p**x

advertisement
Implementing Microsoft
Forefront Threat
Management Gateway
Server
®
Course Outline
Module 1: Overview of Microsoft Forefront TMG
Module 2: Installing and Maintaining TMG Server
Module 3: Enabling Access to Internet Resources
Module 4: Configuring TMG Server as a Firewall
Module 5: Configuring Access to Internal Resources
Course Outline (continued)
Module 6: Configuring Virtual Private Network Access
for Remote Clients and Networks
Module 7: Implementing Caching
Module 8: Monitoring Forefront TMG
Module 1:
Overview of Microsoft
Forefront TMG
Overview
Introducing Microsoft Forefront TMG
Deployment Scenarios for Forefront TMG
Lesson: Introducing Forefront TMG
What Are the Benefits of Forefront TMG?
Multimedia: Overview of Forefront TMG Functionality
Forefront TMG Management Interface
Forefront TMG Enterprise Edition Features
Differences Between TMG Server 2000 and
Forefront TMG
What Are the Benefits of Forefront TMG?
Advanced
Protection
Ease of Use
Enhanced
Performance
Multi-layer packet inspection
Unified firewall and VPN server
Multi-networking
Application-layer filtering
Efficient management tools
Network templates
Product integration
Ease of use for clients
Optimized for performance
Integrated functionality
Scalability
Web caching
Differences Between ISA Server 2006 and Forefront TMG
Simplified management (Deployment)
Protect users from web browsing threats (Web Access
Policy) with Malware and HTTPS inspection
Protect users from E-mail threats (Email Policy) with
Antispam and Antivirus
Protect desktops and servers from intrusion attempts
with Network Inspection System (NIS) as IPS
Using Active Directory Lightweight Directories
Services as ADAM
New Dashboard for Monitoring
Differences Between ISA Server 2006 and Forefront TMG
cont.
Support VoIP
New VPN Service with SSTP VPN
Redundancy and Load Balancing ISP
Lesson: Deployment Scenarios for Forefront TMG
How TMG Server Works as an Internet Edge Firewall
How TMG Server Works as a Back-End Firewall
How TMG Server Works as a Branch Office Firewall
How TMG Server Works as an Integrated Firewall,
Proxy, and Caching Server
How TMG Server Works as a Proxy- and Caching-Only
Server
How TMG Server Works as an Internet Edge Firewall
Use TMG Server to:
 Block all Internet traffic unless explicitly allowed
 Publish internal servers such as Web or Exchange servers
 Provide a VPN gateway for remote users
 Provide proxy and caching services
LAN
Web
Server
TMG Server
VPN
Web
Server
Internet
Server
User
Exchange Server
Remote User
How TMG Server Works as a Back-End Firewall
Use TMG Server to:
 Securely publish Exchange servers
 Securely publish other internal Web servers
 Provide proxy and caching services
LAN
Web Server
Web Server
TMG Server
Server
Firewall
Web
Server
Internet
User
Exchange Server
Remote User
How TMG Server Works as a Branch Office
Firewall
Use TMG Server to:
 Create an IPSec tunnel-mode VPN between offices
 Create a PPTP or L2TP with IPSec VPN between offices
 Inspect and filter all traffic between offices
 Provide secure access to the Internet at the branch office
LAN
TMG Server
LAN
TMG Server
or other
VPN gateway
VPN Tunnel Branch Office
Server
Internet
User
Corporate
Headquarters
How TMG Server Works as an Integrated Firewall, Proxy,
and Caching Server
Use TMG Server to:
 Provide proxy and caching services to conserve Internet bandwidth
 Configure dial-up connections to the Internet
 Block all inbound network traffic
 Provide secure configurations using network templates and server
publishing wizards
LAN
ISP Server
TMG Server
Server
Internet
Web Server
User
How TMG Server Works as a Proxy- and
Caching-Only Server
Use TMG Server with a single network adapter to
provide proxy and caching services
Deploying TMG Server with a single network
adapter means that it does not provide
additional security functionality
LAN
TMG Server
Web
Server
Server
Firewall
User
Internet
Module 2: Installing and
Maintaining TMG Server
Overview
Installing Forefront TMG
Choosing TMG Server Clients
Installing and Configuring TMG Clients
Advanced TMG Client Configuration
Securing Forefront TMG
Maintaining Forefront TMG
Lesson: Installing Forefront TMG
System and Hardware Requirements for Forefront TMG
Installation Types and Components
Configuration Choices During Installation
How to Perform an Unattended Installation of
Forefront TMG
How to Verify an Installation of Forefront TMG
Default Configuration for Forefront TMG
How to Modify the TMG Server Installation
Upgrade Options from TMG Server 2000 to
Forefront TMG
Preparation TMG
TMG will only run on 64-bit Windows Server 2008. There will be a 32bit demo version after the TMG goes RTM, but there won’t be any
beta versions that run on 32-bit Windows
TMG requires at least 2 GB of memory (it will probably run on less,
but not very quickly)
2.5 GB of disk space
At least one NIC (although I always recommend two or more NICs to
provide true security)
You must install to the default folder on the C: drive
TMG will install IIS 7 on your machine in order to support SQL
reporting services. If you remove TMG from the machine, II7 will not
be removed for you and you will need to do that manually
Services and driver files for the TMG are installed in the TMG
installation folder
System and Hardware Requirements for Forefront TMG
RAM
Windows Server 2008
64 bits
CPU
2 GB
1.8 GHZ(2core)
Hard Disk Format
Hard Disk Space
NTFS
2.5 GB
Internal
External
Hardware Requirements for Forefront TMG
System Requirements for Forefront TMG
System Requirements for Forefront TMG cont.
Installation Types and Components
Practice: Installing Forefront TMG
Installing Forefront TMG
TMG-XX
Internet
How to Verify an Installation of Forefront TMG
Verify that the TMG Server services are installed
and started
Verify that the MSDE services are installed and started
Review the setup log files
Check the Application Log in the Event Viewer
Check for TMG Server Alerts
Verify after installation: Service
TMG Service
Verify after installation: Service cont.
MSSQL Service
Default Configuration for Forefront TMG
Only Administrators can modify firewall policies
Caching
is disabled
Web Proxy
requests will be retrieved directly from
the
Internet
but
network,
access
the
rules
VPNdeny
Quarantine
all network
network,
traffic
and
through
the
installation
share
is configured
if you
install
the
other
networks
Traffic
between
the Internal network, the VPN network, the VPN
Internal
network
the
Internet
will
Server
useand
network
address
TMGTMG
Client
installation
files
Quarantine
network,
the Internet
will usetranslation
network address
System
Traffic
between
policy
permits
the
Internal
access
network,
toand
the
TMG
the
VPN
Server
A
rule
enabling
access
to
the
TMG
Client
is
routed
between
the
TMG
Server
and
allthe
No
servers
are
published
Traffic
is
routed
between
the
TMG
Server
all
other
networks
Traffic
is
routed
between
the
VPN
network
and
Only Administrators can modify firewall policies
translation
Traffic is routed between the VPN network and the Internal network
System policy permits access to the TMG Server but access rules
deny all network traffic through the TMG Server
No servers are published
Web Proxy requests will be retrieved directly from the Internet
Caching is disabled
A rule enabling access to the TMG Client installation share is
configured if you install the TMG Client installation files
Example: Default Configuration
Example: Default Configuration
Example Default Firewall Policy
โดย Default จะ Deny ทุกกรณี
Practice: Verifying the Installation and Default
Configuration of Forefront TMG
Verifying the successful installation of
Forefront TMG
Examining the default installation of
Forefront TMG
TMG-XX
Internet
Migration Options from ISA Server to Forefront TMG
Migration
Extract the
ISA Server
2006
configuration
Import the ISA
Server Configuration
ISA Server 20006
Install Forefront TMG
Remark: ISA Server 2006 cannot upgrade to TMG directly due to 64 bits
platform
Lesson: Choosing TMG Server Clients
Types of TMG Server Clients
How to Configure a SecureNAT Client
How to Configure Web Proxy Clients
Guidelines for Choosing an TMG Server Client
Types of TMG Server Clients
Does not require you to
deploy client software
Internet
SecureNAT Client
TMG
Server
Web Proxy Client
Improves the performance of
Web requests for internal clients
TMG Client
Allows internet access only
for authenticated users
Guidelines for Choosing an TMG Server Client
If you need to…
Then use…
Avoid deploying client software
SecureNAT clients
Use TMG Server only for
forward caching
SecureNAT or Web Proxy
clients
Allow access only for
authenticated clients
TMG Clients or Web
Proxy clients
Publish servers on your
internal network
SecureNAT clients
Improve Web performance for
non-Windows operating systems
SecureNAT or Web
Proxy clients
How to Configure a SecureNAT Client
SecureNAT clients do not require client installation or
client configuration
On a single subnet network, configure the IP address
of the internal network interface as the SecureNAT
client default gateway
On a multiple subnet network, configure the IP address
of the router as the SecureNAT client default gateway
How to Configure Web Proxy Clients
Monitoring Session on TMG
Practice: Configuring SecureNAT and Web Proxy Clients
Configuring TMG Server to log
client connections
Configuring and testing
a SecureNAT client
Configuring and testing
a Web Proxy client
TMG-XX
Internet-xx
Internet
Clientxx
Lesson: Installing and Configuring TMG Clients
How to Configure TMG Client Settings
The TMG Client Installation and
Configuration Process
Options for Automating the TMG Client Installation
How to Configure TMG Client Settings
The TMG Client Installation and Configuration Process
The TMG Client:
Uses a common Winsock service provider that
other Winsock applications use to connect to
application servers
Intercepts Winsock client application calls for remote
application servers and redirects the request to
TMG Server
Install the TMG Client:
From the TMG Client share on computer running TMG
Server or another network share
Practice: Installing the TMG Client
Configuring the TMG Client settings on
TMG Server
Installing the TMG Client
TMG-XX
Internet-xx
Web
Internet
Clientxx
Step for Setup TMG Client
เรียกจากแผ่ นติดตั้ง
Step for Setup TMG Client cont.
ทาการ Setup ตามขั้นตอน Wizard
ระบุ TMG Server
Step for Setup TMG Client cont.
เมือ่ เสร็จแล้ วให้ ทาการ restart
add record ของ TMG เข้ าไปใน host file.
Step for Setup TMG Client cont.
Step for Setup TMG Client cont.
Automatic
Setting
Step for Setup TMG Client cont.
Options for Automating the TMG Client Installation
Software package distributed
using Group Policies
Unattended installation
SMS package distributed to
specific clients using SMS
Configuring Administrative Roles
TMG Server Administrative Roles
Role
Forefront TMG Auditor
Description
Full Access Monitoring
Read only ISA Configuration
Restricted Access Monitoring
Forefront TMG
Monitoring Auditor
View Session, Query Service
Status
View and Reset Alerts
Forefront TMG
Administrator
Can perform all administrative
tasks
Example for Delegate Job for ISA Role
Properties of TMG Server
Best Practices for Securing the Server
Securing TMG Server
Do Not Install TMG Server on a Domain Controller
Avoid Installing an Internet Edge Server on a
Domain Member
Rename the Administrator Account
Disable Unused Functionality
Apply Window Server Security Best Practices
Lesson: Maintaining Forefront TMG
About Exporting and Importing the ISA
Server Configuration
About Backing Up and Restoring the ISA
Server Configuration
Remote Administration Options for TMG Server
About Exporting and Importing the TMG Server
Configuration
Use export and import to clone an TMG Server or to
save a configuration for troubleshooting or to roll
back a configuration change
You can export the entire TMG Server configuration, or
any individual or group of configuration settings
Importing a configuration overwrites all settings from
the exported file
About Backing Up and Restoring the TMG Server
Configuration
Use back up to create a configuration file that can be
used for disaster recovery
Back up creates a file with the entire TMG Server
configuration
Restoring a back up overwrites all TMG Server settings
Remote Administration Options for TMG Server
Use remote administration to manage physically
secured servers or servers in other offices
Use Remote Desktop or Terminal Services to manage
all settings on the server running TMG Server
Use the TMG Server Management MMC to manage
TMG Server settings remotely
Configure the server running TMG Server to enable
Remote Desktop and configure System Policy to
enable remote MMC management
Practice: Remote Management for TMG
Using Remote Desktop for remote
management
Using MMC for remote management
TMGxx
Clientxx
Module 3: Enabling
Access to Internet
Resources
Overview
Forefront TMG as a Proxy Server
Configuring Multi-Networking on TMG Server
Configuring Access Rule Elements
Configuring Access Rules for Internet Access
Lesson: Forefront TMG as a Proxy Server
How TMG Server Enables Secure Access to Internet
Resources
Why Use a Proxy Server?
How Does a Forward Web Proxy Server Work?
What Is a Reverse Web Proxy Server?
How to Configure TMG Server as a Proxy Server
DNS Configuration for Internet Access
How to Configure Web Chaining
How to Configure Dial-Up Connections
How TMG Server Enables Secure Access to
Internet Resources
Is the …
User allowed access?
Computer allowed access?
Protocol allowed?
Destination allowed?
Content allowed?
TMG
Server
Web
Server
Proxy Server
Why Use a Proxy Server?
TMG Server
Improved Internet access security:
User authentication
Filtering client requests
Content inspection
Logging user access
Hiding the internal network details
Improved Internet access performance
Web Server
How Does a Forward Web Proxy Server Work?
Is the …
User allowed access?
3
1
6
Protocol allowed?
Destination allowed?
5
2
TMG
Server
4
Web
Server
What Is a Reverse Web Proxy Server?
Is the …
Request allowed?
Web
Server
Protocol allowed?
3
Destination allowed?
DNS
Server
4
5
2
TMG
Server
1
6
How to Configure TMG Server as a Proxy Server
DNS Configuration for Internet Access
If no internal DNS server is available to resolve Internet
addresses, configure the TMG Server clients to use an
Internet DNS server
Configure TMG Server clients to use an internal DNS
server if the DNS server can resolve Internet addresses
TMG Server can proxy DNS requests for Web proxy
and TMG Clients but not for SecureNAT clients
TMG Server includes a DNS cache that caches the
results of all DNS lookups performed through
TMG Server
DNS Request by Client
Secure NAT
- Client จะเป็ นคนถาม DNS Server เอง
Web Proxy Client, TMG Client
- TMG จะเป็ นคนถาม DNS Server เอง
( Proxy DNS Request)
Practice: Configuring DNS
Configure Client use Internal DNS
Configure Internal DNS by Internal
Technique
Configure Internal DNS by Internet
Technique
TMG-XX
Internet-xx
Web
DNS
Internet
Clientxx
SV-xx
DC
DNS
DHCP
How to Configure Web Chaining
Internet
Branch Office
Branch Office
Head Office
Example Web Chaining
Practice: Configuring TMG Server as a Web Proxy
Server
Configuring the proxy server settings on
TMG Server
Internet-xx
Web
TMG-XX
DNS
Internet
Clientxx
SV-xx
DC
DNS Server
DHCP Server
Lesson: Configuring Multi-Networking on TMG
Server
How Does Forefront TMG Support Multiple Networks?
Default Networks Enabled in TMG Server
About Network Objects
How to Create and Modify Network Objects
What Are Network Rules?
How Does Forefront TMG Support Multiple Networks?
Support any Number of Networks
VPN Networks Represented
as Networks
Internet
VPN
Dynamic Network
Membership
Per Network Rules
Perimeter1
Per Network Policies
Network Sets
LAN1
LAN2
Perimeter2
Default Networks Enabled in TMG Server
Default Network
Includes
Local Host
The TMG Server
Default External
All IP addresses not associated with
another network
Internal
All IP addresses specified as internal
during installation
VPN Clients
All IP addresses for currently
connected VPN clients
Quarantined VPN
Clients
All IP addresses of connected VPN
clients that have not cleared
quarantine
Example Default Network on ISA2006
About Network Objects
Network Object
Includes
Subnet
All computers connected to a single network
interface
One or more networks
A single computer identified by an IP address
All computers included in specified computer,
subnet or address range objects
All computers identified by continuous
IP addresses
All computers on a specified subnet
URL Set
All specified URLs
Domain Name Set
All specified domain names
The IP address on which the TMG Server
listens for connections
Network
Network Set
Computer
Computer Set
Address Range
Web Listener
How to Create and Modify Network Objects
Click Firewall Policy,
Toolbox, then
Network Objects
Click Networks, then
Networks or Network Sets
What Are Network Rules?
Route connection:
A route relationship is bidirectional
If a routed relationship is defined from network A
to network B, a routed relationship also exists from
network B to network A
NAT connection:
A NAT relationship is directional
Addresses from the source network are always
translated when passing through TMG Server
Practice: Managing Network Objects
Configuring a new network
on TMG Server
Configuring a new network rule
on TMG Server
Configuring a new computer network
object on TMG Server
TMG-XX
Internet
Lesson: Configuring Access Rule Elements
What Are Access Rule Elements?
How to Configure Protocol Elements
How to Configure User Elements
How to Configure Content Type Elements
How to Configure Schedule Elements
How to Configure Domain Name Sets and URL Sets
What Are Access Rule Elements?
Access Rule Element
Protocols
Users
Content Types
Used to Configure
The protocols that will be allowed or
denied by an access rule
The users that will be allowed or denied by
an access rule
The content type that will be allowed or
denied by an access rule
Schedules
The time of day when Internet access will
be allowed or denied by an access rule
Network Objects
The computers or destinations that will be
allowed or denied by an access rule
***Example Policy ***
How to Configure Protocol Elements
How to Configure User Elements
How to Configure User Elements
การอนุญาต เฉพาะ User ทีต่ ้ องการใช้ ระบบ
1.
ไม่ support protocol เรื่องเกีย่ วกับการ ping
2.
กรณีเป็ น HTTPทีใ่ ช้ งานผ่ าน browser จาเป็ นต้ องเป็ น client 2 ประเภท
คือ Web Proxy, TMG Client โดย
2.1 ถ้ ามี user ที่ตรงกับรายชื่อ user ใน TMG จะดูว่าตกลงใน policy
สามารถเข้ าใช้ งานได้ หรือเปล่ า (windows integrated)
3.
2.2 ถ้ ามี user ไม่ ตรงกับรายชื่อ user ใน ISA จะทาการ popup เพือ่ ระบุ
user logon
กรณีที่เป็ น protocol อืน่ ๆ จาเป็ นต้ องเป็ น TMG Client เท่ านั้นและต้ องมี
รายชื่อของ ทั้ง Client และ TMG ตรงกันด้ วย
Remark ยกเว้ น DNS กรณีทใี่ ช้ Web Proxy หรือ TMG Client จะใช้
DNS ของ ISA โดยตรง.. ( ไม่ มกี าร authen )
Summary กฏทีใ่ ช้ ในการ assign ใน Firewall Policy
ถ้ า user ทีร่ ะบุไว้ เป็ นสมาชิกทั้ง 2 กลุ่ม แต่ ขดั แย้ งกันจะเชื่อ except ก่ อนเสมอ
somchai หมดสิ ทธิ
เข้ าใช้ งาน !!!!
How to Configure Content Type Elements ( ทาได้ เฉพาะ
HTTP เท่ านั้น )
Define the MIME
types and file
extensions to include
Example Content Types
If not allow All Image in policy See result like this ( work only HTTP
Traffic )
How to Configure Schedule Elements
Define the times
when this schedule
is active or inactive
How to Configure Domain Name Sets and URL Sets
Use this to configure
access to an entire
domain
Use this to configure
access to a URL
Example Block Bad Website
การกาหนด firewall policy ควรกาหนด
- URL ที่ไม่ อนุญาต
-
- IP ของ Server ที่ไม่ อนุญาต
Example Block Bad Website cont.
Logic ในการคิด Firewall Policy
การอ่าน Policy จะทาการอ่านจากบนลงไปล่ าง ถ้ าเกิดเข้ า กฏตัวไหน
ก่อนจะ apply ทันที โดยจะไม่ ไปอ่านกฏอืน่ ๆ อีก
อ่ านจากบนลงล่ าง เจอตัวไหนก่ อน
ทาทันที
Practice: Configuring Firewall Rule Elements
Configuring a new user set
Configuring a new content type element
Configuring a new schedule element
Configuring a new URL set
TMG-XX
Internet-xx
Web
DNS
Internet
Clientxx
SV-xx
DC
DNS Server
DHCP Server
Lesson: Configuring Access Rules for Internet Access
What Are Access Rules?
How Network Rules and Access Rules Are Applied
About Authentication and Internet Access
How to Configure Access Rules
How to Configure HTTP Policy
How to Troubleshoot Access to Internet Resources
What Are Access Rules?
Access rules always define:
Allow
Deny
User
Destination Network
Destination IP
Destination Site
action on traffic from user from source to destination with conditions
Protocol
IP Port/Type
Source network
Source IP
Schedule
Content Type
How Network Rules and Access Rules Are Applied
Network
Rules
3
5
4
Access
Rules
1
2
Domain
Controller
TMG
Server
6
Web
Server
About Authentication and Internet Access
Authentication and TMG Server Clients
Authentication Methods
 Basic authentication
 Digest authentication
 Integrated Windows authentication
 Digital certificates authentication
 RADIUS authentication
 RSA SecureID authentication
How to set Authentication.
Type of Standard Authentication
Basic Authentication
- จะมีการส่ ง password โดยแบบ clear text ควรใช้ ร่วมกับ SSL
- ใช้ งานร่ วมกับ Client ส่ วนใหญ่ ได้
- ไม่ support single sign-on
Example Basic Authentication
Most support for Browser
Not encryption ******
Basic Clear text.
Type of Standard Authentication
Digest Authentication
- มีการส่ งค่ า password โดยใช้ Hashing
- ใช้ กบั user ทีม่ รี ายชื่ออยู่ภายใต้ Active Directory เท่ านั้น
Example Digest Authentication
Send user and Password
By use Hashing
Work only Domain Account
Type of Standard Authentication
Integrated with Windows Authentication
- User ไม่ จาเป็ นต้ องใส่ ค่า user และ password
- server จะทาการคุยกับ client computer ด้ วยตัวเองว่ า user ทีท่ าการ
logon อยู่ทเี่ ครื่องคือใคร
- กรณี account ไม่ ตรงกันจะ pop up authen ขึน้ มา
- Encryption
Example Windows Integrated
Integrated with windows account
จะใช้ window account ทาการ logon อัตโนมัติ
กรณี account ไม่ ตรงกันจะ pop up authen ขึน้ มา
Encryption
How to Configure Access Rules
Practice: Integrated TMG with NPS (Radius Server)
Installing NPS Server
Set Radius Server, Radius Client
Configure Firewall Policy with Radius
TMG-XX
Internet-xx
Web
DNS
Internet
Clientxx
SV-xx
DC
DNS Server
NPS
How to Troubleshoot Access to Internet Resources
To troubleshoot Internet access issues:
Check for DNS name resolution
Determine the extent of the problem
Review access rule objects and access rule configuration
Review access rule order
Check access rule authentication
Use TMG Server logging to determine which access rule
is granting or denying access
What Are Web Access Policy?
New Feature of TMG:
A new wizard based tool
Focus only HTTP/HTTPS
Functionality like malware inspection
Include HTTPS Outbound Inspection
Use malware inspection can update definition directly
with update center (Microsoft Update or WSUS)
How to use Web Access Policy
How to use Web Access Policy: Web Destinations
How to use Web Access Policy: Malware Inspection
How to use Web Access Policy: HTTPS Inspection
Lab: Enabling Access to Internet Resources
Exercise 1: Configuring TMG Server
Access Rule Elements
Exercise 2: Configuring TMG Server
Access Rules
Exercise 3: Testing TMG Server
Access Rules
Module 4:
Configuring TMG
Server as a Firewall
Overview
Using TMG Server as a Firewall
Examining Perimeter Networks and Templates
Configuring System Policies
Configuring Intrusion Detection and IP Preferences
Lesson: Using TMG Server as a Firewall
What Is a TCP/IP Packet?
What Is Packet Filtering?
What Is Stateful Filtering?
What Is Application Filtering?
What Is Intrusion Detection?
How Forefront TMG Filters Network Traffic
Implementing Forefront TMG as a Firewall
What Is a TCP/IP Packet?
Network
Interface Layer
Internet
Layer
Transport
Layer
Application
Layer
Destination Address: 0003FFD329B0
Source Address: 0003FFFDFFFF
Destination: 192.168.1.1
Source: 192.168.1.10
Protocol: TCP
Destination Port: 80
Source Port: 1159
Sequence: 3837066872
Acknowledgment: 2982470625
HTTP Request Method: Get
HTTP Protocol Version: =HTTP/1.1
HTTP Host: =www.contoso.com
Physical
payload
IP payload
TCP
payload
What Is Packet Filtering?
Is the …
Source address allowed?
Destination address allowed?
Web
Server
Protocol allowed?
Destination port allowed?
TMG
Server
Packet
Filter
What Is Stateful Filtering?
Connection Rules
Create connection rule
Is packet part of a connection?
Web
Server
Web
Server
TMG
Server
What Is Application Filtering?
Get www.contoso.com
Get method allowed?
Respond to client
Web
Server
TMG
Server
Does the response contain only
allowed content and methods?
What Is Intrusion Detection?
Alert the administrator
Port scan limit exceeded
TMG
Server
All ports scan attack
Implementing Forefront TMG as a Firewall
To configure TMG Server as a firewall:
Determine perimeter network configuration
Configure networks and network rules
Configure system policy
Configure intrusion detection
Configure access rule elements and access rules
Configure server and Web publishing
Lesson: Examining Perimeter Networks and Templates
What Is a Perimeter Network?
Why Use a Perimeter Network?
Network Perimeter Configurations
About Network Templates
How to Use the Network Template Wizard
Modifying Rules Applied by Network Templates
What Is a Perimeter Network?
Perimeter Network
Firewall
Firewall
Internet
Internal Network
Why Use a Perimeter Network?
A perimeter network provides an additional layer
of security:
Between the publicly accessible servers and the
internal network
Between the Internet and confidential data or critical
applications stored on servers on the internal network
Between potentially nonsecure networks such as
wireless networks and the internal network
Use defense in depth in addition to perimeter
network security
Network Perimeter Configurations
Bastion host
Web
Server
Three-legged configuration
LAN
Perimeter
Network
LAN
Back-to-back configuration
Perimeter
Network
LAN
About Network Templates
Bastion host
Web
Server
Three-legged configuration
Perimeter
Network
LAN
Deploy the Edge
Firewall template
Deploy the 3-Leg
Perimeter template
Deploy the
Front-End
or Back-End
template
LAN
Back-to-back configuration
Perimeter
Network
LAN
Deploy the Single Network Adapter template for proxy and caching only
How to Use the Network Template Wizard
How to Use the Network Template Wizard cont.
Modifying Rules Applied by Network Templates
You may need to modify the rules applied by a network
template to:
Modify Internet access based on user or
computer sets
Modify Internet access based on protocols
Modify network rules to change network relationships
You can either change the properties of one of the rules
configured by the network template, or you can create
a new access rule to apply a specific setting
Lesson: Configuring System Policies
What Is System Policy?
System Policy Settings
How to Modify System Policy Settings
What Is System Policy?
System policy is:
A default set of access rules applied to the
TMG Server to enable management of the server
A set of predefined rules that you can enable or disable
as required
Modify the default set of rules provided by the system
policy to meet your organization’s requirements.
Disable all functionality that is not required
System Policy Settings
System policy settings include:
Network Services
Authentication Services
Remote Management
TMG Client
Diagnostic Services
Logging and Monitoring
SMTP
Scheduled Download Jobs
Allowed Sites
How to Modify System Policy Settings
Practice: Modifying System Policy
Examining and modifying the default
system policy
Testing the modified system policy
TMG-XX
Internet
Clientxx
About Intrusion Prevention Configuration Options
Intrusion Prevention on Forefront TMG:
NIS Signature can now be update dynamically.
Detects well-known protocols attack: HTTP, DNS, SMB,
NetBIOS, MSRPC, SMTP, POP3, IMAP4 and MIME
Work together with Microsoft Malware Protection to
newly discovery threats.
Example: IPS for TMG
How to Configure Intrusion Prevention
About Intrusion Detection Configuration Options
Intrusion detection on Forefront TMG:
Compares network traffic and log entries to
well-known attack methods and raises an alert
when an attack is detected
Detects well-known IP attacks
Includes application filters for DNS and POP that
detect intrusion attempts at the application level
Example: IDS for TMG
How to Configure Intrusion Detection
Using Update Center
Module 5:
Configuring Access
to Internal Resources
Overview
Introduction to Publishing
Configuring Web Publishing
Configuring Secure Web Publishing
Configuring Server Publishing
Configuring TMG Server Authentication
Lesson: Introduction to Publishing
Multimedia: Using Forefront TMG to Enable Access
to Internal Network Resources
What Are Web Publishing Rules?
What Are Server Publishing Rules?
DNS Configuration for Web and Server Publishing
What Are Web Publishing Rules?
Web publishing rules provide the following features:
Publish HTTP or HTTPS
content
Application-layer filtering
Path mapping
User authentication
Content caching
Publish multiple Web
sites with one IP address
Link translation
Logging client IP address
Secure Web publishing rules enable the use of SSL to
encrypt network traffic between client and server
TMG Server
What Are Non-Web Server Publishing Rules?
Server publishing rules provide the following features:
Support for encryption
Publish content using
multiple protocols
Logging client IP address
Application layer filtering
for protocols with
application filters
Non-Web Server publishing rules forward requests to
internal servers based on protocol and port number
TMG Server
DNS Configuration for Web and Non-Web Server
Publishing
Perimeter Network
www.cohovineyard.com
DNS
Server
DNS
Server
4
1
2
TMG
Server
3
Internet
Internal Network
Lesson: Configuring Web Publishing
Web Publishing Rules Configuration Components
How to Configure Path Mapping
How to Configure Web Listeners
How to Configure Link Translation
How to Configure a New Web Publishing Rule
Web Publishing Rules Configuration Components
Web publishing rules configuration:
•
Action
•
Name
•
Users
•
Traffic source
•
Public name
•
Web listener
•
Path mappings
•
Bridging
•
Link Translation
How to Configure Path Mapping
http://www.demo.com/hr
Virtual Directories
Sales
Human Resources
Online Store
TMG
Server
http://www.demo.com/shop
Example Path Mapping
How to Configure Multiple Web Publishing
Web1
http://www.cohovineyard.com
Web2
TMG
Server
http://www.acme.com
Example Multiple Web Publishing
Same web listener
How to Configure Web Listeners
Anonymous Web listener
http://www.cohovineyard.com
CohoVineyard Web Site
Private Web Site
TMG
Server
http://private.cohovineyard.com
Authenticated Web listener
How to Configure a New Web Publishing Rule
Web Publishing Rule Wizard configuration:
Action
Published Website
Public name
Web listener
User Sets
Practice: Configuring Web Publishing
Configuring a New Web Listener
Configuring a New Web Publishing Rule
Testing the Web Publishing Rule
DMZxx
Web
TMG-XX
Internet-xx
Web
DNS
Internet
Clientxx
Server-xx
DC
DNS
DHCP
Lesson: Configuring Secure Web Publishing
What Is Secure Sockets Layer?
How to Prepare TMG Server for SSL
How SSL Bridging Works
How SSL Tunneling Works
How to Configure a New Secure Web Publishing Rule
What Is Secure Sockets Layer?
Server Authentication
Client Authentication
Encrypted SSL
Connection
Web
Server
How to Prepare TMG Server for SSL
www.demo.com
Import
Web
Server
www.demo.com
TMG
Server
How SSL Bridging Works
TMG
Server
How to Configure a New Secure Web Publishing Rule
SSL Web Publishing Rule Wizard configuration:
Publishing Mode
Action
Bridging Mode
Published Website
Public name
Web listener
User Sets
Practice: Configuring Secure Web Publishing
Enabling Access to the Certificate
Authority Web Site
Installing a Server Certificate
Configuring a New Secure Web
Publishing Rule
Testing the Secure Web Publishing Rule
InternalWeb-01
InternetWeb-01
TMG-xx
Internet
DC-xx
Lesson: Configuring Non-Web Server Publishing
Server Publishing Configuration Options
How Non-Web Server Publishing Works
How to Configure a Non-Web Server Publishing Rule
How to Troubleshoot Web and Non-Web Server
Publishing
Non-Web Server Publishing Configuration Options
Server publishing rules configuration:
Action
Traffic
Traffic source
Traffic destination
Networks
Schedule
How Non-Web Server Publishing Works
Media Publishing Rule: Port 1755
mms://media.demo.com
Demo Media Site
Demo FTP Site
TMG
Server
ftp://ftp.demo.com
FTP Publishing Rule: Port 21
How to Configure a Non-Web Server Publishing Rule
Non-Web Server Publishing Rule Wizard configuration:
Select server
to publish
Select protocol
Select IP addresses
where clients
will connect
Practice: Configuring Non-Web Server Publishing
Configuring a New Non-Web Server Publishing Rule
Testing the Non-Web Server Publishing Rule
InternalWeb-01
InternetWeb-01
TMG-xx
Internet
Server-xx
FTP
How to Troubleshoot Web and Non-Web Server
Publishing
To troubleshoot Web and server publishing issues:
Check the resource availability
Check the DNS records
Check the error message
Check which ports the TMG Server is listening on
for connections
Check the publishing rule configuration
Check the SSL configuration and certificates
Lesson: Configuring TMG Server Authentication
How Authentication and Web Publishing Rules Work
TMG Server Web Publishing Authentication Scenarios
Using RADIUS for Authentication
How to Implement RADIUS Server for ISA Authentication
How Authentication and Web Publishing Rules Work
Together
TMG Server uses authentication to grant access to
publishing rules:
When the publishing rule specifies a user set other
than the All Users group
Based on the Web listener authentication methods
specified for a Web publishing or secure Web
publishing rule
By processing the firewall rules in order of priority.
When a firewall rule matches, but requires
authentication, TMG Server will prompt for
user credentials
TMG Server Web Publishing Authentication Scenarios
Web Server
authentication
TMG Server
authentication
TMG
Server
TMG Server and Web server
authentication
Using RADIUS for Authentication
RADIUS Server
Domain
Controller
RADIUS Client
TMG
Server
Using RADIUS for authentication means that TMG Server can
authenticate users based on their Active Directory credentials
without requiring that the computer running TMG Server be a
member of an Active Directory domain
How to Implement RADIUS Server for TMG
Authentication
To implement RADIUS authentication:
1
Install and configure NPS to use Active Directory
for authentication and configure the TMG Server
as a RADIUS client
2
Configure the Active Directory user accounts or
configure remote access policies to enable dial-in
access
3
Configure TMG Server to use the RADIUS server
and configure a Web listener to use RADIUS
authentication
Lab: Configuring Access to Internal Resources
Exercise 1: Configuring TMG Server
Authentication and Secure Publishing
Exercise 2: Testing the TMG
Server Configuration
InternalWeb-01
InternetWeb-01
TMG-xx
Internet
DC-xx
Module 6: Configuring
Virtual Private Network
Access for Remote Clients
and Networks
Overview
Virtual Private Networking Overview
Configuring Virtual Private Networking for
Remote Clients
Configuring Virtual Private Networking for Remote Sites
Configuring VPN Quarantine Control Using
Forefront TMG
Lesson: Virtual Private Networking Overview
What Is Virtual Private Networking?
VPN Protocol Options
VPN Authentication Protocol Options
VPN Quarantine Control
Virtual Private Networking Using Routing and
Remote Access
Virtual Private Networking Using Forefront TMG
Benefits of Using TMG Server for
Virtual Private Networking
What Is Virtual Private Networking?
TMG
Server
Branch Office
VPN Protocol Options
Factor
PPTP advantages
and disadvantages
L2TP/IPSec
advantages and
disadvantages
Client operating
systems
supported
Windows 2000,
Windows XP, Windows Server 2003,
Windows NT Workstation 4.0,
Windows ME, or Windows 98
Windows 2000 up
Certificate
support
Requires a certificate infrastructure
only for EAP-TLS authentication
Requires a certificate
infrastructure or a
pre-shared key
Security
NAT support
Provides data encryption
Does not provide data integrity
To locate PPTP-based VPN clients
behind a NAT, the NAT should
include an editor that can translate
PPTP
Provides data
encryption, data
confidentiality, data origin
authentication, and
replay protection
To locate L2TP/IPSec–
based clients or servers
behind a NAT, both client
and server must support
IPSec NAT-T
VPN Authentication Protocol Options
Authentication
protocol
PAP
SPAP
CHAP
MS-CHAP
MS-CHAPv2
EAP-TLS
Considerations
Uses plaintext passwords and is the least secure
authentication protocol
Uses a reversible encryption mechanism employed by
Shiva
Requires passwords stored by using reversible encryption
Compatible with Macintosh and UNIX-based clients
Data cannot be encrypted
Does not require that passwords be stored by using
reversible encryption
Encrypts data
Performs mutual authentication
Data is encrypted by using separate session keys for
transmitted and received data
Most secure remote authentication protocol
Enables multifactor authentication
VPN ต้ องมีการ Authentication
PAP ใช้ รหัสผ่ านตรวจสอบอย่ างเดียว
SPAP กลไกการตรวจสอบรหัสผ่ านแบบ Reversible
CHAP ต้ องการรหัสผ่ านทีเ่ ก็บ และใช้ แบบ Reversible encryption
MS-CHAP เป็ นเทคนิคการ Reversible ของ Microsoft
MS-CHAPv2 เป็ นเทคนิคการทา Mutual authentication
EAP-TLS เป็ นความปลอดภัยทีอ่ าศัยหลากหลายกลไก
187
PAP & SPAP
S1
รหัสผ่าน PAP
S2
SPAP
นารหัสผ่านตรวจสอบผูล้ อ็ กออน
Positive
188
CHAP, MSCHAP
pass1
A
S1
CHAP
นาชื่อผูใ้ ช้+รหัสผ่าน
S2
ตอบ Ack
Algorithm A
เข้ารหัสด้วยเทคนิค
MS-CHAP
Algorithm A
นาชื่อผูใ้ ช้+รหัสผ่าน ถอดรหัสด้วยเทคนิค
A pass1
B pass2
C pass3
ตอบ Ack
189
MSCHAP v2
Mutual Authentication
A + pass1
MS-CHAP v 2
นาชื่อผูใ้ ช้ A
Validation Key (Server)
Validation Key (Login)
เข้ารหัสด้วยเทคนิค
Validation Key
ถอดรหัสด้วยเทคนิค
A pass1
B pass2
C pass3
ถ้า Validation Key จาก Login กับ Server ตรงกันยอมให้ผา่ น
190
EAP-TLS (Extensible Authentication protocolTransport layer Security)
Multi Factor Authentication
A+pass1 + MD5 หรื อ Smart card
A pass1 smartcard
B pass2 smartcard
C pass3 smartcard
A+pass1
เข้ารหัสในการขนส่ งระหว่างติดต่อ
191
VPN Quarantine Control
VPN Quarantine Control:
Enables screening of VPN client machines
before granting them access to the organization’s
network
Uses a client script that analyzes the security
configuration of the remote access client
VPN clients connecting to TMG Server with approved
security configurations are moved from the VPN
Quarantine network to the VPN Clients network
Virtual Private Networking Using Routing and Remote
Access
RRAS supports:
Remote access policies that define remote access
connections and connection parameters
Connection Manager components to simplify the
configuration of remote access clients
RADIUS servers for authentication and the
centralization of remote access policies
VPN quarantine control to restrict network access to
quarantined clients
Packet filtering for securing VPN and network
quarantine connections
Virtual Private Networking Using Forefront TMG
TMG Server enables VPN access:
Including remote client VPN access for individual
clients and site-to-site VPN access to connect
multiple sites
By enabling VPN-specific networks including:
 VPN Clients network
 Quarantined VPN Clients network
 Remote-site networks
By using network and access rules to limit network
traffic between the VPN networks and the other
networks with servers running TMG Server
By extending RRAS functionality
Benefits of Using TMG Server for Virtual Private
Networking
Benefits
Connection
security
Explanation
TMG Server uses firewall access policies to inspect
and filter all traffic from VPN clients
Quarantine control
for Windows 2000
TMG Server is optimized to enforce complex security
requirements on VPN connections
VPN quarantine is not available in Windows 2000
RRAS but can be enabled with TMG Server 2004 on
Windows 2000
Logging and
monitoring
TMG Server can log all VPN connections and
enables live monitoring of VPN connections
IPSec tunnel-mode
stateful inspection
Enables stateful inspection to enforce user/group,
site, computer, protocol, and application-layer access
controls for IPSec tunnel-mode traffic
Enhanced
protection
TMG Server is protected via firewall access policy on
all interfaces
Performance
Lesson: Configuring Virtual Private Networking for
Remote Clients
VPN Client Access Configuration Options
How to Enable and Configure VPN Client Access
Default VPN Client Access Configuration
How to Configure VPN Address Assignment
How to Configure VPN Authentication
How to Configure Authentication Using RADIUS
How to Configure User Accounts for VPN Access
How to Configure VPN Connections from
Client Computers
VPN Client Access Configuration Options
Click the
Virtual Private
Networks
(VPN) node to
access the
VPN client
access
configuration
options
How to Enable and Configure VPN Client Access
Use user mapping is to apply firewall policies to users who do not
use Windows authentication
Default VPN Client Access Configuration
Component
Default Configuration
System policy rules
System policy rule that allows the use of
PPTP, L2TP, or both is enabled
VPN access network
TMG Server will listen for VPN client
connections only on the External network
VPN protocols
Only PPTP is enabled for VPN client access
Network rules
A route relationship between the VPN Clients
network and the Internal network
A NAT relationship between the VPN Clients
network and the External network
Firewall access rules
No firewall access rules are enabled
Remote access policy
Default policy requires MS-CHAP
v2 authentication
How to Configure VPN Address Assignment
Configure DNS and WINS servers
using DHCP or manually
Configure static IP address
assignment or DHCP
How to Configure VPN Authentication
Accept default for
secure authentication
Configure EAP for
additional security
Configure less secure
options only if required
for client compatibility
How to Configure Authentication Using RADIUS
Enable RADIUS for authentication
and accounting, and then
configure a RADIUS server
How to Configure User Accounts for VPN Access
Configure dial-in and
VPN access permissions
How to Configure VPN Connections from Client Computers
Practice: Configuring VPN Access for Remote Clients
Configuring VPN access on TMG Server
Configuring user account
dial-in permissions
Configuring and testing a VPN
client configuration
Client-XX
TMG-XX
Den-DC-01
Internet
What Is SSTP VPN?
New Feature VPN on TMG Server for tunnels PPP
connections over an SSL encrypted HTTP connection.
SSTP provides:
Enhance connectivity channel — no need to use only
PPTP and L2TP/IPSec
Ease of Manage Firewall Policy (only allow Port 80/443 )
Client requirement:
Vista SP1 and above.
Need to Place CA Certificate in Trust Root CA.
How to Set SSTP VPN?
SSTP VPN Server Require:
Only Windows 2008 or Windows 2008 R2
TMG need to request Web Server Certificate.
Web Listener is configured to allow anonymous connections.
Give dedicated IP Address for the Web listener.
Can not use together with Web listener that’ use for pre-authen
published Web servers.
If use Internal CA: need to publish CRL (Certificate Revocation
List) to client by http channel.
Lesson: Configuring Virtual Private Networking for
Remote Sites
Site-to-Site VPN Access Configuration Components
About Choosing a VPN Tunneling Protocol
How to Configure a Remote-Site Network
Network and Access Rules for Site-to-Site VPNs
How to Configure the Remote-Site VPN Gateway Server
How to Configure Site-to-Site VPNs Using IPSec
Tunnel Mode
Site-to-Site VPN Access Configuration Components
Component
Default Configuration
Choose a
VPN protocol
Choose the appropriate protocol-based
security requirements and the VPN gateway
servers
Configure a remotesite network
The remote-site network includes all IP
addresses in the remote site
Configure VPN
client access
VPN client access must be enabled in order to
enable site-to-site access
Configure network
rules and access
rules
Use access rules or publishing rules to make
internal resources accessible to remote office
users
Configure the
remote-site VPN
gateway
Configure the remote office VPN server to
connect TMG Server and to accept
connections from TMG Server
About Choosing a VPN Tunneling Protocol
Protocol
Use to
Comments
IPSec Tunnel
Mode
Connect to nonMicrosoft VPN
gateways
Only option if you are
connecting to a non-Microsoft
VPN server
Requires certificates or
pre-shared keys
L2TP over
IPSec
Connect to TMG
Server or Windows
RRAS VPN
gateways
Requires user name and
password and certificates or
pre-shared keys for
authentication
PPTP
Connect to TMG
Server or Windows
RRAS VPN
gateways
Requires user name and
password for authentication
Less secure than L2TP over
IPSec
About Choosing a VPN Tunneling Protocol
How to Configure a Remote-Site Network
Configuration Option
Explanation
VPN protocol
Choose the tunneling protocol that you will
use to connect to the remote site
Remote VPN server
Enter the server name or IP address for
the VPN gateway server in the remote site
Remote authentication
Enter a user name and password that will
be used to initiate a VPN connection to the
remote-site VPN gateway server
L2TP/IPSec
authentication
If required, configure a pre-shared key that
will be used to authenticate the computers
when creating the tunnel
Network address
Configure the IP address range for all of
the computers in the remote-site network
Network and Access Rules for Site-to-Site VPNs
To enable network traffic across a site-to-site VPN:
Two system policy rules are enabled:
 Allow VPN site-to-site traffic to TMG Server
 Allow VPN site-to-site traffic from TMG Server
Create a network rule for remote-site networks
Configure access rules or publishing rules enabling or
restricting network access
 For full access, allow all protocols through
TMG Server
 For limited access, configure access rules or
publish rules that define allowed network traffic
How to Configure the Remote-Site VPN Gateway Server
To configure the remote site VPN gateway server:
Configure the remote-site VPN gateway to use the same
tunneling protocol
Configure the connection to the main-site VPN gateway
Configure network routing rules that enable or restrict
the flow of network traffic between networks
How to Configure Site-to-Site VPNs Using IPSec Tunnel
Mode
To configure site-to-site VPNs using IPSec tunnel mode:
Configure a local VPN gateway IP address used by the
computer running TMG Server to listen for VPN
connections
Configure the VPN gateways to use a certificate or a
pre-shared key for authentication
Configure advanced IPSec settings to optimize
VPN security
Lesson: Configuring Quarantine Control Using Forefront
TMG
How Does Network Quarantine Control Work?
About Quarantine Control on TMG Server
How to Prepare the Client-Side Script
How to Configure VPN Clients Using
Connection Manager
How to Prepare the Listener Component
How to Enable Quarantine Control
How to Configure Internet Authentication Service
for Quarantine Control
How to Configure Quarantine Access Rules
How Does Network Quarantine Control Work?
VPN Clients Network
Domain
Controller
Web
Server
Quarantine script
Quarantine remote
access policy
RQC.exe
TMG
ISA
Server
DNS
Server
File
Server
VPN Quarantine
Clients Network
How to Enable VPN Clients Quarantine
About Quarantine Control on TMG Server
To implement quarantine control on TMG Server:
1
Create a client-side script that validates
client configuration
2
Use CMAK to create a CM profile for remote
access clients
3
Create and install a listener component
4
Enable quarantine control on TMG Server
5
Configure network rules and access rules for the
Quarantined VPN Clients network
How to Prepare the Client-Side Script
The client-side script:
Can be an executable file, a script, or a simple
command file
Contains a set of tests to ensure that the remote
access client complies with network policy
Runs Rqc.exe if all of the tests specified in the script
are successful
Command for running Rqc.exe
rqc ConnName TunnelConnName TCPPort Domain
UserName ScriptVersion
How to Configure VPN Clients Using Connection Manager
To configure VPN clients using Connection Manager:
Configure a quarantine VPN client profile
that includes:
 A post-connect action that runs the
client-side script
 A client-side script that checks the client security
configuration
 A notification component
Distribute and install the client profile on all remote
clients that require quarantined VPN access
How to Prepare the Listener Component
Command for running ConfigureRQSforISA.vbs
Cscript ConfigureRQSForISA.vbs /install
SharedKey1\0SharedKey2 pathtoRQS.exe
ConfigureRQSforISA.vbs:
Installs RQS as a Network Quarantine Service
Creates an access rule that allows communication on
port 7250 from the VPN Clients and Quarantined VPN
Clients networks to the Local Host network
Modifies registry keys on the computer running TMG
Server so that RQS will work with TMG Server
Starts the RQS service
Module 7:
Implementing Caching
Overview
Caching Overview
Configuring General Cache Properties
Configuring Cache Rules
Configuring Content Download Jobs
Lesson: Caching Overview
What Is Caching?
How Caching Works for Requests for New Objects
How Caching Works for Requests for Cached Objects
How Content Download Jobs Work
How Caching Is Implemented in TMG Server 2004
Web Proxy Chaining and Caching
What Is Caching?
TMG Server caching stores a copy of requested Web
content in the server memory or on the hard disk
TMG Server caching provides:
Improved performance — information is stored on the
computer running TMG Server
Reduced bandwidth usage — no additional Internet
network traffic
TMG Server caching scenarios include:
Forward caching — Internet Web servers
Reverse caching — internal Web servers
How Caching Works for Requests for New Objects
Server
RAM
Server
hard disk
6
www.contoso.com
4
1
2
3
5
http://www.contoso.com
TMG
Server
How Caching Works for Requests for Cached Objects
Server
RAM
Server
hard disk
www.contoso.com
2
1
3
http://www.contoso.com
TMG
Server
How Content Download Jobs Work
Server
RAM
Server
hard disk
www.contoso.com
4
1
2
3
5
http://www.contoso.com
TMG
Server
How Caching Is Implemented in Forefront TMG
TMG Server caching optimizes Web caching
performance by:
Using RAM and disk caching
Maintaining the RAM cache in physical memory
Maintaining a directory of cached items
Using a single cache file
Providing quick recovery
Using efficient cache updates
Providing automatic cleanup
Web Proxy Chaining and Caching
4
Internet
35
2
Branch Office
Branch Office
Head Office
6
1
Lesson: Configuring General Cache Properties
Caching Configuration Components
How to Enable Caching and Configure Cache Drives
How to Configure Cache Settings
Caching Configuration Components
Component
Explanation
Define cache drives
Enables caching by configuring a cache
drive for storing the cached content
Configure caching
settings
Modifies the default TTL and types of
cached content
Configure caching
rules
Enables unique caching policies for
specific Web content
Configure content
download jobs
Enables the prefetch of content before
clients request the content
How to Enable Caching and Configure Cache Drives
Enable Caching
How to Enable Caching and Configure Cache Drives cont.
Caching is disabled
by default on
Forefront TMG.
When you enable
caching, TMG Server
creates a file with an
initial size equal to
the size you chose
for the maximum
cache size on the
hard disk
Practice: Configuring General Cache Properties
Enabling Web Caching on TMG Server
Configuring Web caching on TMG Server
TMG-XX
Internet
Lesson: Configuring Cache Rules
What Are Cache Rules?
How to Create a Cache Rule
Managing Cache Rules
การกาหนดค่ ารายละเอียดใน Caching
โดยทัว่ ไปจะมี Default Cache
ดีฟอลท์ จะกาหนด To: All Network
กาหนดค่ าของ HTTP และ FTP
กาหนดการดาวน์ โหลดอัตโนมัติ
กาหนดค่ าขนาดของไฟล์ ที่เก็บแคชของ HTTP
กาหนดขนาดไฟล์ ของ FTP
239
What Are Cache Rules?
Cache rule options
Define the destination set that
the rule applies to
Define how content is returned
to the user
Define whether content is
stored in the cache
Default cache rule
Applies to all Web content
Returns non-expired content
to the user
Caches the default
cacheable objects
Define whether to cache HTTP,
FTP, or both types of content
Enables caching of both
HTTP and FTP content
Define the maximum size for
cached objects
Does not apply any size
restrictions to cached objects
Define whether to cache
SSL content
Caches SSL content
How to Create a Cache Rule
Cache Rule
Wizard Page
Cache Rule
Destinations
Content Retrieval
Cache Content
Cache Advanced
Configuration
HTTP Caching
FTP Caching
Configuration Options
Use destination sets to define the Web
content that this rule applies to
Defines how TMG Server responds to
client requests if the content is or is not in
cache
Defines the types of content TMG Server
will cache
Defines maximum size for caching objects
and SSL response caching
Enables and configures TTL settings for
HTTP content
Enables and configures TTL settings for
FTP content
Managing Cache Rules
Managing cache rules includes:
Modifying the cache rule configuration after creating
the rule
Modifying the cache rule order to evaluate cache
rules for specific Web sites before cache rules for
all Web sites
Disabling or deleting cache rules that are no
longer required
Exporting the cache rule configuration before
modifying the cache rules in case the modification is
not successful
กาหนดแคชใน HTTP
243
HTTP Cache (Case 1)
Web Client
`
1
Web Server
2
HTTP Header
Ex: 1 Days
3
1 Days
Set 20% of TTL >> 24/5 = 4.8 Hours (Interval update)
Set 50% of TTL >> 24/2 = 12 Hours
Set Min & Max 1 Hours & 24 Hours
Select 4.8 Hours for 20%
Select 12 Hours for 50%
244
HTTP Cache (Case 2)
Web Client
`
1
Web Server
2
HTTP Header
Ex: 1 Week
3
1 Days
Set 20% of TTL >> 7*24/5 = 33.6 Hours (Interval update)
Set 50% of TTL >> 7*24/2 = 86 Hours
Set Min & Max 1 Hours & 24 Hours
Select 24 Hours for 20%
Select 24 Hours for 50%
245
HTTP Cache (Case 3)
Web Client
`
1
Web Server
2
HTTP Header
Ex: 2.5 Days
3
1 Days
Set 20% of TTL >> 2.5*24/5 = 12 Hours (Interval update)
Set 50% of TTL >> 2.5*24/2 = 30 Hours
Set Min & Max 1 Hours & 24 Hours
Select 12 Hours for 20%
Select 24 Hours for 50%
246
Content Retrieval
ถ้ ามีแคชอยู่ และยังไม่ หมดอายุ ถ้ าไม่
มีจะวิง่ ไปทีเ่ ว็บภายนอก
ถ้ ามีแคชไม่ ว่าจะหมดอายุหรือไม่ จะ
ตอบกลับให้ ถ้ าไม่ มีจะวิง่ ไปที่เว็บ
ภายนอก
ใช้ เฉพาะกรณีที่มเี ก็บไว้ ในแคช ถ้ าไม่
มีไม่ ยอมให้ ติดต่ อออกภายนอก
247
Practice: Configuring Cache Rules
Configuring cache rules on TMG Server
TMG-XX
Internet
Lesson: Configuring Content Download Jobs
What Are Content Download Jobs?
How to Create a Content Download Job
Managing Content Download Jobs
What Are Content Download Jobs?
Content download jobs:
Allow you to schedule content for download at a
specific time even if no user on the network has
requested the content
Improve Internet access performance
Can be used to download content to the branch
office during nonworking hours
Can be used to ensure access to critical Internet
content even when the Internet connection is
not available
How to Create a Content Download Job
Content Download
Job Wizard Page
Download
Frequency
Configuration Options
Defines a schedule for when the content
download will occur
Defines the content that will
be downloaded
Content Download
Content Caching
Includes maximum links, objects,
and concurrent connections used
for downloads
Defines what types of content to cache
Defines the TTL for cached content
Managing Content Download Jobs
Managing content download jobs includes:
Modifying the content download job configuration
after creating the job
Starting content download jobs outside the
scheduled time or stopping content download jobs
that are running
Disabling or deleting content download jobs that are
no longer required
Practice: Configuring Content Download Jobs
Creating a Content Download Job
Internet-Web-XX
TMG-XX
Internet
Module 8: Monitoring
Forefront TMG
Overview
Monitoring Overview
Configuring Alerts
Configuring Session Monitoring
Configuring Logging
Configuring Reports
Monitoring Connectivity
Monitoring Services and Performance
Lesson: Monitoring Overview
Why Implement Monitoring?
TMG Server Monitoring Components
Designing a Monitoring and Reporting Strategy
Using the TMG Server Dashboard for Monitoring
Why Implement Monitoring?
Use monitoring to:
Monitor traffic between networks to ensure that only
legitimate traffic passes between networks
Troubleshoot network connectivity between TMG
Server clients, servers, and networks
Collect information about attacks and to detect attacks
as they occur
Plan future modifications to the TMG Server or Internet
access infrastructure
TMG Server Monitoring Components
Components
Explanation
Alerts
Monitors TMG Server for configured events and
then performs actions when the specified events
occur
Sessions
Provides information on the current client sessions
Logging
Reports
Connectivity
Performance
Provides detailed archived information about the
Web Proxy, Microsoft Firewall service, or SMTP
Message Screener
Summarizes information about the usage patterns
on TMG Server
Monitors connections from TMG Server to any other
computer or URL on any network
Monitors server performance in real time, create a
log file of server performance or configure
performance alerts
Designing a Monitoring and Reporting Strategy
When:
Determine:
Which events should trigger an alert
Monitoring realtime information
The event threshold before the alert is triggered
Collecting longterm information
The information you need to monitor server
usage
The information that you need to monitor server
performance
The information you need to monitor server
performance over time
The information you need to monitor security
events
Developing a
response
strategy
How to respond to the critical events that occur
on the TMG Server
Using the TMG Server Dashboard for Monitoring
Monitor
Session
Monitor
Alert
Monitor
update
Monitor
Service
Monitor
Performance
Lesson: Configuring Alerts
What Is an Alert?
How to Configure Alert Definitions
How to Configure Alert Events and Conditions
How to Configure Alert Actions
Alert Management Tasks
What Is an Alert?
An alert is:
A notification of an event or action that has occurred
on TMG Server
Triggered according to the conditions and trigger
thresholds specified for the event associated with
the alert
When a server event takes place and records an alert:
The TMG Server Management console displays the
alert in the Alerts view
An entry appears in the alerts view that lists column
headings such as type of alert, the date and time,
status, and category
How to Configure Alert Definitions
How to Configure Alert Category and Actions
Alert Management Tasks
Alerts are managed by performing the following tasks:
Acknowledge registered alerts
Reset registered alerts
When you configure an alert to stop the TMG Server
Firewall Service, TMG Server goes into a lockdown
mode. While in lockdown mode, TMG Server blocks
most network traffic
Practice: Configuring and Managing Alerts
Creating a New Alert Definition
Modifying an Existing Alert Definition
TMG-XX
Internet
Lesson: Configuring Session Monitoring
What Is Session Monitoring?
About Managing Sessions
How to Configure Session Filtering
What Is Session Monitoring?
Session monitoring:
Provides real-time information about client sessions
hosted through TMG Server
Includes information on:
 When the session was established
 The session type
 The source network
 The client user name and computer name
Provides the ability to immediately stop any unwanted
sessions
About Managing Sessions
Right click session
to disconnect
Use these options
to manage sessions
How to Configure Session Filtering
Add multiple filters
Configure
filters to view
specific sessions
Practice: Configuring Session Monitoring
Monitoring Sessions
Applying a Session Filter
Internet-Web-XX
TMG-XX
Internet
ClientXX
DC-01
Lesson: Configuring Logging
What Is Logging?
Log Storage Options
How to Configure Logging
How to View TMG Server Logs
How to Configure Log Filter Definitions
What Is Logging?
The logging feature:
Provides extended log storage to generate reports,
analyze trends, or investigate security issues
Can be configured to provide Firewall logging, Web
proxy logging, and SMTP message screener logging
Provides a log viewer to assist in monitoring and
analyzing server activity for MSDE-based logs
Log Storage Options
Log storage option:
Explanation:
Logs can be viewed in the log viewer
MSDE
Default format for Web proxy and
Firewall Service logs
Logs can be stored on separate server
SQL database
Logs can be analyzed by using
database tools
Logs can be stored in W3C or TMG
Server format
File
Only available format for SMTP
message screener logs
The MSDE and log files are stored by default in the ISALogs folder,
which is located in the TMG Server installation folder
How to Configure Logging
Configure log
storage format
Configure the
information
captured in the logs
How to View TMG Server Logs
How to Configure Log Filter Definitions
Load/Save filters
Configure filters
to view specific log entries
Lesson: Configuring Reports
What Are Reports?
How to Configure the Report Summary Database
How to Generate a Report
How to Create a Recurring Report Job
How to View Reports
How to Publish Reports
What Are Reports?
Use reporting to summarize and analyze:
Who is accessing the Internet, as well as which web
sites are being accessed
Which protocols and applications are being used most
often
General traffic patterns
The cache hit ratio
Reports can be generated immediately
Reports need to be scheduled to generate on a
recurring basis
How to Configure the Report Summary Database
Select to enable
log summaries
Configure summary
files location
Configure number
of saved summaries
How to Generate a Report
Configure
the content
to include in
the report
Configure the
time period
included in
the report
Configure where
the report will
be stored
How to Create a Recurring Report Job
Configure the
content to include
in the recurring report
Configure when
the recurring
report will run
How to View Reports
Reports can be viewed:
 Only on the computer running TMG
Server Management
 By double-clicking the report name
in the Report view of
TMG Server Management
How to Publish Reports
You can publish reports to a shared folder where users without
TMG Server Management installed can view the reports
Practice: Configuring Reports
Generating a Report
Creating a Recurring Report Job
Internet-Web-XX
TMG-XX
Internet
ClientXX
DC-01
Lesson: Monitoring Connectivity
How Does Connectivity Monitoring Work?
Configuring Connectivity Monitoring
How Does Connectivity Monitoring Work?
Connectivity monitoring:
Uses connectivity verifiers to monitor connections
from TMG Server to other servers or URLs
Can be configured to use any of the following in
connection methods:
 Ping to check for simple network connectivity
 TCP connection to verify that a service is running on
the destination server
 HTTP GET request to verify that a Web server is
running on the destination server
Configuring Connectivity Monitoring
Configure the URL
or server to connect to
Configure the method
used to test connectivity
Practice: Configuring Connectivity Monitoring
Configuring Connectivity Monitoring
TMG-XX
Internet
Lesson: Monitoring Services and Performance
Monitoring TMG Server Services
Performance Monitoring with TMG Server
Monitoring TMG Server Services
Performance Monitoring with TMG Server
Performance Objects
TMG Server Package
Engine
TMG Server Cache
TMG Server Firewall
Service
TMG Server Web Proxy
Service
Explanation
Includes performance counters to monitor
connections and throughput for the firewall
engine
Includes performance counters to monitor the
memory, disk, and URL activity associated with
the cache as well as cache performance
Includes counters to monitor Firewall service
connections and associated services such as
DNS. This object monitors only TMG Client
connections
Includes counters to monitor the number of
users and the rate at which TMG Server
transfers data for Web Proxy clients to remote
and upstream servers
Monitoring the TMG Server counters as well as other performance
counters to determine server performance and bottlenecks
Example: Performance Monitoring with TMG Server
You can monitor TMG Resource separate counter and
object.
Lab: Monitoring TMG Server
Exercise 1: Testing the Alerts Feature
Exercise 2: Testing the Reporting Feature
Exercise 3: Testing the Connectivity
Monitoring Feature
TMG-XX
Internet
THANK YOU
Download