![]() What configuration needs to be carried out to allow OA traffic through? I assume OA makes use of RPC however I don't remember anything in the guides with regards to configuring RPC. Within the firewall or web access pages of the TMG. I am running TMG 2010 Standard I believe, and I cannot see this option to configure RPC protocol when I right click on any of the entries There are instructions to right click the default rule > click configure RPC protocol and clear the checkbox. (this goes onto mention the default firewall The message being "Strict RPC compliance is enforced in an access rule that allows traffic to or from the local. Simillar to above one of the messages in the Best Practice Analyzer report points to RPC compliance. The policy rules do not allow the user request.Ģ) run TMG Best Practices Analyzer and see if it discovers any issues with your configuration SecureGUARD TMG950 appliance based on Microsoft Forefront Threat Management Gateway 2010 (TMG) The Microsoft security solution has been expanded by adding the partner's convenient management and support functionalities and deeply integrating them into the customer's Microsoft infrastructure. I have noticed in the TMG logs when OA trys to connect I get the following messages, which I think is where the problem lies: Test Rule came back as successful for each of the components in the rule.Ģ) check the TMG logs and see what is logged when a OA connection attempt is made 1) click "test rule" on the rule that publishes OA and see if is successful
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |