Request A Quote

Iron Networks Blog

why choose iron Software Define Data Center Hnv Hybrid Cloud Gateway MCE Cloud Edge Gateway Cloudboxx, branch-in-a-box Wss, windows storage systems

DirectAccess

When you have no excuse to not deploy Microsoft DirectAccess

As we have described in a previous blog post, Microsoft DirectAccess has many benefits over traditional VPN: http://www.nappliance.com/blog/nappliance-nuag-and-directaccess-better-together.

What role does DNS64 and NAT64 play in UAG Direct Access?

By now, most of us know what DirectAccess is. For those who don’t, Direct Access is a revolutionary VPN technology which was introduced in Windows Server 2008 R2. It provides seamless connectivity to corporate resources without requiring any dial-up or VPN. DirectAccess connectivity is based on IPsec, IPV6, and transition technologies like Teredo, 6to4, IP-HTTPS, and ISATAP. In DirectAccess, the IPv6 traffic is encapsulated in an IPv4 packet and is then sent across the internet, after which the DirectAccess server reads the IPv6 headers and executes it.

Best practices when deploying TMG URL Filtering

Microsoft Threat Management Gateway 2010 brings a lot of new and enhanced features to edge network security. Ever since Microsoft started with Proxy Server 2.0, and then ISA Server, URL filtering has always been something which administrators have wanted. Every company has their own IT policies and most companies want to restrict their users from visiting inappropriate or unsafe websites during their office hours from company-owned machines.

Why is UAG DirectAccess better than traditional VPN?

In our previous post at http://www.nappliance.com/blog/nappliance-nuag-and-directaccess-better-together we highlighted how UAG and DirectAccess are better together and the benefits of connecting through the DirectAccess. In this post we will concentrate on the advantages DirectAccess has over the traditional VPN connectivity and why companies would want to move away from the VPN infrastructure.

UAG 2010: Error "Applying Network Access Protection configuration failed"

 

Problem:

When trying to activate the configuration on a UAG server, you might find that the activation failed and you can see the following error messages in the status window:

Error: Applying Network Access Protection configuration failed.

UAG 2010: Error "An unknown error occurred while processing the certificate. Contact the site administrator"

A client that is trying to access an SSL enabled application on a backend server (e.g. Exchange) that is published through the Forefront UAG portal gets an error, specifically:

“An unknown error occurred while processing the certificate. Contact the site administrator”.

The cause:

UAG 2010 RTM: Integrating NAP Policies

Microsoft UAG 2010 can be integrated with Windows NAP (Network Access Protection) to make sure that the computers comply with the IT policies before user’s login into the UAG portal. Windows Network Access Protection is part of Windows 2008 and 2008 R2 servers. No extra hardware or licensing is required to implement Microsoft NAP in an environment. Moreover, there are simple settings in UAG for integrating NAP to do policy enforcement.

UAG 2010: Removing an Installed UAG Update from nUAG Appliance

When you install an update for Microsoft Forefront UAG, it does not appear under the Windows control panel > Add/Remove programs. So, If you have to remove it for some reason then how do you remove an update? Well, UAG has an in-built script to remove the previously installed updates. The script is located at

nTMG: FTP Server Publishing in TMG

 

Open the Microsoft Threat Management Console and right click on the Firewall Policy and select "Non-web Server Protocol Publishing Rule". A new server publishing rule wizard will appear. Give a name for the publishing rule and click next.

UAG: Publishing VMWare View using Forefront Unified Access Gateway

Supported client OS: Windows XP 32bit and Windows Vista 32bit

Syndicate content
 

Copyright © 2024 Iron Networks, Inc. All Rights Reserved.