O'Reilly logo

Microsoft® Forefront® Threat Management Gateway (TMG) Administrator’s Companion by Jim Harrison Yuri Diogenes and Mohit Saxena

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 4. Analyzing Network Requirements

  • Determining Your Traffic Profile 47

  • TMG Deployment Options 51

  • Addressing Complex Networks 53

  • Configuring TMG Networks 54

  • Understanding How Name Resolution Impacts TMG 58

  • Summary 64

Before you begin sizing your TMG deployment, you need to understand the network and traffic patterns that TMG will be required to support. This involves several steps, each of which may require repeated cycles of testing and analysis. In this chapter, you will learn how to evaluate your network and your network's traffic patterns so that your TMG deployment can proceed as smoothly as possible.

Determining Your Traffic Profile

A traffic profile is a map of the application protocols used within your network. These may include simple protocols ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required