forefront threat management gateway 2010 management console

Upload: avinash-kr-singh

Post on 05-Apr-2018

222 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/31/2019 Forefront Threat Management Gateway 2010 Management Console

    1/13

    Forefront Threat Management Gateway 2010

    Management Console

    New and Improved

    Rule Base Search This feature has been a long time coming! The new search

    functionality included in the TMG management console makes managing large and complex

    rule sets much simpler. Want to display any rule that uses the DNS protocol? Simply enterDNS in the search box and click the magnifying glass icon to execute the search.

    Figure 1

    The main window displays any rule that includes the DNS protocol.

  • 7/31/2019 Forefront Threat Management Gateway 2010 Management Console

    2/13

    Figure 2

    There are several ways to construct queries. You can choose free text, name:value pairs,

    and property:value pairs. For more information, click the Examples link next to the searchbox.

    Web Access Policy The new Web Access Policy node in the navigation tree displays aconsolidated view of Web access rules configured in TMG.

    Figure 3

  • 7/31/2019 Forefront Threat Management Gateway 2010 Management Console

    3/13

    Figure 4

    As with the rule base search functionality, this will significantly simplify administration for

    implementations with large and complex rule sets. A clear and concise view of web accessrules reduces the chance of configuration error. Quick and easy access to common settings

    for enabling web access is also included in this view. These settings include web proxyconfiguration, authentication, compression, HTTPS inspection, malware inspection, and webcaching.

    Routing Configuration Highlight the Networking node in the navigation tree and youwill see a new tab called Routing.

  • 7/31/2019 Forefront Threat Management Gateway 2010 Management Console

    4/13

    Figure 5

    Figure 6

    Here you can create network topology routes (static routes). It is no longer necessary toconnect to each TMG firewall individually and enter route commands from the command

    line. To add a static route, click on the Create Network Topology Route link in the taskpane.

  • 7/31/2019 Forefront Threat Management Gateway 2010 Management Console

    5/13

    Figure 7

    Enter the destination host or network, the appropriate subnet mask, and the next hopgateway address. You can also specify a metric if required.

    Figure 8

    This feature also allows you to view the routing configuration for each TMG firewall.

  • 7/31/2019 Forefront Threat Management Gateway 2010 Management Console

    6/13

    Figure 9

    Network Interface Configuration In addition to being able to configure static routes inthe management console, you can also configure network interface properties. Highlight theNetworking node in the navigation tree and select the Network Adapters tab.

    Note:

    This tab is only visible when running the management console on an array member. It is notdisplayed in the management console on the Enterprise Management Server.

  • 7/31/2019 Forefront Threat Management Gateway 2010 Management Console

    7/13

    Figure 10

    Figure 11

    Right-click on a network interface and choose Properties. Here you can change IP

    addresses, subnet masks, default gateways, and configure DNS servers. Additionally you

    can enable or disable interfaces.

  • 7/31/2019 Forefront Threat Management Gateway 2010 Management Console

    8/13

    Figure 12

    Figure 13

    Getting Started Wizard After TMG is installed, opening the management console for thefirst time will launch the Getting Started Wizard.

  • 7/31/2019 Forefront Threat Management Gateway 2010 Management Console

    9/13

    Figure 14

    Here you are prompted to configure network and system settings and also define your

    deployment options. In the event you need to make significant configuration changes to

    your system or redefine deployment options post-installation, you can run the wizard againby highlighting the top node in the navigation tree then selecting the Tasks tab in the taskpane and clicking on the Launch Getting Started Wizard link.

  • 7/31/2019 Forefront Threat Management Gateway 2010 Management Console

    10/13

    Figure 15

    Please note that you cannot run the Getting Started Wizard when the TMG firewall is amember of an array. Attempting to launch the wizard will generate the following error:

    Figure 16

    Network Load Balancing (NLB) Configuration TMG now includes the ability to changethe NLB operating node in the GUI.

  • 7/31/2019 Forefront Threat Management Gateway 2010 Management Console

    11/13

    Figure 17

    In the past, this change could only be made programmatically. This made confirming thesettings difficult, requiring the administrator to drop down to the command line forverification.

    Dashboard System Performance The dashboard overview in the TMG management

    console now displays new counters for system performance. CPU Usage and Available

    Memory are included; this is much more useful to the average TMG administrator than theAllowed Packets/Sec and Dropped Packets/Sec that previous versions included.

    Figure 18

    Connectivity Test Highlighting the Troubleshooting node in the navigation tree showsa new Connectivity Test tab.

  • 7/31/2019 Forefront Threat Management Gateway 2010 Management Console

    12/13

    Figure 19

    Figure 20

    This new tool allows you to test basic web connectivity from the firewall in the managementconsole. Complete the Destination URL: field and click the Test Connectivity button toperform the test. Optionally you can select to run a pathping during the test to gatheradditional information. Be aware that the destination URL cannot contain a path, so if you

    are in the habit of adding the trailing slash when entering URLs like I am, you will see thefollowing error:

  • 7/31/2019 Forefront Threat Management Gateway 2010 Management Console

    13/13

    Figure 21

    Firewall Policy Grouping This is another feature administrators of large and complex

    rule sets will appreciate. To create a rule group select one or more rules, right-click on theselected rule(s) and choose Create Group.

    Figure 22

    Give the policy group a descriptive name and choose Ok.

    Figure 23

    The rules you selected are now part of a group. By right-clicking on the group and choosing

    Properties you can enable, disable, or move the entire group. You can also rename thegroup or ungroup these rules.