ENTERPRISE

Securing SharePoint Sites with Forefront TMG 2010 (part 2) - Creating a SharePoint Publishing Rule Using Forefront TMG

2/26/2011 4:53:57 PM

Creating a SharePoint Publishing Rule Using Forefront TMG

After an SSL Certificate from the SharePoint server has been installed onto the Forefront TMG server, the actual Forefront TMG SharePoint publishing rule can be generated to secure SharePoint via the following procedure:

Note

The procedure outlined here illustrates the Forefront Edge line SharePoint publishing rule that uses forms-based authentication (FBA) for the site, which allows for a landing page to be generated on the Forefront Edge line to pre-authenticate user connections to SharePoint.


1.
From the Forefront TMG console, click once on the Firewall Policy node from the console tree.

2.
Click the link in the Tasks tab of the Tasks pane labeled Publish SharePoint Sites.

3.
Enter a descriptive name for the publishing rule, such as SharePoint Publishing Rule.

4.
Select whether to publish a single website, multiple websites, or a farm of load-balanced servers, as illustrated in Figure 3. In this example, we choose to publish a simple single website. Click Next to continue.

Figure 3. Creating a Forefront TMG publishing rule for SharePoint sites.


5.
Choose whether to require SSL from the Forefront Edge line server to the SharePoint server, as shown in Figure 4. It is recommended to provide end-to-end SSL support for the Forefront Edge line, although it will require a copy of the SSL certificate with the private key exported to the TMG server for this to be set up properly. Click Next to continue.

Figure 4. Configuring SSL for publishing rule.


6.
In the Internal Publishing Details dialog box, enter the site name that internal users use to access the SharePoint server. Examine the options to connect to an IP address or computer name; this gives additional flexibility to the rule. Click Next to continue.

7.
Under the subsequent dialog box, enter to accept requests for This Domain Name (type below): and enter the FQDN of the server, such as home.companyabc.com. This will restrict the rule to requests that are destined for the proper FQDN. Click Next to continue.

8.
Under Web Listener, click New.

9.
At the start of the Web Listener Wizard, enter a descriptive name for the listener, such as SharePoint HTTP/HTTPS Listener, and click Next to continue.

10.
Again, a prompt is given to choose between SSL and non-SSL. This prompt refers to the traffic between client and SharePoint, which should always be SSL whenever possible. Click Next to continue.

11.
Under Web Listener IP addresses, select the External network and leave it at All IP Addresses. Click Next to continue.

12.
Under Listener SSL Certificates (if creating an SSL-based rule; if not, you will not be prompted for this), click Select Certificate.

13.
Select the previously installed certificate (if using SSL) and click the Select button.

14.
Click Next to continue.

15.
For the type of authentication, choose HTML Form Authentication, as shown in Figure 5. Leave Windows (Active Directory) selected and click Next.

Figure 5. Selecting to use forms-based authentication for a Forefront TMG publishing rule.


16.
The Single Sign On Settings dialog box is powerful; it allows all authentication traffic through a single listener to be processed only once. After the user has authenticated, he can access any other service, be it an Exchange OWA server, web server, or other web-based service that uses the same domain name for credentials. In this example, we enter .companyabc.com into the SSO domain name. Click Next to continue.

17.
Click Finish to end the Web Listener Wizard.

18.
Click Next after the new listener is displayed in the Web Listener dialog box.

19.
Under Authentication Delegation, choose Basic from the drop-down box. Basic is used if SSL is the transport mechanism chosen. If using HTTP only, it is recommended to use NTLM authentication to avoid the passwords being sent in clear text. Click Next to continue.

20.
At the Alternate Access Mapping Configuration dialog box, shown in Figure 6, select that SharePoint AAM is already configured, as we configured the Alternate Access Mapping on the SharePoint server in previous steps.

Figure 6. Creating a Forefront TMG publishing rule for a SharePoint site with AAM already configured.


21.
Under User Sets, leave All Authenticated Users selected. In stricter scenarios, only specific AD groups can be granted rights to SharePoint using this dialog box. In this example, the default setting is sufficient. Click Next to continue.

22.
Click Finish to end the wizard.

23.
Click Apply in the details pane, and then complete the change management options and click Apply again.

24.
Click OK when finished to commit the changes.

The rule will now appear in the details pane of the Forefront TMG server. Double-clicking the rule brings up the settings. Tabs can be used to navigate around the different rule settings. The rule itself can be configured with additional settings based on the configuration desired. For example, the following rule information is used to configure our basic FBA web publishing rule for SharePoint:

  • General tab— Name—SharePoint; Enabled = checked.

  • Action tab— Action to take = Allow; Log requests matching this rule = checked.

  • From tab— This rule applies to traffic from these sources = Anywhere.

  • To tab— This rule applies to this published site = home.companyabc.com; Computer name or IP address = 10.10.10.105 (internal IP address of SharePoint server). Forward the original host header instead of the actual one (specified in the Internal Site Name field) = checked; Specify how the firewall proxies requests to the published server = Requests appear to come from the Forefront TMG computer.

  • Traffic tab— This rule applies to traffic of the following protocols = HTTPS.

  • Listener tab, Properties button— Networks tab = External, All IP addresses; Connections tab – Enabled HTTP connections on port 80, Enable SSL connections on port 443; HTTP to HTTPS Redirection = Redirect authenticated traffic from HTTP to HTTPS; Forms tab = Allow users to change their passwords, Remind users that their password will expire in this number of days = 15; SSO tab = Enable Single Sign On, SSO Domains = .companyabc.com.

  • Public Name tab— This rule applies to requests for the following websites = home.companyabc.com.

  • Paths tab— External paths = All are set to <same as internal.; Internal paths = /*, /_vti_inf.html*, /_vti_bin/*, /_upresources/*, /_layouts/*, /* (as illustrated in Figure 7).

    Figure 7. Viewing the tabs on a newly created SharePoint site publishing rule.

  • Authentication Delegation tab— Method used by the Forefront Edge line to authenticate to the published web server = Basic authentication.

  • Application Settings tab— Use customized HTML forms instead of the default = unchecked.

  • Bridging tab— Redirect requests to SSL port = 443.

  • Users tab— This rule applies to requests from the following user sets = All Authenticated Users.

  • Schedule tab— Schedule = Always.

  • Link Translation tab— Apply link translation to this rule = checked.

Different rules require different settings, but the settings outlined in this example are some of the more common and secure ones used to set up this scenario.

Monitoring Forefront TMG Using the Logging Feature

One of the most powerful troubleshooting tools at the disposal of SharePoint and Forefront TMG administrators is the logging mechanism, which gives live or archived views of the logs on a Forefront TMG computer and allows for quick and easy searching and indexing of Forefront TMG log information, including every packet of data that hits the Forefront TMG computer.

Note

Many of the advanced features of the Forefront Edge line logging are available only when using MSDE or SQL databases for the storage of the logs.


The Forefront TMG logs are accessible via the Logging tab in the details pane of the Logs and Reports node, as shown in Figure 8. They enable administrators to watch, in real time, what is happening to the Forefront TMG server, whether it is denying connections, for example, and what rule is being applied for each allow or deny statement.

Figure 8. Examining Forefront TMG logging.

The logs include pertinent information on each packet of data, including the following key characteristics:

  • Log Time— The exact time the packet was processed.

  • Destination IP— The destination IP address of the packet.

  • Destination Port— The destination TCP/IP port, such as port 80 for HTTP traffic.

  • Protocol— The specific protocol that the packet utilized, such as HTTP, LDAP, RPC, or others.

  • Action— What type of action the Forefront Edge line took on the traffic, such as initiating the connection or denying it.

  • Rule— Which particular firewall policy rule applied to the traffic.

  • Client IP— The IP address of the client that sent the packet.

  • Client Username— The username of the requesting client. Note that this is populated only if using the firewall client.

  • Source Network— The source network that the packet came from.

  • Destination Network— The network where the destination of the packet is located.

  • HTTP Method— This column displays the type of HTTP method used, such as GET or POST.

  • URL— If HTTP is used, this column will display the exact URL that was requested.

By searching through the logs for specific criteria in these columns, such as all packets sent by a specific IP address, or all URLs that match http://home.companyabc.com, advanced troubleshooting and monitoring is simplified.

Note

It cannot be stressed enough that this logging mechanism is quite literally the best tool for troubleshooting Forefront TMG access. For example, it can be used to tell whether traffic from clients is even hitting the Forefront TMG server, and if it is, what is happening to it (denied, accepted, and so forth).

Other  
  •  SharePoint 2010 : Outlining the Inherent Threat in SharePoint Web Traffic
  •  SharePoint 2010 : Outlining the Need for the Forefront Edge Line for SharePoint Environments
  •  Collaborating Within an Exchange Server Environment Using Microsoft Office SharePoint Server 2007 : Customizing and Developing MOSS Sites
  •  Collaborating Within an Exchange Server Environment Using Microsoft Office SharePoint Server 2007 : Exploring End-User Features in MOSS
  •  Collaborating Within an Exchange Server Environment Using Microsoft Office SharePoint Server 2007 : Exploring Basic MOSS Features
  •  Collaborating Within an Exchange Server Environment Using Microsoft Office SharePoint Server 2007 : Understanding the History of SharePoint Technologies
  •  Business Intelligence in SharePoint 2010 with PerformancePoint Services : PerformancePoint Services Overview
  •  SharePoint 2010 : Upgrading an Existing Extranet Solution from SharePoint 2007
  •  Exchange Server 2010 : SIP Protocol
  •  Exchange Server 2010 : Unified Messaging Shell Commands
  •  Exchange Server 2010 : Monitoring and Troubleshooting Unified Messaging
  •  Microsoft Content Management Server Development : Managing Channels and Postings with the PAPI - Moving Postings
  •  Microsoft Content Management Server Development : Managing Channels and Postings with the PAPI - Copying Postings
  •  Hosting a Multi-Tenant Application on Windows Azure : Selecting a Single-Tenant or Multi-Tenant Architecture
  •  SharePoint 2010 :Implementing a Partner Extranet Solution (part 2) - Configuring Authentication Providers
  •  SharePoint 2010 :Implementing a Partner Extranet Solution (part 1) - Creating the Extranet Web Application & Creating an Extranet Site Collection
  •  SharePoint 2010 : Implementing Authentication Scenarios
  •  Designing and Configuring Unified Messaging in Exchange Server 2010 : Unified Messaging Installation (part 3)
  •  Designing and Configuring Unified Messaging in Exchange Server 2010 : Unified Messaging Installation (part 2)
  •  Designing and Configuring Unified Messaging in Exchange Server 2010 : Unified Messaging Installation (part 1)
  •  
    Most View
    Memory Buyer's Guide - November 2012 (Part 1)
    MobileMe Gallery after iCloud
    iPad eMail : Sending multiple e-mail attachments
    Company Profiles: Twitter
    Websites & apps at DoS risk
    CorelCAD 2013 - Cost-Effective CAD Option
    Upgrade Android : Archos! Bless you, One step beyond, Custom modes, Flash master & Gingerbread device
    Samsung Galaxy Ace 2 Reviews (Part 1)
    Using Non-Windows Systems to Access Exchange Server 2010 : Configuring and Implementing Entourage for the Mac
    MSI Z77A-GD80 - Zapping In With Thunderbolt
    Top 10
    Nexus 4 – A Smartphone With Elegant Design (Part 7)
    Nexus 4 – A Smartphone With Elegant Design (Part 6)
    Nexus 4 – A Smartphone With Elegant Design (Part 5)
    Nexus 4 – A Smartphone With Elegant Design (Part 4)
    Nexus 4 – A Smartphone With Elegant Design (Part 3)
    Nexus 4 – A Smartphone With Elegant Design (Part 2)
    Nexus 4 – A Smartphone With Elegant Design (Part 1)
    Sony Nex-5R – A Camera With Improved Performance And Focusing (Part 3)
    Sony Nex-5R – A Camera With Improved Performance And Focusing (Part 2)
    Sony Nex-5R – A Camera With Improved Performance And Focusing (Part 1)