Forefront Threat Management Gateway (TMG) 2010 Survival Guide
We encourage you to enhance this guide by identifying missing areas (scenarios, features, lifecycle...), provide links to and write descriptions of existing content, and providing new content where there are gaps. Join the community!
Introduction
Forefront Threat Management Gateway (TMG) 2010 is a firewall that can be deployed in a variety of scenarios that assist you in protecting internal network resources. The core scenarios where Forefront TMG can be used are described in the diagram below:
Besides the core scenarios shown in the above diagram, Forefront TMG 2010 also can be used for:
Forefront TMG 2010 is an evolution of its predecessor, ISA Server 2006. You can accrue many advantages by migrating from ISA Server 2006 (or previous versions) to Forefront TMG 2010; read this article to understand the reasons to perform this migration. If you are still using ISA 2000 or ISA 2004, review this article regarding mainstream support for those products.
The next sections of this article will describe what you need in order to plan, deploy and configure Forefront TMG 2010 in your network.
Planning
When planning Forefront TMG 2010 implementation it is important to identify the purpose of having TMG installed in your network. Are you going to use as reverse proxy? Forward proxy? VPN Server? Site to Site VPN Gateway? Winsock Proxy? Network Firewall? IDS/IPS? These are questions that you will need to answer before deploying TMG. The main resources that you can use in this phase are:
If you currently have ISA Server 200x installed on your network, make sure to use the resources below while planning the migration:
During this planning phase you might decide to implement Forefront TMG 2010 in a virtual environment. In order to correctly plan your Edge virtualization, make sure to use the resources below:
- Security Considerations with Forefront Edge Virtual Deployments
- Virtualize your ISA or Forefront TMG servers
If you don't have experience with Forefront TMG 2010, it is important to get some hands on experience before deploying it in production. There are a series of online resources that can help you with that:
- Forefront TMG Virtual Lab
- Microsoft Business Ready Security Trial Environment (VHD)
- Forefront TMG 2010 Trial Version
Last but not least, you also can use this phase to plan how to use Forefront TMG as an e-mail protection mechanism. Follow the guidelines from the article “Planning to protect against e-mail threats” in order to plan for this scenario.
High Availability Considerations while Planning Forefront TMG Deployment
Forefront TMG 2010 has a set of features that can assist you while deploying a scenario that requires high availability. Here are some core TMG features in this area:
- High availability and scalability design guide for Forefront TMG
- Planning for Forefront TMG server high availability and scalability
- Keeping High Availability with Forefront TMG’s ISP Redundancy Feature
- Forefront TMG Feature Deepdive – ISP Redundancy
- Forefront TMG Network Load Balancing Improvements
- Implementing WPAD on Forefront TMG
Security Considerations while Planning Forefront TMG Deployment
As Forefront TMG 2010 can be used as a firewall, it’s normal that many IT Administrators want to perform some sort of hardening on the system.
The only supported way to harden a Forefront TMG system is by using the Windows Server 2008 Security Configuration Wizard (SCW). There is an update for TMG in the Microsoft® Forefront Threat Management Gateway (TMG) 2010 Tools & Software Development Kit that introduces a newer template to be used on SCW to harden a Forefront TMG system. This method applies hardening to Forefront TMG and the Windows Server 2008 installation on which TMG is installed. Failure to comply with this requirement (that is, creating a nonstandard hardening solution) can cause problems, as the ones described in this blog post.
The other security debate that exists around Forefront TMG while installing as a firewall is whether or not the computer should belong to an Active Directory domain. There are many circumstances that push the IT Administrator to make the choice of installing TMG in a workgroup rather than joining to a domain. The recommendation is to evaluate potential risks to your own environment before choosing the best option.
Also, read the articleDebunking the Myth that the ISA Firewall Should Not be a Domain Member to get a better understanding of both sides of this deployment. If Forefront TMG 2010 is to be part of a domain, make sure to have an isolated OU and Domain Policy for the Forefront TMG computers. The reason for that is because there are some scenarios where changes to group policy can cause issues on Forefront TMG, such as the one listed in this blog post.
While deploying Forefront TMG 2010 in Branch Offices, you can also consider a security practice of installing Forefront TMG in a Read Only Domain Controller (RODC), which is a new capability introduced in Forefront TMG 2010 SP1 Update 1. For more information on how to perform this operation read the article Installing Forefront TMG on a RODC.
Authentication is another important subject while planning publishing and web access for an application through Forefront TMG. TMG can perform authentication of resources for web access or web publishing (or both). The resources below will be useful while considering authentication in TMG:
- General Authentication
- Web Publishing
- Web Access
- Web Access Authentication
- Improving Web Proxy Client Authentication Performance
- Understanding By-Design Behavior of ISA Server 2006: Using Kerberos Authentication for Web Proxy Requests on ISA Server 2006 with NLB (also valid for Forefront TMG 2010 SP1 Update 1 Rollup 3)
Deploying Forefront TMG 2010
During the deployment phase the main resource that you should use is the Forefront TMG 2010 Deployment Guide. The guide supplies the core steps to prepare and install Forefront TMG 2010. As a best practice, you should also update Forefront TMG 2010 in the following order:
Forefront TMG 2010 SP1 Update 1 and
- Forefront TMG 2010 SP1 Update 1 Rollup 1 or
- Forefront TMG 2010 SP1 Update 1 Rollup 2 or
- Forefront TMG 2010 SP1 Update 1 Rollup 3 or
- Forefront TMG 2010 SP1 Update 1 Rollup 4
- (You can skip previous Rollups and install only the latest one — as long as you have SP1 Update 1) or
- Forefront Threat Management Gateway (TMG) 2010 Service Pack 2 and
- SP2 Rollup 1
- SP2 Rollup 2
- SP2 Rollup 3
- SP2 Rollup 4 (November 2013, build 7.0.9193.601)
- SP2 Rollup 5 (June 2014, build 644)
So to get the latest version installed, you need to install:
- TMG 2010 + TMG 2010 SP1 Update 1 + TMG 2010 SP2 + TMG 2010 SP2 Rollup 5 (or if a later version exists, just the latest post-SP2 rollup).
Note: It is important to emphasize that the updates listed above are the most current as of March 2015; if you're using this guide after that, please check for more recent updates.
It is possible to create a slipstreamed installation source from which TMG can be installed (example: Richard Hicks' blog), to save time installing and rebooting each TMG server in the farm. If you create a slipstreamed installation, be aware that:
- the slipstreamed install source must remain static for the lifetime of the installation
- If you create an SP2 slipstream, and install farm members, you must not then update that installation source to SP2+SP2 Rollup 1 to install a new node
- You could start from it, make a copy, and update the copy, but the original SP2-only farm members may use the original installation source when installing updates, and patching it could break that (meaning you'd need to create another SP2-only patched source to fix it).
- the slipstreamed source should be created in a relatively default environment, as problems affecting TMG installation will affect the creation of the combined package.
- If TMG doesn't install right due to a lockdown policy of some sort, the creation of an admin MSI may suffer from the same problem.
- This usually becomes obvious when the slipstreamed package won't install.
In this phase, it is also common to deploy third party applications to the same server as TMG. Applications such as antivirus, backup software and others might be integrated during the deployment phase. It is important to follow some best practices while performing such operations:
- Antivirus – if you are installing antivirus on Forefront TMG, make sure to follow the article “Considerations when using antivirus software on FF Edge Products” to properly exclude files and folders from realtime scanning. Fail to comply with this requirement can lead to reliability problems and support issues, like the one documented in this blog post.
- From the same article, pay attention to the statement that says:
“Forefront Edge products do not support the use of firewall or network monitoring mechanisms that operate separate from the extensibility API provided by each product.”
- if the antivirus fails to comply with this requirement, the behavior exposed in this blog post can occur. - Backup software – be sure to exclude the Forefront TMG cache folder from backup software to avoid issues like the one showed in this blog post.
- Third party addins – when installing third-party add-ins that integrate with Forefront TMG, try to locate and use the latest version available, in order to avoid potential issues that can cause downtime.
Configuring
Once you have Forefront TMG 2010 installed, you can start configuring some of the features that you need, to accomplish the tasks that were identified during the planning phase. The main resource for this is the Operations Guide. There are also some other guides that can be used in order to accomplish these tasks, such as:
- Publishing Exchange 2010 through Forefront TMG 2010
- Publishing Outlook Anywhere Using NTLM Authentication With Forefront TMG
- Using TMG and UAG to Securely Publish Outlook Web App and Exchange ActiveSync with Certificate Based Authentication
- Remote Conferencing with Lync Web App with Forefront Threat Management Gateway 2010 Reverse Proxy
- Configuring SharePoint publishing
- Configure NAP with TMG 2010
- Configuring Site-to-Site VPN Access with TMG
- Configuring Publishing using Kerberos Delegation
- Configuring Publishing using Kerberos Delegation and OTP
- Configuring Publishing using Kerberos Delegation and Certificates
Note: community contributions within this session are very welcome. There are so many applications that you can publish through Forefront TMG that Microsoft just can’t test and document all. If you have an article where you explain how to publish certain application that is not on this list, please feel free to add a link to this list (the Edit tab is at the top-middle of the wiki page).
Other Resources
Here are some additional resources about Forefront TMG 2010 that might be helpful:
- The Leading Independent site on ISA Server and TMG - ISAserver.org
- Forefront TMG Team Blog
- Forefront TMG Main Microsoft Page
- List of Build Numbers for Microsoft Forefront Threat Management Gateway (TMG)
- Determining TMG Version Numbers
- ISA/TMG/UAG Version Numbers
- TMG 2010 Overview for ISA Admins (Video)
- Forefront Threat Management Gateway Web Access Protection (Video)
- Forefront TMG RTM Overview Interview (Video)
- Rampup - Implementing Forefront Threat Management Gateway 2010 (Video, articles and Labs)
- Forefront Threat Management Gateway 2010: Microsoft Forefront Virtual Event (Video)
- Predefined Protocols in Forefront TMG
Call to action
This is a living document that we are starting now, and giving to you as a base to expand upon. Do you want to get engaged on this? Make sure to read the guidelines from Wiki: How to Contribute, and have a great time helping the community to grow!
Note: *please do not add troubleshooting articles to this Survival Guide; we are working to build a Troubleshooting Survival Guide for Forefront TMG 2010. Once we have it we will post it here
*
This article was originally written by:
**Yuri Diogenes, Senior Technical Writer
Windows Server iX | IT Pro Security
Microsoft Corporation
**--------
Yuri’s Blog: http://blogs.technet.com/yuridiogenes
Team’s Blog: http://blogs.technet.com/b/securitycontent
Twitter: http://twitter.com/yuridiogenes