERVANTES 2014
Exposición navidad CEIP CERVANTES 2014Exposición navidad CEIP CERVANTES 2014
Exposición navidad CEIP CERVANTES 2014
 
Historia del ferrocarril en puerto rico
Historia del ferrocarril en puerto ricoHistoria del ferrocarril en puerto rico
Historia del ferrocarril en puerto rico
 
Data scientist enablement dse 400 week 3 roadmap
Data scientist enablement   dse 400   week 3 roadmapData scientist enablement   dse 400   week 3 roadmap
Data scientist enablement dse 400 week 3 roadmap
 
Generowanie leadów
Generowanie leadówGenerowanie leadów
Generowanie leadów
 
PresentationNigelMiddlemiss
PresentationNigelMiddlemissPresentationNigelMiddlemiss
PresentationNigelMiddlemiss
 
Archivo leyes
Archivo leyesArchivo leyes
Archivo leyes
 
Detran primeiro socorros
Detran   primeiro socorrosDetran   primeiro socorros
Detran primeiro socorros
 
MaríA José Juan SáNchez DiseñO Y Delito
MaríA José Juan SáNchez DiseñO Y DelitoMaríA José Juan SáNchez DiseñO Y Delito
MaríA José Juan SáNchez DiseñO Y Delito
 

Similar to Introduction to Forefront TMG 2010

50357 a enu-module01
50357 a enu-module0150357 a enu-module01
50357 a enu-module01Bố Su
 
50357 a enu-module02
50357 a enu-module0250357 a enu-module02
50357 a enu-module02Bố Su
 
Protección y acceso a tu información y aplicaciones en Azure y O365 – Barracuda
Protección y acceso a tu información y aplicaciones en Azure y O365 – BarracudaProtección y acceso a tu información y aplicaciones en Azure y O365 – Barracuda
Protección y acceso a tu información y aplicaciones en Azure y O365 – BarracudaPlain Concepts
 
GDI Product Presentation
GDI Product PresentationGDI Product Presentation
GDI Product Presentationtswong
 
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Rishabh Dangwal
 
Panda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri redusePanda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri reduseIDG Romania
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012Jimmy Saigon
 
Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012dvanwyk30
 
Why Its time to Upgrade a Next-Generation Firewall
Why Its time to Upgrade a Next-Generation FirewallWhy Its time to Upgrade a Next-Generation Firewall
Why Its time to Upgrade a Next-Generation FirewallAli Kapucu
 
Intoto Linley Tech Utm Architecture Presentation
Intoto Linley Tech Utm Architecture PresentationIntoto Linley Tech Utm Architecture Presentation
Intoto Linley Tech Utm Architecture Presentationsaddepalli
 
Microsoft Forefront - Protection 2010 for Exchange Server Datasheet
Microsoft Forefront - Protection 2010 for Exchange Server DatasheetMicrosoft Forefront - Protection 2010 for Exchange Server Datasheet
Microsoft Forefront - Protection 2010 for Exchange Server DatasheetMicrosoft Private Cloud
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012Jimmy Saigon
 
FortiProxy sales presentation-02022020_Vee.pptx
FortiProxy sales presentation-02022020_Vee.pptxFortiProxy sales presentation-02022020_Vee.pptx
FortiProxy sales presentation-02022020_Vee.pptxNuttapolMix
 
Evaluating Network and Security Devices
Evaluating Network and Security DevicesEvaluating Network and Security Devices
Evaluating Network and Security Devicesponealmickelson
 
Threat Management Gateway 2010 - Forefront Community launch 2010
Threat Management Gateway 2010- Forefront Community launch 2010Threat Management Gateway 2010- Forefront Community launch 2010
Threat Management Gateway 2010 - Forefront Community launch 2010Krzysztof Binkowski
 
Wifi Security for SOHOs: Cyberoam UTM CR15wi
Wifi Security for SOHOs: Cyberoam UTM CR15wiWifi Security for SOHOs: Cyberoam UTM CR15wi
Wifi Security for SOHOs: Cyberoam UTM CR15winiravmahida
 
Introduction to firewalls
Introduction to firewallsIntroduction to firewalls
Introduction to firewallsDivya Jyoti
 
Watchguard short introduction
Watchguard short introductionWatchguard short introduction
Watchguard short introductionJimmy Saigon
 
Get more versatile and scalable protection with F5 BIG-IP
Get more versatile and scalable protection with F5 BIG-IPGet more versatile and scalable protection with F5 BIG-IP
Get more versatile and scalable protection with F5 BIG-IPF5NetworksAPJ
 

Similar to Introduction to Forefront TMG 2010 (20)

50357 a enu-module01
50357 a enu-module0150357 a enu-module01
50357 a enu-module01
 
50357 a enu-module02
50357 a enu-module0250357 a enu-module02
50357 a enu-module02
 
Protección y acceso a tu información y aplicaciones en Azure y O365 – Barracuda
Protección y acceso a tu información y aplicaciones en Azure y O365 – BarracudaProtección y acceso a tu información y aplicaciones en Azure y O365 – Barracuda
Protección y acceso a tu información y aplicaciones en Azure y O365 – Barracuda
 
GDI Product Presentation
GDI Product PresentationGDI Product Presentation
GDI Product Presentation
 
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...
 
Panda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri redusePanda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri reduse
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012
 
Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012
 
Why Its time to Upgrade a Next-Generation Firewall
Why Its time to Upgrade a Next-Generation FirewallWhy Its time to Upgrade a Next-Generation Firewall
Why Its time to Upgrade a Next-Generation Firewall
 
Intoto Linley Tech Utm Architecture Presentation
Intoto Linley Tech Utm Architecture PresentationIntoto Linley Tech Utm Architecture Presentation
Intoto Linley Tech Utm Architecture Presentation
 
Microsoft Forefront - Protection 2010 for Exchange Server Datasheet
Microsoft Forefront - Protection 2010 for Exchange Server DatasheetMicrosoft Forefront - Protection 2010 for Exchange Server Datasheet
Microsoft Forefront - Protection 2010 for Exchange Server Datasheet
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012
 
FortiProxy sales presentation-02022020_Vee.pptx
FortiProxy sales presentation-02022020_Vee.pptxFortiProxy sales presentation-02022020_Vee.pptx
FortiProxy sales presentation-02022020_Vee.pptx
 
Evaluating Network and Security Devices
Evaluating Network and Security DevicesEvaluating Network and Security Devices
Evaluating Network and Security Devices
 
Threat Management Gateway 2010 - Forefront Community launch 2010
Threat Management Gateway 2010- Forefront Community launch 2010Threat Management Gateway 2010- Forefront Community launch 2010
Threat Management Gateway 2010 - Forefront Community launch 2010
 
Wifi Security for SOHOs: Cyberoam UTM CR15wi
Wifi Security for SOHOs: Cyberoam UTM CR15wiWifi Security for SOHOs: Cyberoam UTM CR15wi
Wifi Security for SOHOs: Cyberoam UTM CR15wi
 
Introduction to firewalls
Introduction to firewallsIntroduction to firewalls
Introduction to firewalls
 
Watchguard short introduction
Watchguard short introductionWatchguard short introduction
Watchguard short introduction
 
Firewalls
FirewallsFirewalls
Firewalls
 
Get more versatile and scalable protection with F5 BIG-IP
Get more versatile and scalable protection with F5 BIG-IPGet more versatile and scalable protection with F5 BIG-IP
Get more versatile and scalable protection with F5 BIG-IP
 

More from Fabrizio Volpe

Skype for business mobility
Skype for business mobilitySkype for business mobility
Skype for business mobilityFabrizio Volpe
 
Skype for business understanding what is new, preview or unchanged
Skype for business understanding what is new, preview or unchangedSkype for business understanding what is new, preview or unchanged
Skype for business understanding what is new, preview or unchangedFabrizio Volpe
 
Deploying lync evaluating costs and complexities
Deploying lync evaluating costs and complexitiesDeploying lync evaluating costs and complexities
Deploying lync evaluating costs and complexitiesFabrizio Volpe
 
Hybrid Clouds: “Silver Bullet” of the Cloud Computing?
Hybrid Clouds: “Silver Bullet” of the Cloud Computing?Hybrid Clouds: “Silver Bullet” of the Cloud Computing?
Hybrid Clouds: “Silver Bullet” of the Cloud Computing?Fabrizio Volpe
 
Forefront Unified Access Gateway 2010: An Introduction To Enterprise Features
Forefront Unified Access Gateway 2010: An Introduction To Enterprise FeaturesForefront Unified Access Gateway 2010: An Introduction To Enterprise Features
Forefront Unified Access Gateway 2010: An Introduction To Enterprise FeaturesFabrizio Volpe
 
Lync server overview (Inroduction) US English
Lync server overview (Inroduction) US EnglishLync server overview (Inroduction) US English
Lync server overview (Inroduction) US EnglishFabrizio Volpe
 
Planning, deploying and managing a microsoft vdi infrastructure (slides tra...
Planning,  deploying and managing a microsoft vdi infrastructure  (slides tra...Planning,  deploying and managing a microsoft vdi infrastructure  (slides tra...
Planning, deploying and managing a microsoft vdi infrastructure (slides tra...Fabrizio Volpe
 
Private cloud infrastructure configure and deploy 24 hiapc fabrizio volpe
Private cloud infrastructure configure and deploy 24 hiapc fabrizio volpePrivate cloud infrastructure configure and deploy 24 hiapc fabrizio volpe
Private cloud infrastructure configure and deploy 24 hiapc fabrizio volpeFabrizio Volpe
 
Infrastructure components configure and deploy 24 hiapc fabrizio volpe
Infrastructure components configure and deploy 24 hiapc fabrizio volpeInfrastructure components configure and deploy 24 hiapc fabrizio volpe
Infrastructure components configure and deploy 24 hiapc fabrizio volpeFabrizio Volpe
 
Lync Server 2010: High Availability [I3004]
Lync Server 2010: High Availability [I3004] Lync Server 2010: High Availability [I3004]
Lync Server 2010: High Availability [I3004] Fabrizio Volpe
 
Lync Server 2010: Introduzione [I2001]
Lync Server 2010: Introduzione [I2001]Lync Server 2010: Introduzione [I2001]
Lync Server 2010: Introduzione [I2001]Fabrizio Volpe
 
Lync server 2010 overview
Lync server 2010 overviewLync server 2010 overview
Lync server 2010 overviewFabrizio Volpe
 
4. tmg 2010 e uag 2010
4. tmg 2010 e uag 20104. tmg 2010 e uag 2010
4. tmg 2010 e uag 2010Fabrizio Volpe
 
System center virtual machine manager self service portal 2.0
System center virtual machine manager self service portal 2.0System center virtual machine manager self service portal 2.0
System center virtual machine manager self service portal 2.0Fabrizio Volpe
 
Pianificare, realizzare e gestire una infrastruttura Microsoft VDI
Pianificare, realizzare e gestire una infrastruttura Microsoft VDIPianificare, realizzare e gestire una infrastruttura Microsoft VDI
Pianificare, realizzare e gestire una infrastruttura Microsoft VDIFabrizio Volpe
 
Community Days 2012 - Tecnologie di desktop virtualization
Community Days 2012 - Tecnologie di desktop virtualization Community Days 2012 - Tecnologie di desktop virtualization
Community Days 2012 - Tecnologie di desktop virtualization Fabrizio Volpe
 

More from Fabrizio Volpe (18)

Skype for business mobility
Skype for business mobilitySkype for business mobility
Skype for business mobility
 
Skype for business understanding what is new, preview or unchanged
Skype for business understanding what is new, preview or unchangedSkype for business understanding what is new, preview or unchanged
Skype for business understanding what is new, preview or unchanged
 
Deploying lync evaluating costs and complexities
Deploying lync evaluating costs and complexitiesDeploying lync evaluating costs and complexities
Deploying lync evaluating costs and complexities
 
Hybrid Clouds: “Silver Bullet” of the Cloud Computing?
Hybrid Clouds: “Silver Bullet” of the Cloud Computing?Hybrid Clouds: “Silver Bullet” of the Cloud Computing?
Hybrid Clouds: “Silver Bullet” of the Cloud Computing?
 
Forefront Unified Access Gateway 2010: An Introduction To Enterprise Features
Forefront Unified Access Gateway 2010: An Introduction To Enterprise FeaturesForefront Unified Access Gateway 2010: An Introduction To Enterprise Features
Forefront Unified Access Gateway 2010: An Introduction To Enterprise Features
 
Lync server overview (Inroduction) US English
Lync server overview (Inroduction) US EnglishLync server overview (Inroduction) US English
Lync server overview (Inroduction) US English
 
Planning, deploying and managing a microsoft vdi infrastructure (slides tra...
Planning,  deploying and managing a microsoft vdi infrastructure  (slides tra...Planning,  deploying and managing a microsoft vdi infrastructure  (slides tra...
Planning, deploying and managing a microsoft vdi infrastructure (slides tra...
 
Private cloud infrastructure configure and deploy 24 hiapc fabrizio volpe
Private cloud infrastructure configure and deploy 24 hiapc fabrizio volpePrivate cloud infrastructure configure and deploy 24 hiapc fabrizio volpe
Private cloud infrastructure configure and deploy 24 hiapc fabrizio volpe
 
Infrastructure components configure and deploy 24 hiapc fabrizio volpe
Infrastructure components configure and deploy 24 hiapc fabrizio volpeInfrastructure components configure and deploy 24 hiapc fabrizio volpe
Infrastructure components configure and deploy 24 hiapc fabrizio volpe
 
Lync Server 2010: High Availability [I3004]
Lync Server 2010: High Availability [I3004] Lync Server 2010: High Availability [I3004]
Lync Server 2010: High Availability [I3004]
 
Lync Server 2010: Introduzione [I2001]
Lync Server 2010: Introduzione [I2001]Lync Server 2010: Introduzione [I2001]
Lync Server 2010: Introduzione [I2001]
 
Lync server 2010 overview
Lync server 2010 overviewLync server 2010 overview
Lync server 2010 overview
 
4. tmg 2010 e uag 2010
4. tmg 2010 e uag 20104. tmg 2010 e uag 2010
4. tmg 2010 e uag 2010
 
3. email relay fpe
3. email relay   fpe3. email relay   fpe
3. email relay fpe
 
2. secure web gateway
2. secure web gateway2. secure web gateway
2. secure web gateway
 
System center virtual machine manager self service portal 2.0
System center virtual machine manager self service portal 2.0System center virtual machine manager self service portal 2.0
System center virtual machine manager self service portal 2.0
 
Pianificare, realizzare e gestire una infrastruttura Microsoft VDI
Pianificare, realizzare e gestire una infrastruttura Microsoft VDIPianificare, realizzare e gestire una infrastruttura Microsoft VDI
Pianificare, realizzare e gestire una infrastruttura Microsoft VDI
 
Community Days 2012 - Tecnologie di desktop virtualization
Community Days 2012 - Tecnologie di desktop virtualization Community Days 2012 - Tecnologie di desktop virtualization
Community Days 2012 - Tecnologie di desktop virtualization
 

Recently uploaded

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 

Recently uploaded (20)

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 

Introduction to Forefront TMG 2010

  • 1. Introduzione a TMG 2010 Fabrizio Volpe MVP Directory Services fabrizio.volpe@gmx.com
  • 2. Breve Storia della Perimeter Protection Proxy Server 1.0 Internet Security And Accelleration (ISA) 2000 Proxy Server 2.0 Stateful Packet Inspection «Trusted Networks» ISA 2004 ISA 2006 Forefront Threat Management NO network traffic Web Publishing Gateway 2010 out of the box
  • 3. Forefront Edge Security and Access Products The Forefront Edge Security and Access products provide enhanced network edge protection and application-centric, policy-based access to corporate IT infrastructures Before Now Network Protection Integrated and comprehensive protection from Internet-based threats Network Access Unified platform for all enterprise remote access needs
  • 4. Forefront TMG ed UAG New features make Forefront TMG the ideal outbound access solution In contrast to ISA 2006, very little has been done in Forefront TMG in terms of improvements for inbound access control Exceptions :  Secure Socket Tunneling Protocol (SSTP) for VPN client connections  NAP Integration You will not see any other major changes in the Web or Server Publishing features when moving from ISA 2006 to Forefront TMG The majority of inbound access (remote access) effort is going into the Microsoft Forefront Unified Access Gateway (UAG) 2010 It is expected that Forefront TMG will be used primarily for outbound access control and network firewall, and UAG will be used for inbound access (remote access) control 4
  • 5. Possibili Collocazioni nel Network Perimeter Back-end firewall behind Edge of the corporate network another Forefront TMG firewall or third-party firewall As a parallel firewall on the As a network service segment edge, next to another firewall, providing a secure Forefront TMG or third-party perimeter between client systems firewall and network services Multi-homed firewall that acts as the hub between multiple internal and perimeter networks 5
  • 6. Forefront TMG: caratteristiche Firewall – Control network policy access at the edge Comprehensive Secure Web Gateway – Protect users from Web browsing threats Secure E-mail Relay – Protect users from e-mail threats Integrated Remote Access Gateway – Enable users to remotely access corporate resources Intrusion Prevention – Protect desktops and Simplified servers from intrusion attempts
  • 7. Forefront TMG: Scenari di Implementazione • All-in-one solution for medium businesses Unified Threat • Firewall, VPN, Web security, IPS, e-mail relay Management (UTM) in a single box • Authenticating proxy with security Secure Web • Web antivirus and URL filtering Gateway • Inspection of HTTP and HTTPS traffic • Secure Web publishing Remote Access • Dial-in VPN Gateway • Site to site VPN • Antispam Secure E-mail Relay • Antivirus • E-mail filtering
  • 8. Forward, Reverse Proxy, Web Proxy, e Winsock Proxy Server • Application layer inspection • For forward proxy connections, Web anti- Web proxy server malware capabilities and URL filtering Reverse proxy services • For reverse proxy SSL bridging • For both HTTP protocol inspection • Stateful packet and application layer inspection on all traffic moving through the VPN Remote Access VPN • User-based access controls (based on user name Server or user group membership) • Remote Access Quarantine Control and Network Access Protection (NAP) • Forefront TMG email gateway feature is powered by the Edge Transport Server role of Exchange Server Secure E-mail Gateway 2010 together with Microsoft Forefront Protection 2010 for
  • 9. Network Inspection System, Malware Inspection e HTTPS Inspection • Usa signatures of known vulnerabilities from the Network Inspection Microsoft Malware Protection Center (MMPC) to System help detect malicious traffic and then to take action • The Malware Inspection filter (Edge Malware Protection) is a built-in Web filter Malware Inspection • Delayed download, HTML progress page, Trickling • Forefront TMG introduces a new feature called HTTPS inspection • Is based on a trusted man-in-the-middle HTTPS Inspection mechanism, in which Forefront TMG works as a trusted man in the middle to be the SSL site for the clientman in the middle to be the SSL site for the client
  • 10. Riepilogo delle funzionalità • VoIP traversal • HTTP antivirus/ • Exchange Edge • Network • Enhanced NAT antispyware integration inspection • ISP link • URL filtering • Antivirus system redundancy • HTTPS forward • Antispam inspection Secure Web E-mail Intrusion Firewall Prevention Access Protection • NAP integration • Array management • Malware protection with client VPN • Change tracking • URL filtering • SSTP integration • Enhanced reporting • Intrusion • W2K8, native 64-bit prevention Remote Deployment and Subscription Access Management Services
  • 11. Riepilogo delle funzionalità Confronto con ISA Server 2006 ISA Server 2006 Forefront TMG Network layer firewall   Application layer firewall   Internet access protection (proxy)   Basic OWA and SharePoint publishing   Exchange publishing (RPC over HTTP)   IPSec VPN (remote and site-to-site)   Web caching, HTTP compression   Windows Server® 2008 R2, 64-bit (only)  New Web antivirus, antimalware  New URL filtering  New E-mail antimalware, antispam  New Network intrusion prevention  New Enhanced UI, management, reporting  New
  • 12. Licenze Two editions and Two Client Access Licenses (CALs) Enterprise Edition Scalability and management E Standard Edition Full UTM Subscriptions Web protection E-mail protection
  • 13. Confronto tra le edizioni Standard Edition Enterprise Edition Number of CPUs Up to 4 CPUs Unlimited Array/NLB/CARP support   Enterprise management  Yes, with added ability for EMS to manage SEs Publishing   VPN support   Forward proxy/cache,   compression Network IPS (NIS)   E-mail protection Requires Microsoft® Exchange Server License (Server + CALs) and installation by the admin
  • 14. Passaggio licenze da ISA 2006 a TMG 2010 Today At Launch ISA Server SE Forefront TMG 2010 SE ISA Server EE Forefront TMG 2010 EE Covered by Software Assurance Available per user/device, per year Forefront TMG 2010 EE
  • 16. Requisiti di sistema Minimum Recommended Processor 2 core (1 CPU x dual core) 4 core (2 CPU x dual core or 64-bit processor 1 CPU x quad core) 64-bit processor Memory 2 gigabytes (GB) of memory 4 gigabytes (GB) of memory Hard Disk Space 2.5 GB of available hard disk 2.5 GB of available hard disk space* space* Hard Disks One local hard disk partition Two disks for system and logging, formatted with NTFS and one for caching and malware inspection Network One network adapter for One network adapter for each communicating with the network connected to the internal network Forefront TMG 2010 server Operating System Windows Server® 2008 x64 with Service Pack 2, or Windows Server® 2008 R2 * Exclusive of the hard disk space used for caching and for storing temporary files 16
  • 17. Server Roles e Features richieste Server roles and features required by Other software Forefront TMG include: These server roles are Forefront TMG installed during Forefront Network Policy Microsoft .NET Preparation Tool Framework 3.5 TMG installation; you do Server SP1 not need to install them in advance Routing and Windows Web They are not removed if Remote Access Services API Service you uninstall Forefront TMG Active Directory Lightweight Microsoft Update Directory Services Forefront TMG is not supported on a machine that is configured as a Network Load Microsoft domain controller, with Windows Installer Balancing 4.5 the exception of a read- only domain controller, which requires that TMG Service Pack 1 be Windows PowerShell installed. 17
  • 18. Prerequisiti Basic installation Connected to the network, with DNS server settings configured For the Secure Mail Relay usage scenario Exchange Edge Transport Role Microsoft® Exchange Server 2007 with Service Pack 1, or Microsoft® Exchange Server 2010 Microsoft® Forefront™ Protection 2010 for Exchange Server
  • 19. Nota : Enterprise Management Server Both the Standard and Enterprise editions of Forefront TMG store their configurations in an Active Directory Lightweight Directories Services (AD LDS) database Standard Edition : the AD LDS database is always on the Forefront TMG firewall itself Enterprise Edition : option of installing the AD LDS configuration database on a firewall array member or on a separate computer. The separate computer hosting the AD LDS database is called the Enterprise Management Server (EMS)
  • 23. Configurazione dei Network Settings Network Setup (Template) Wizard Select the network topology used: Edge firewall 3-Leg perimeter Back firewall Single network adapter 23
  • 24. Configurazione dei Network Settings Network Setup Wizard Define the IP configuration for each network adapter Assign adapter to the appropriate network 24
  • 25. Configurazione dei System Settings System Configuration Wizard Define host name, domain membership and DNS suffix 25
  • 26. Configurazione dei Deployment Settings Deployment Wizard Activate subscription licenses Enable malware protection and intrusion prevention Configure signature update schedule and response policy Join the Customer Experience Improvement Program (CEIP) and the Microsoft Telemetry Service 26
  • 27. Configurazione dei Deployment Settings Deployment Wizard 27
  • 29. Network Relationship TMG, defines a network as a logical representation of a network connection owned by the computer where TMG operates • These networks can be • a physical connection such as network interface card (NIC) or modem • a logical interface such as a dial-in or site-to-site VPN connection In each case, TMG must have a clear understanding of how to define and process the traffic that is received from a given network • The simplest definition for a network relationship is that relationship indicated by the source and destination hosts as defined in the traffic 5-tuple Note 5-tuple is an industry-standard standard term describing the criteria used to uniquely identify an Ip communication channel • This data includes: • n Source and destination IP addresses • n Source and destination ports (if used) • n Transport Protocol (TCP, UDP, and so on) 29
  • 30. Configurazione Network Rules Like firewall policy rules, network rules define how TMG will handle traffic between source and destination hosts Network rules are also processed in the order in which they are defined Because network rules form a primary criterion for traffic processing, they have Define allowed traffic flows the power to discard traffic before any firewall policy rule has the opportunity to evaluate it When this happens, the firewall log will not include a name in the rule field because no firewall policy rule processed the traffic As is the case with firewall policy rules, the order of network rules is critical to correct traffic evaluation by TMG 30
  • 31. Configurazione Network Rules All network rule sets will begin with the same rule, Local Host Options presented for Access, which defines a network rule source No firewall policy a route relationship and destination elements which for traffic that is When you run the criteria are limited to abstract the source or sourced or Network Rule Wizard, those items that are destination into a terminated by TMG All network rules you are given the defined as some name (such as itself operate in the opportunity to select variation or grouping domain or URL sets) •This rule cannot be context of network from a subset of the of an IP address, IP can be used for modified by the objects firewall policy subnet, IP address network rules TMG administrator network objects range, or because they cannot combinations of represent literal these as in Computer network membership or Network Sets 31
  • 32. Configurazione Network Adapters Forefront TMG supports unlimited network adapters Limited by hardware 32
  • 33. Configurazione Networks Networks configuration model the enterprise network infrastructure Contains all reachable IPs for network adapter Cannot overlap with other Networks Static or dynamic 33
  • 34. Configurazione Network Sets Network Sets are used to group one or more networks Defined by selecting the networks included in the set (Include) or a set of networks excluded from the set (Exclude) Used in the definition of network and policy rules 34
  • 35. Configurazione Network Relationship Determine the relationship between two networks Route Bi-directional Source address not modified NAT Uni-directional Source address is modified Required for non-Web access and Server Publishing rules Web proxy filter ignores network rules 35
  • 36. Configurazione Network Rules New Feature: Enhanced NAT Specify the IP address to be used when doing NAT 36
  • 37. Configurazione Routing Display the routing table used between networks Set via route –p add command or GUI 37
  • 38. Forefront TMG Policy Three types of rules: 1. Network rules 2. System policy 3. Firewall policy 38
  • 39. Installazione su server a singola scheda di rete Forefront TMG supports using a single network adapter Supported scenarios Secure Web Gateway (forward Web proxy and cache) Web Publishing (reverse Web proxy and cache) Remote client VPN access Unsupported scenarios Application layer inspection (except for Web proxy) Server publishing Non-Web clients Firewall client Secure NAT Site-to-site VPNs 39
  • 40. Cosa Verificare in caso di Setup Failed During the installation process, TMG Setup stores information about each step that was performed in the %systemroot%temp folder The information in TMG Setup log files is based on Microsoft Windows Installer logging If you want to use the SMTP Protection feature on TMG, you need to install Microsoft Exchange Edge Transport Role and Forefront Protection 2010 for Exchange Server The log files for the Exchange component of the installation are stored at %systemdrive%ExchangeSetupLogs Forefront Protection 2010 for Exchange Server component add setup information in the file FssSetupLogYYMMDDTimeStamp .txt, which is located in %sytemdrive%UsersAll UsersMicrosoftForefront Security for Exchange Server If TMG Setup fails for any reason, first read the description of the error message that appears onscreen 40
  • 42. Classici errori di configurazione Multiple default gateways Define only one default gateway Not adding reachable addresses to networks Ensure all reachable addresses added DNS resolution issues DNS server list is system wide, not per adapter Use the internal DNS servers, or host a DNS server service locally and use conditional forwarding 42

Editor's Notes

  1. To run the Preparation Tool On the Installation Type page, select the required installation type option:Forefront TMG services and ManagementForefront TMG Management only Enterprise Management Server (EMS) for centralized array management The Preparation Tool downloads and installs the prerequisite applications, according to the selected Forefront TMG installation type.Insert the Forefront TMG 2010 DVD into the DVD drive, or run autorun.hta from a shared network drive.On the main setup page, click Run Windows Update. Windows Update might require one or more computer restarts. If the computer restarts, you must launch the setup page again, as described in step 1 of this procedure.On the main setup page, click Run Preparation Tool to launch the Preparation Tool. On the main setup page, click Run Installation Wizard to launch the Forefront TMG Installation Wizard.On the Installation Type page, click the Forefront TMG Services and Management button. On the Installation Path page, specify the Forefront TMG 2010 installation path.On the Define Internal Network page, click Add, click Add Adapter, and then select the adapter which is connected to the main corporate network.Note: If you are installing Forefront TMG on a computer with a single network adapter, all IP address ranges should be configured for the Internal network, except for the following: 0.0.0.0255.255.255.255127.0.0.0-127.255.255.255 (Local Host)224.0.0.0-254.255.255.255 (multicast)7. On the Ready to Install the Program page, click Install.Adding IP addresses to the internal networkOn the Addresses page, select any of the following methods to add addresses to the Internal network: Add Range – Addsa range of IP addresses. You must specify the beginning and ending IP address in the range; for example, 10.0.0.1 to 10.0.0.255.Add Adapter– Selects a network adapter. The IP addresses that are included in the Internal network are based on the IP address and subnet mask of the selected adapter.Add Private – Adds IP addresses defined as non-routable IP addresses, based on Request for Comment (RFC) 1918, and on the Automatic Private IP Addressing (APIPA) feature.
  2. You can configure your deployment settings using the Deployment Wizard. To configure your deployment settings1. In the Getting Started Wizard, click Define deployment options.2. On the Microsoft Update Setup page of the Deployment wizard, click Use the Microsoft Update service to check for updates (recommended) to specify that the Microsoft Update service should be used to obtain malware definition updates. 3.On the Forefront TMG Protection Features Settings page of the wizard, do the following:a. For Network Inspection System, select to activate the complementary license and enable Network Inspection System (NIS).b. For Web Protection, select the license activation type for Web protection. If you selected Activate purchased license and enable Web Protection, enter the license key and expiration date of the purchased license.c. If you want to scan requested HTTP content allowed by access rules for malware, such as viruses and spyware, select Enable malware inspection.4. On the NIS Signature Update Settings page of the wizard, for Select automatic update action, select the type of action to deploy when there are new or updated signature sets.5. For New Signature Set Configuration, select the response policy option for new signatures.6.On the Customer Feedback page of the wizard, if you want to participate in the Customer Experience Improvement Program, click Yes, I am willing to participate anonymously to join the Customer Experience Improvement Program. This program helps Microsoft to improve the quality and reliability of Forefront TMG. If you join the program, Microsoft collects anonymous information about hardware configuration, use of software and services, and trend patterns. No personally identifiable information is collected.7. On the Microsoft Telemetry Reporting Service page, do one of the following:Click the Basic button to send basic information to Microsoft regarding filtered URLs, URL category overrides, potential threats, and the response taken.Click the Advanced button to provide information to Microsoft about potential threats including traffic samples and full URL strings.Click the None button to decline participation in the service.