tmgreporter

How To Secure And Publish the Fastvue TMG Reporter Web Site

by

Scott Glew

Scott Glew

By default, Fastvue TMG Reporter is open and unrestricted for anonymous users to view. For a number of privacy related reasons you might need to restrict access to the site. You may also want to further restrict access to the Settings tab to prevent unauthorised users from making configuration changes to TMG Reporter. To improve security even further, it is a good idea to add SSL encryption for authentication.

TMG Reporter also generates reports and alerts that you may want to view from outside the corporate network.

In this article I will show you how to restrict access to the TMG Reporter website, and further restrict access to the Settings tab using Windows Authentication and Authorization Rules in IIS, and how to enable SSL (HTTPS) for the site.

I will also show you how to make the TMG Reporter website available outside the corporate network, using Forefront TMG's Web Publishing feature.

Restricting User Access

The simplest way of achieving this is by using IIS authorization rules. There a few prerequisites.  All of the following needs to be performed on the Fastvue TMG Reporter server.

Create Groups

  1. Open Server Manager and browse to Configuration | Local Users and Groups
  2. Create a group for Fastvue Viewers
  3. Populate this group with the AD users and groups that need to view TMG Reporter's dashboards and reports
  4. Create a group for Fastvue Admins
  5. Populate this group with the AD users and groups that need access to the Settings Tab

Configuring IIS

All the following steps will be performed in the IIS Management Console on the Fastvue TMG Reporter server.  Depending on your configuration you may need to install the 'Windows Authentication' and 'URL Authorization' Role Services for IIS in Server Manager.

Enable Authentication

Authorization rules require that users authenticate. We will therefore first enable Windows Authentication.

  1. Select the Fastvue TMG Reporter IIS site (in this case it is Default Web Site)
  2. Select Authentication
  3. Select and Disable Anonymous Authentication
  4. Select and Enable Windows Authentication

Allow Access to the Site

  1. Select the Fastvue TMG Reporter IIS site again
  2. Select Authorization Rules
  3. Select Add an Allow Rule
  4. In the specified roles or users group, add the Fastvue Viewers group created earlier
  5. Create another allow rule this time for the Fastvue Administrators
  6. Remove the Allow all users rule

Remove Access to the Settings Tab

At this point user access to the Fastvue TMG reporter site will be limited to the users specified in the groups. To restrict access to the Setting tab do the following in the IIS Management Console:

  1. Select and Expand the Fastvue TMG Reporter site
  2. Select the Settings folder under the Fastvue TMG Reporter website
  3. Select Authorization Rules
  4. The rules created earlier will be inherited here.
  5. Select and Remove the Fastvue Viewers rule

At this point only the Fastvue Administrators group should have access to the Settings tab.  If you are testing this remember to close the browser to end the user sessions.

Securing the site with HTTPS

Any site that requires credentials to be passed should be secured using SSL encryption. This means using HTTPS and certificates. For this article we will be using an internal self-signed certificate but in practice it is better to use a certificate from your internal PKI or a third party CA such as VeriSign.

Generate a Certificate

  1. Open the IIS Management Console
  2. Select the IIS server itself (not the site)
  3. Select Server Certificates
  4. Select Create Self-Signed Certificate
  5. Specify a friendly name for the certificate. A good practice is to use the server's FQDN name. This will generate a certificate that matches the server's name.

Add the HTTPS Binding

  1. Select the Fastvue TMG Reporter IIS website (e.g. Default Web Site on the left)
  2. Under Actions on the right, select Bindings...
  3. Select Add
  4. Change the type to HTTPS
  5. In the SSL certificate box select the Self-Signed Certificate created earlier
  6. Click OK to finish the change

Enforce SSL

  1. Select the Fastvue TMG Reporter IIS website again on the left
  2. Select SSL Settings
  3. Check the Require SSL Box and then Apply on the right hand side

The Fastvue TMG Reporter site will now require HTTPS and users to be authenticated. At this point you will see a certificate warning since the self-signed certificate is not from a trusted CA on the client machine. Using either an internal PKI or a third party CA certificate would resolve this issue. The other issue you will notice is that when attempting to connect to the site using HTTP you will get:

403 – Forbidden: Access is denied Error

To neaten things up we can change the 403 error page to redirect us to HTTPS.

Customize Error Pages

  1. Still in the IIS Management Console, select the Fastvue TMG Reporter site on the left
  2. Select Error Pages
  3. Select and Edit 403
  4. Select the Respond with a 302 redirect option
  5. Specify https:// followed by the FQDN of your site. For example, https://fastvue01.mydomain.com. Make sure you specify the S in https://

Publish TMG Reporter to the Internet

Now that the TMG Reporter site is secured, you can make the site available outside your network using Forefront TMG's Web Publishing feature.

For this to work your certificate must be from a root certificate authority the TMG Server trusts. This means an internal PKI or third party.

Create a listener

  1. Export the Site certificate you created and import it to the local store on each Forefront TMG array member (See this article on Importing and Exporting certificates)
  2. In the TMG Management Console, select Firewall Policy
  3. Select the Toolbox tab on the right and ensure the Network Objects section is expanded.
  4. Select New | Web listener
  5. On the Client Connection Security page, select Do not require SSL secured connections with clients
  6. On the Web Listener IP Addresses page, select the Networks that you would like to make the site available to, such as VPN Clients or All Networks.
  7. On the Authentication Settings page, select No Authentication
  8. Click Next on the Single Sign On Settings page, as no changes can be made here
  9. Click Finish to add the Web Listener
  10. Double-click the newly added Web Listener as there are still some settings that need to be changed
  11. On the Connections tab, check both Enable HTTP..., and Enable SSL (HTTPS)... Connections
  12. Select the option to Redirect all traffic from HTTP to HTTPS
  13. On the Certificates tab, select the certificate you imported in step 1

Create a Publish Web Site Rule

  1. In the TMG Management Console, select Firewall Policy on the left, and select the Tasks tab on the right.
  2. Click Publish Web Sites to launch the New Web Publishing Rule Wizard.
  3. Provide an appropriate name for the rule such as TMG Reporter
  4. Select Allow on the Rule Actions page
  5. Select Publish a single web site or load balancer
  6. Select Use SSL to connect to the published web server…
  7. Specify the internal site name such as http://fastvue01.mydomain.com
  8. Specify the path as /* to publish all files and folders
  9. Select Accept request for this domain name and specify the public FQDN name for the site
  10. Select the Web Listener created earlier
  11. For Authentication Delegation select No delegation, but client may authenticate directly
  12. Select All Users
  13. Apply the changes and test.

Congratulations! Your Fastvue TMG Reporter site should now be nice and secure and available from the Internet.

Take Fastvue Reporter for a test drive

Download our FREE 30-day trial, or schedule a demo and we'll show you how it works.

  • Share this story
    facebook
    twitter
    linkedIn

How Kerberos and CARP Affect Forefront TMG Reporting

When using both Kerberos and CARP in Forefront TMG 2010 SP2 you may see domain accounts using a lot of bandwidth in your TMG Reports.
TMG Reporter

Reporting on Celestix MSA Threat Management Gateway Appliances

Celestix MSA Series appliances run Forefront Threat Management Gateway and deliver superior TMG Reporting with Fastvue TMG Reporter.
TMG Reporter