disturbedone
Vendor
I'm in the process of setting up Microsoft UAG for the first time and am looking for some guidance on the best configuration.
Scenario:
[ul]
[li]VMware vCentre 5.1[/li]
[li]W2K8R2 servers are all VMs[/li]
[li]Cisco ASA5520 firewall[/li]
[li]VLAN11 (10.11.0.0/16) is for most VMs including 2x DCs[/li]
[li]VLAN172 (172.20.95.0/24) is for servers in DMZ[/li]
[/ul]
I've configured 2x vNICs on the UAG VM. One on VLAN172 and one on VLAN11. My first question is around that - the documentation I've found for setting up an HTTPS trunk is that the external NIC should be a public IP address rather than an internal one eg 172.20.95.x/24. Is that correct? If so, in a virtual environment where the NIC cannot be physically connected to the external world how can that be achieved? Or would I giev it a DMZ address and port forward on the firewall like I do with everything else?
That's the first step. Once I've got that sorted I'll work my way through the rest of it.
Scenario:
[ul]
[li]VMware vCentre 5.1[/li]
[li]W2K8R2 servers are all VMs[/li]
[li]Cisco ASA5520 firewall[/li]
[li]VLAN11 (10.11.0.0/16) is for most VMs including 2x DCs[/li]
[li]VLAN172 (172.20.95.0/24) is for servers in DMZ[/li]
[/ul]
I've configured 2x vNICs on the UAG VM. One on VLAN172 and one on VLAN11. My first question is around that - the documentation I've found for setting up an HTTPS trunk is that the external NIC should be a public IP address rather than an internal one eg 172.20.95.x/24. Is that correct? If so, in a virtual environment where the NIC cannot be physically connected to the external world how can that be achieved? Or would I giev it a DMZ address and port forward on the firewall like I do with everything else?
That's the first step. Once I've got that sorted I'll work my way through the rest of it.