O'Reilly logo

Microsoft® Forefront® Threat Management Gateway (TMG) Administrator’s Companion by Jim Harrison Yuri Diogenes and Mohit Saxena

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 12. Understanding Access Rules

  • Traffic Policy Behavior 241

  • Understanding Policy Re-Evaluation 249

  • Troubleshooting Access Rules 253

  • Summary 262

The single most flexible part of TMG—and thus most difficult for most administrators to understand—is the traffic policy engine. This is a deeply complex mechanism, so we decided to cover it in multiple chapters. In this chapter, you'll learn about access rules and how they're processed in the context of traffic flow through TMG. Publishing rules will be covered in Chapters Chapter 21 through 24.

Traffic Policy Behavior

TMG offers the same top-down policy engine that ISA Server 2006 administrators have become accustomed to. This means that with very few exceptions, policy rules processed by TMG will be ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required