SlideShare a Scribd company logo
1 of 48
SharePoint and Forefront Unified Access Gateway James Tramel Solutions Architect Planet Technologies
In other lives: Network Engineer Network Admin WAN admin Cloud admin Now SharePoint experience and certification (custom and oob/ data and architect) Forefront IM and UAG About me
As a portal As an intranet As an extranet SharePoint
How is your farm built? Where does it reside? Who accesses it and How? What does it look like in your network? What does your network topology look like? SharePoint and Network Infrastructure
Network topology is the layout pattern of interconnections of the various elements (links, nodes, etc.) of a computer  or network Physical topology refers to the physical design of a network including the devices, location and cable installation. Logical topology refers to how data is actually transferred in a network as opposed to its physical design What is Network Topology
What is a LAN? Inside / Outside
A local area network (LAN) is a computer network that connects computers and devices in a limited geographical area such as home, school, computer laboratory or office building. The defining characteristics of LANs includes their usually high data-transfer rates, smaller geographic area, and lack of a need for leased telecommunication lines LAN
LAN: Local Area Network - Basic
LAN: Typical
What is a LAN? What is a WAN? Inside / Outside
A wide area network(WAN) is a telecommunication network that covers a broad area (i.e., any network that links across metropolitan, regional, or national boundaries). Business and government entities utilize WAN to relay data among employees, clients, buyers, and suppliers from various geographical locations. In essence this mode of telecommunication allows a business to effectively carry out its daily function regardless of location. WAN
WAN: Frame
WAN: VPN
What is a LAN? What is a WAN? What is a Host? Inside / Outside
A network host is a computer connected to a computer network. A network host may offer information resources, services, and applications to users or other nodes on the network A web hosting service is a type of Internet hosting service that allows individuals and organizations to make their own website accessible via the World Wide Web. Web hosts are companies that provide space on a server they own or lease for use by their clients as well as providing Internet connectivity, typically in a data center. Web hosts can also provide data center space and connectivity to the Internet for servers they do not own to be located in their data center Host
Inside network protocols Outside network protocols How can SP be setup for outside? How to use SharePoint from Outside
SharePoint Topology
Anonymous Access SSL Authentication methods Windows Based Token based Claims based Forms Based Common Outside Methods
Authentication Demo
AD is not authoritative directory SAML tokens are not allowed to be consumed No guarantee of Internet Explorer High security / sensitive data Authentication Example
What is a LAN? What is a WAN? What is a Host? What is a DMZ? Inside / Outside
A DMZ, or De Militarized Zone, is a physical or logical subnetwork that contains and exposes an organization's external services to a larger untrusted network, usually the Internet. It is sometimes referred to as a perimeter network. The purpose of a DMZ is to add an additional layer of security to an organization's local area network (LAN); an external attacker only has access to equipment in the DMZ, rather than any other part of the network. DMZ
DMZ: 1 firewall
DMZ: 2 Firewalls
Access Scenarios Remote employee External partner or customer Branded Internet sites Web hosting Mobile phone access Building a SharePoint Extranet
SharePoint and UAG
Part of ForeFront Suite Reverse Proxy, Direct Access, Remote Desktop Services and VPN solution Built with/on TMG (firewall, endpoint security) Great for LOB apps Highly customizable, integrates with a lot What is UAG?
Follow the Program
TMG is installed before you install UAG TMG can act as a router, an Internet gateway, a virtual private network (VPN) server, a network address translation (NAT) server and a proxy server. TMG is a firewall that offers application layer protection, stateful filtering, content filtering and anti-malware protection. TMG can compress web traffic and offers web caching UAG and TMG
Publishing Microsoft Exchange Server Applications Publishing Remote Desktop Services Remote Network Access Using SSTP Intra-Site Automatic Tunnel Addressing Protocol Endpoint Policies and Network Access Protection UAG Arrays Direct Access UAG Setup in General
UAG direct access Single server endpoint outside of perimeter Everything on VM’s Multiple SP Applications Multiple Forests UAG Direct Access and SharePoint
Edge firewall UAG – SP Extranets
UAG – SP Extranets Split back-to-back optimized for content publishing
UAG – SP Extranets Back-to-back perimeter with content publishing (and optional TMG caching)
Know the network topology Know how to get around the network topology VM’s and VM topology Static Routes Make sure you have access to local session – you will likely lose ip your first time Things to note for installing UAG
Virtual Network Types Private Virtual Network  Internal Virtual Network  External Virtual Network Virtual NIC’s Physical NIC’s Static Routes Understanding VM’s
Addressing UAG
Name your Network Adapters Configure the External NIC Get rid of properties you don’t need Default Gateway Un check register the connection in DNS Disable NetBIOS Addressing UAG
Configure the Internal NIC No Gateway Register the connection in DNS Check your static route to internal nic Change the binding order Check routes Addressing UAG
You can associate a Web application with a collection of mappings between internal and public URLs.  Alternate access mappings enable a Web application that receives a request for an internal URL, in one of the five authentication zones, to return pages that contain links to the public URL for the zone. The UAG server responds with identical content, even though external users submit a different protocol (HTTPS) and a different host header than internal users. Alternate access mappings to allow the SharePoint server to perform URL changes on its own. This ensures that reverse proxies, such as UAG, do not have to change the content of the pages they serve to external sources. Addressing SharePoint:AAM – Alternate Access Mappings
The UAG portal is an ASP.Net-based Web application using AJAX, and is the front-end Web application for UAG A UAG portal trunk is a transfer channel that allows endpoints to connect to the trunk’s portal home page over HTTP or HTTPS. You can also create a redirect trunk that redirects HTTP endpoint requests to an HTTPS trunk. Each trunk has a portal home page to which remote endpoints connect to interact with the trunk, and access published applications.  For each trunk UAG adds the Portal application to the trunk in order to provide a default home page. Alternatively, you can define a customized home page. UAG Portals and Trunks
Each Web app is associated with a unique public-facing host name, which is used to access the application remotely. A Web app that is published through the Forefront UAG trunk shares the trunk's definitions in addition to some of the trunk's functionality, such as the logon and logoff pages. This means that the application's public host name must reside under the same parent domain as the trunk's public host name; that is, the application and the trunk are subdomains of the same parent domain. Addressing SharePoint:Public Host Names
Addressing SharePoint:Public Host Names
All the public host names that are used in the trunk should be covered by this certificate, including the trunk's public host name and the public host names of all the applications that are accessed via the trunk. Addressing SharePoint and UAG:Server certificates
Demo / Tour
UAG is away to go for extranets for a highly secure deployment Big ROI for its other uses, as well as SP Know your network infrastructure Plan your SP install Access to the local UAG server Know your risks Conclusion
Q and A
MSDN Technet Microsoft Press Wikipedia http://mikecrowley.files.wordpress.com/2010/11/ http://www.windowsnetworking.com/articles_tutorials/Understanding-Virtual-Networking-Microsoft-Hyper-V.html>  http://mrshannon.wordpress.com/2010/04/30/setting-ip-addresses-on-a-uag-directaccess-server/>  http://blog.concurrency.com/infrastructure/uag-directaccess-ip-addressing-the-server/> http://www.bibble-it.com/2010/02/21/forefront-uag-in-10-minutes References

More Related Content

What's hot

Web Technology and Standards Tutorial
Web Technology and Standards Tutorial Web Technology and Standards Tutorial
Web Technology and Standards Tutorial Jonathan Jeon
 
HTTP and HTTPS Basics
HTTP and HTTPS BasicsHTTP and HTTPS Basics
HTTP and HTTPS BasicsKanishk Raj
 
ReST (Representational State Transfer) Explained
ReST (Representational State Transfer) ExplainedReST (Representational State Transfer) Explained
ReST (Representational State Transfer) ExplainedDhananjay Nene
 
Web Server Technologies I: HTTP & Getting Started
Web Server Technologies I: HTTP & Getting StartedWeb Server Technologies I: HTTP & Getting Started
Web Server Technologies I: HTTP & Getting StartedPort80 Software
 
Palo Alto Networks PAN-OS 4.0 New Features
Palo Alto Networks PAN-OS 4.0 New FeaturesPalo Alto Networks PAN-OS 4.0 New Features
Palo Alto Networks PAN-OS 4.0 New Featureslukky753
 
Palo alto networks pcnse6 study guide feb 2015
Palo alto networks pcnse6 study guide feb 2015Palo alto networks pcnse6 study guide feb 2015
Palo alto networks pcnse6 study guide feb 2015Silva_2
 
WT - Firewall & Proxy Server
WT - Firewall & Proxy ServerWT - Firewall & Proxy Server
WT - Firewall & Proxy Servervinay arora
 
21 HTTP Protocol #burningkeyboards
21 HTTP Protocol #burningkeyboards21 HTTP Protocol #burningkeyboards
21 HTTP Protocol #burningkeyboardsDenis Ristic
 
CS8651 Internet Programming - Basics of HTML, HTML5, CSS
CS8651   Internet Programming - Basics of HTML, HTML5, CSSCS8651   Internet Programming - Basics of HTML, HTML5, CSS
CS8651 Internet Programming - Basics of HTML, HTML5, CSSVigneshkumar Ponnusamy
 
Web Services 2009
Web Services 2009Web Services 2009
Web Services 2009Cathie101
 
Can a browser become an IoT Gateway?
Can a browser become an IoT Gateway?Can a browser become an IoT Gateway?
Can a browser become an IoT Gateway?Sooraj Sanker
 
Http - All you need to know
Http - All you need to knowHttp - All you need to know
Http - All you need to knowGökhan Şengün
 
Understanding Web Services by software outsourcing company india
Understanding Web Services by software outsourcing company indiaUnderstanding Web Services by software outsourcing company india
Understanding Web Services by software outsourcing company indiaJignesh Aakoliya
 
Acit Mumbai - understanding vpns
Acit Mumbai - understanding vpnsAcit Mumbai - understanding vpns
Acit Mumbai - understanding vpnsSleek International
 

What's hot (20)

Web Technology and Standards Tutorial
Web Technology and Standards Tutorial Web Technology and Standards Tutorial
Web Technology and Standards Tutorial
 
HTTPS
HTTPSHTTPS
HTTPS
 
Wp fqdn deprecation
Wp fqdn deprecationWp fqdn deprecation
Wp fqdn deprecation
 
HTTP and HTTPS Basics
HTTP and HTTPS BasicsHTTP and HTTPS Basics
HTTP and HTTPS Basics
 
ReST (Representational State Transfer) Explained
ReST (Representational State Transfer) ExplainedReST (Representational State Transfer) Explained
ReST (Representational State Transfer) Explained
 
Web technologies: HTTP
Web technologies: HTTPWeb technologies: HTTP
Web technologies: HTTP
 
Web Server Technologies I: HTTP & Getting Started
Web Server Technologies I: HTTP & Getting StartedWeb Server Technologies I: HTTP & Getting Started
Web Server Technologies I: HTTP & Getting Started
 
Webbasics
WebbasicsWebbasics
Webbasics
 
Network Testing ques
Network Testing quesNetwork Testing ques
Network Testing ques
 
Palo Alto Networks PAN-OS 4.0 New Features
Palo Alto Networks PAN-OS 4.0 New FeaturesPalo Alto Networks PAN-OS 4.0 New Features
Palo Alto Networks PAN-OS 4.0 New Features
 
Web server for cbse 10 FIT
Web server for cbse 10 FITWeb server for cbse 10 FIT
Web server for cbse 10 FIT
 
Palo alto networks pcnse6 study guide feb 2015
Palo alto networks pcnse6 study guide feb 2015Palo alto networks pcnse6 study guide feb 2015
Palo alto networks pcnse6 study guide feb 2015
 
WT - Firewall & Proxy Server
WT - Firewall & Proxy ServerWT - Firewall & Proxy Server
WT - Firewall & Proxy Server
 
21 HTTP Protocol #burningkeyboards
21 HTTP Protocol #burningkeyboards21 HTTP Protocol #burningkeyboards
21 HTTP Protocol #burningkeyboards
 
CS8651 Internet Programming - Basics of HTML, HTML5, CSS
CS8651   Internet Programming - Basics of HTML, HTML5, CSSCS8651   Internet Programming - Basics of HTML, HTML5, CSS
CS8651 Internet Programming - Basics of HTML, HTML5, CSS
 
Web Services 2009
Web Services 2009Web Services 2009
Web Services 2009
 
Can a browser become an IoT Gateway?
Can a browser become an IoT Gateway?Can a browser become an IoT Gateway?
Can a browser become an IoT Gateway?
 
Http - All you need to know
Http - All you need to knowHttp - All you need to know
Http - All you need to know
 
Understanding Web Services by software outsourcing company india
Understanding Web Services by software outsourcing company indiaUnderstanding Web Services by software outsourcing company india
Understanding Web Services by software outsourcing company india
 
Acit Mumbai - understanding vpns
Acit Mumbai - understanding vpnsAcit Mumbai - understanding vpns
Acit Mumbai - understanding vpns
 

Similar to SharePoint and Forefront United Access Gateway

Network and security concepts
Network and security conceptsNetwork and security concepts
Network and security conceptssonuagain
 
M A M C H A R O
M A M  C H A R OM A M  C H A R O
M A M C H A R Olime17
 
Ch18 Internet Security
Ch18 Internet SecurityCh18 Internet Security
Ch18 Internet Securityphanleson
 
Download Presentation
Download PresentationDownload Presentation
Download Presentationwebhostingguy
 
What’s New at Cloudflare: New Product Launches
What’s New at Cloudflare: New Product LaunchesWhat’s New at Cloudflare: New Product Launches
What’s New at Cloudflare: New Product LaunchesCloudflare
 
Chapter 11 Selecting Technologies and Devices for Enterprise Netwo.docx
Chapter 11 Selecting Technologies and Devices for Enterprise Netwo.docxChapter 11 Selecting Technologies and Devices for Enterprise Netwo.docx
Chapter 11 Selecting Technologies and Devices for Enterprise Netwo.docxbartholomeocoombs
 
M A M C H A R O 2003
M A M  C H A R O 2003M A M  C H A R O 2003
M A M C H A R O 2003lime17
 
You Name Here1. Name a company that uses data as a source of c.docx
You Name Here1. Name a company that uses data as a source of c.docxYou Name Here1. Name a company that uses data as a source of c.docx
You Name Here1. Name a company that uses data as a source of c.docxjeffevans62972
 
Planning and Configuring Extranets in SharePoint 2010 by Geoff Varosky - SPTe...
Planning and Configuring Extranets in SharePoint 2010 by Geoff Varosky - SPTe...Planning and Configuring Extranets in SharePoint 2010 by Geoff Varosky - SPTe...
Planning and Configuring Extranets in SharePoint 2010 by Geoff Varosky - SPTe...SPTechCon
 
Www architecture,cgi, client server security, protection
Www architecture,cgi, client server security, protectionWww architecture,cgi, client server security, protection
Www architecture,cgi, client server security, protectionAustina Francis
 
Internet website designing_company_in_delhi
Internet website designing_company_in_delhiInternet website designing_company_in_delhi
Internet website designing_company_in_delhiCss Founder
 
Planning and Configuring Extranets in SharePoint 2010
Planning and Configuring Extranets in SharePoint 2010Planning and Configuring Extranets in SharePoint 2010
Planning and Configuring Extranets in SharePoint 2010Geoff Varosky
 

Similar to SharePoint and Forefront United Access Gateway (20)

Network and security concepts
Network and security conceptsNetwork and security concepts
Network and security concepts
 
M A M C H A R O
M A M  C H A R OM A M  C H A R O
M A M C H A R O
 
Ch18 Internet Security
Ch18 Internet SecurityCh18 Internet Security
Ch18 Internet Security
 
Firewall vpn proxy
Firewall vpn proxyFirewall vpn proxy
Firewall vpn proxy
 
Download Presentation
Download PresentationDownload Presentation
Download Presentation
 
Proxy Presentation
Proxy PresentationProxy Presentation
Proxy Presentation
 
What’s New at Cloudflare: New Product Launches
What’s New at Cloudflare: New Product LaunchesWhat’s New at Cloudflare: New Product Launches
What’s New at Cloudflare: New Product Launches
 
Chapter 11 Selecting Technologies and Devices for Enterprise Netwo.docx
Chapter 11 Selecting Technologies and Devices for Enterprise Netwo.docxChapter 11 Selecting Technologies and Devices for Enterprise Netwo.docx
Chapter 11 Selecting Technologies and Devices for Enterprise Netwo.docx
 
Oracle soa cloud project
Oracle soa cloud projectOracle soa cloud project
Oracle soa cloud project
 
Report on intranet
Report on intranetReport on intranet
Report on intranet
 
M A M C H A R O 2003
M A M  C H A R O 2003M A M  C H A R O 2003
M A M C H A R O 2003
 
You Name Here1. Name a company that uses data as a source of c.docx
You Name Here1. Name a company that uses data as a source of c.docxYou Name Here1. Name a company that uses data as a source of c.docx
You Name Here1. Name a company that uses data as a source of c.docx
 
Proxy Servers
Proxy ServersProxy Servers
Proxy Servers
 
Planning and Configuring Extranets in SharePoint 2010 by Geoff Varosky - SPTe...
Planning and Configuring Extranets in SharePoint 2010 by Geoff Varosky - SPTe...Planning and Configuring Extranets in SharePoint 2010 by Geoff Varosky - SPTe...
Planning and Configuring Extranets in SharePoint 2010 by Geoff Varosky - SPTe...
 
Www architecture,cgi, client server security, protection
Www architecture,cgi, client server security, protectionWww architecture,cgi, client server security, protection
Www architecture,cgi, client server security, protection
 
Internet website designing_company_in_delhi
Internet website designing_company_in_delhiInternet website designing_company_in_delhi
Internet website designing_company_in_delhi
 
Web Technology
Web TechnologyWeb Technology
Web Technology
 
Web Technology
Web TechnologyWeb Technology
Web Technology
 
Web Technology
Web TechnologyWeb Technology
Web Technology
 
Planning and Configuring Extranets in SharePoint 2010
Planning and Configuring Extranets in SharePoint 2010Planning and Configuring Extranets in SharePoint 2010
Planning and Configuring Extranets in SharePoint 2010
 

More from Planet Technologies

Building a SharePoint Solution Brick By Brick
Building a SharePoint Solution Brick By Brick Building a SharePoint Solution Brick By Brick
Building a SharePoint Solution Brick By Brick Planet Technologies
 
Meeting the Challenge of Vivek Kundra's 25 Point Plan
Meeting the Challenge of Vivek Kundra's 25 Point PlanMeeting the Challenge of Vivek Kundra's 25 Point Plan
Meeting the Challenge of Vivek Kundra's 25 Point PlanPlanet Technologies
 
Mind to Matter: A Way to Model How You Work in SharePoint #SPSTCDC
Mind to Matter: A Way to Model How You Work in SharePoint #SPSTCDCMind to Matter: A Way to Model How You Work in SharePoint #SPSTCDC
Mind to Matter: A Way to Model How You Work in SharePoint #SPSTCDCPlanet Technologies
 
InfoPath 2010 - First Look #SPSTCDC
InfoPath 2010 - First Look #SPSTCDCInfoPath 2010 - First Look #SPSTCDC
InfoPath 2010 - First Look #SPSTCDCPlanet Technologies
 
Building End-to-End Solutions Leveraging SharePoint 2010 and Office 2010 Appl...
Building End-to-End Solutions Leveraging SharePoint 2010 and Office 2010 Appl...Building End-to-End Solutions Leveraging SharePoint 2010 and Office 2010 Appl...
Building End-to-End Solutions Leveraging SharePoint 2010 and Office 2010 Appl...Planet Technologies
 
Weather WebPart and RSS Integration SPSTCDC
Weather WebPart and RSS Integration SPSTCDC Weather WebPart and RSS Integration SPSTCDC
Weather WebPart and RSS Integration SPSTCDC Planet Technologies
 
SharePoint Designer 2010 and SQL GridView Integration #SPSTCDC
SharePoint Designer 2010 and SQL GridView Integration #SPSTCDC SharePoint Designer 2010 and SQL GridView Integration #SPSTCDC
SharePoint Designer 2010 and SQL GridView Integration #SPSTCDC Planet Technologies
 

More from Planet Technologies (7)

Building a SharePoint Solution Brick By Brick
Building a SharePoint Solution Brick By Brick Building a SharePoint Solution Brick By Brick
Building a SharePoint Solution Brick By Brick
 
Meeting the Challenge of Vivek Kundra's 25 Point Plan
Meeting the Challenge of Vivek Kundra's 25 Point PlanMeeting the Challenge of Vivek Kundra's 25 Point Plan
Meeting the Challenge of Vivek Kundra's 25 Point Plan
 
Mind to Matter: A Way to Model How You Work in SharePoint #SPSTCDC
Mind to Matter: A Way to Model How You Work in SharePoint #SPSTCDCMind to Matter: A Way to Model How You Work in SharePoint #SPSTCDC
Mind to Matter: A Way to Model How You Work in SharePoint #SPSTCDC
 
InfoPath 2010 - First Look #SPSTCDC
InfoPath 2010 - First Look #SPSTCDCInfoPath 2010 - First Look #SPSTCDC
InfoPath 2010 - First Look #SPSTCDC
 
Building End-to-End Solutions Leveraging SharePoint 2010 and Office 2010 Appl...
Building End-to-End Solutions Leveraging SharePoint 2010 and Office 2010 Appl...Building End-to-End Solutions Leveraging SharePoint 2010 and Office 2010 Appl...
Building End-to-End Solutions Leveraging SharePoint 2010 and Office 2010 Appl...
 
Weather WebPart and RSS Integration SPSTCDC
Weather WebPart and RSS Integration SPSTCDC Weather WebPart and RSS Integration SPSTCDC
Weather WebPart and RSS Integration SPSTCDC
 
SharePoint Designer 2010 and SQL GridView Integration #SPSTCDC
SharePoint Designer 2010 and SQL GridView Integration #SPSTCDC SharePoint Designer 2010 and SQL GridView Integration #SPSTCDC
SharePoint Designer 2010 and SQL GridView Integration #SPSTCDC
 

Recently uploaded

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

SharePoint and Forefront United Access Gateway

  • 1. SharePoint and Forefront Unified Access Gateway James Tramel Solutions Architect Planet Technologies
  • 2. In other lives: Network Engineer Network Admin WAN admin Cloud admin Now SharePoint experience and certification (custom and oob/ data and architect) Forefront IM and UAG About me
  • 3. As a portal As an intranet As an extranet SharePoint
  • 4. How is your farm built? Where does it reside? Who accesses it and How? What does it look like in your network? What does your network topology look like? SharePoint and Network Infrastructure
  • 5. Network topology is the layout pattern of interconnections of the various elements (links, nodes, etc.) of a computer or network Physical topology refers to the physical design of a network including the devices, location and cable installation. Logical topology refers to how data is actually transferred in a network as opposed to its physical design What is Network Topology
  • 6. What is a LAN? Inside / Outside
  • 7. A local area network (LAN) is a computer network that connects computers and devices in a limited geographical area such as home, school, computer laboratory or office building. The defining characteristics of LANs includes their usually high data-transfer rates, smaller geographic area, and lack of a need for leased telecommunication lines LAN
  • 8. LAN: Local Area Network - Basic
  • 10. What is a LAN? What is a WAN? Inside / Outside
  • 11. A wide area network(WAN) is a telecommunication network that covers a broad area (i.e., any network that links across metropolitan, regional, or national boundaries). Business and government entities utilize WAN to relay data among employees, clients, buyers, and suppliers from various geographical locations. In essence this mode of telecommunication allows a business to effectively carry out its daily function regardless of location. WAN
  • 14. What is a LAN? What is a WAN? What is a Host? Inside / Outside
  • 15. A network host is a computer connected to a computer network. A network host may offer information resources, services, and applications to users or other nodes on the network A web hosting service is a type of Internet hosting service that allows individuals and organizations to make their own website accessible via the World Wide Web. Web hosts are companies that provide space on a server they own or lease for use by their clients as well as providing Internet connectivity, typically in a data center. Web hosts can also provide data center space and connectivity to the Internet for servers they do not own to be located in their data center Host
  • 16. Inside network protocols Outside network protocols How can SP be setup for outside? How to use SharePoint from Outside
  • 18. Anonymous Access SSL Authentication methods Windows Based Token based Claims based Forms Based Common Outside Methods
  • 20. AD is not authoritative directory SAML tokens are not allowed to be consumed No guarantee of Internet Explorer High security / sensitive data Authentication Example
  • 21. What is a LAN? What is a WAN? What is a Host? What is a DMZ? Inside / Outside
  • 22. A DMZ, or De Militarized Zone, is a physical or logical subnetwork that contains and exposes an organization's external services to a larger untrusted network, usually the Internet. It is sometimes referred to as a perimeter network. The purpose of a DMZ is to add an additional layer of security to an organization's local area network (LAN); an external attacker only has access to equipment in the DMZ, rather than any other part of the network. DMZ
  • 25. Access Scenarios Remote employee External partner or customer Branded Internet sites Web hosting Mobile phone access Building a SharePoint Extranet
  • 27. Part of ForeFront Suite Reverse Proxy, Direct Access, Remote Desktop Services and VPN solution Built with/on TMG (firewall, endpoint security) Great for LOB apps Highly customizable, integrates with a lot What is UAG?
  • 29. TMG is installed before you install UAG TMG can act as a router, an Internet gateway, a virtual private network (VPN) server, a network address translation (NAT) server and a proxy server. TMG is a firewall that offers application layer protection, stateful filtering, content filtering and anti-malware protection. TMG can compress web traffic and offers web caching UAG and TMG
  • 30. Publishing Microsoft Exchange Server Applications Publishing Remote Desktop Services Remote Network Access Using SSTP Intra-Site Automatic Tunnel Addressing Protocol Endpoint Policies and Network Access Protection UAG Arrays Direct Access UAG Setup in General
  • 31. UAG direct access Single server endpoint outside of perimeter Everything on VM’s Multiple SP Applications Multiple Forests UAG Direct Access and SharePoint
  • 32. Edge firewall UAG – SP Extranets
  • 33. UAG – SP Extranets Split back-to-back optimized for content publishing
  • 34. UAG – SP Extranets Back-to-back perimeter with content publishing (and optional TMG caching)
  • 35. Know the network topology Know how to get around the network topology VM’s and VM topology Static Routes Make sure you have access to local session – you will likely lose ip your first time Things to note for installing UAG
  • 36. Virtual Network Types Private Virtual Network Internal Virtual Network External Virtual Network Virtual NIC’s Physical NIC’s Static Routes Understanding VM’s
  • 38. Name your Network Adapters Configure the External NIC Get rid of properties you don’t need Default Gateway Un check register the connection in DNS Disable NetBIOS Addressing UAG
  • 39. Configure the Internal NIC No Gateway Register the connection in DNS Check your static route to internal nic Change the binding order Check routes Addressing UAG
  • 40. You can associate a Web application with a collection of mappings between internal and public URLs. Alternate access mappings enable a Web application that receives a request for an internal URL, in one of the five authentication zones, to return pages that contain links to the public URL for the zone. The UAG server responds with identical content, even though external users submit a different protocol (HTTPS) and a different host header than internal users. Alternate access mappings to allow the SharePoint server to perform URL changes on its own. This ensures that reverse proxies, such as UAG, do not have to change the content of the pages they serve to external sources. Addressing SharePoint:AAM – Alternate Access Mappings
  • 41. The UAG portal is an ASP.Net-based Web application using AJAX, and is the front-end Web application for UAG A UAG portal trunk is a transfer channel that allows endpoints to connect to the trunk’s portal home page over HTTP or HTTPS. You can also create a redirect trunk that redirects HTTP endpoint requests to an HTTPS trunk. Each trunk has a portal home page to which remote endpoints connect to interact with the trunk, and access published applications. For each trunk UAG adds the Portal application to the trunk in order to provide a default home page. Alternatively, you can define a customized home page. UAG Portals and Trunks
  • 42. Each Web app is associated with a unique public-facing host name, which is used to access the application remotely. A Web app that is published through the Forefront UAG trunk shares the trunk's definitions in addition to some of the trunk's functionality, such as the logon and logoff pages. This means that the application's public host name must reside under the same parent domain as the trunk's public host name; that is, the application and the trunk are subdomains of the same parent domain. Addressing SharePoint:Public Host Names
  • 44. All the public host names that are used in the trunk should be covered by this certificate, including the trunk's public host name and the public host names of all the applications that are accessed via the trunk. Addressing SharePoint and UAG:Server certificates
  • 46. UAG is away to go for extranets for a highly secure deployment Big ROI for its other uses, as well as SP Know your network infrastructure Plan your SP install Access to the local UAG server Know your risks Conclusion
  • 48. MSDN Technet Microsoft Press Wikipedia http://mikecrowley.files.wordpress.com/2010/11/ http://www.windowsnetworking.com/articles_tutorials/Understanding-Virtual-Networking-Microsoft-Hyper-V.html> http://mrshannon.wordpress.com/2010/04/30/setting-ip-addresses-on-a-uag-directaccess-server/> http://blog.concurrency.com/infrastructure/uag-directaccess-ip-addressing-the-server/> http://www.bibble-it.com/2010/02/21/forefront-uag-in-10-minutes References

Editor's Notes

  1. Formerly
  2. Lots of ways to create SharePoint, some of which require more secure setups
  3. SharePoint resides in a…
  4. If you don’t know, to understand network topology…
  5. Concept we’ll return to a few timesKey components to networkWho’s in your inner circle?
  6. Notice the wall
  7. Notice the wall / the blockade
  8. To understand what all this means, let’s go back to inside and outside for a moment
  9. To understand what all this means, let’s go back to inside and outside for a moment
  10. Bring this up, as this is common – you host SharePoint yourself – althought don’t have to
  11. Question for SP - How do users get to your data and your farm
  12. Add slide from mind to matter on topology, explain web application and zones
  13. Lead to how do we do this
  14. Create kerberos token for claims – follow Shannon and keep it simpleThat’s great, but what if you want this stuff:
  15. CU – great – but what’s wrongIs it supported?How safe is it?What is the cost?What is the benefit?
  16. To understand what all this means, let’s go back to inside and outside for a moment
  17. http://go.microsoft.com/fwlink/?LinkId=187987
  18. http://technet.microsoft.com/en-us/library/dd861393.aspx
  19. http://en.wikipedia.org/wiki/Microsoft_Forefront_Unified_Access_Gatewayauthentication vendors such as RSA Security, Vasco, GrIDsure, Swivel, ActivCard and Aladdinnumerous authentication systems and protocols such as Active Directory, RADIUS, LDAP, NTLM, Lotus Domino, PKI and TACACS+.
  20. Secure socket tunneling porotocal
  21. What we’re going to do / What I’ve done
  22. Simple, right?
  23. More Complicated
  24. Where to put thingsHow to get from point A to BVLANSTMG does not play around
  25. Who can name all 5? Default Intranet Internet Custom ExtranetDemo
  26. Browse to PlanetsExplain redirectionShow service
  27. http://technet.microsoft.com/en-us/virtuallabs/bb499665.aspx – configure portal trunkShow http redirectShow AAMShow IISShow PortalShow TMGShow UAG
  28. References