Acronis Access Advanced - Administrator's Guide User Manual

Page 100

Advertising
background image

100

Copyright © Acronis International GmbH, 2002-2014

Single Network Adapter - This topology enables limited Forefront TMG functionality. In this
topology, Forefront TMG is connected to one network only, either the internal network or a
perimeter network. Typically, you would use this configuration when Forefront TMG is located in
the internal corporate network or in a perimeter network, and another firewall is located at the
edge, protecting corporate resources from the Internet.

Info:

For more information about how to install and configure TMG visit:
http://technet.microsoft.com/en-us/library/cc441445.aspx
http://technet.microsoft.com/en-us/library/cc441445.aspx.

For TMG minimum systems requirements visit:
http://www.microsoft.com/forefront/threat-management-gateway/en/us/system-requirements.aspx
http://www.microsoft.com/forefront/threat-management-gateway/en/us/system-requirements.aspx.

For pricing details visit:
http://www.microsoft.com/forefront/threat-management-gateway/en/us/pricing-licensing.aspx
http://www.microsoft.com/forefront/threat-management-gateway/en/us/pricing-licensing.aspx.

5.4.2.2

Understanding Forefront Threat Management Gateway

authentication

TMG provides 3 general methods of authenticating users and they are:

Advertising