Acronis Access Advanced - Administrator's Guide Uživatelský manuál Strana 100

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 259
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 99
100 Copyright © Acronis International GmbH, 2002-2014
Single Network Adapter - This topology enables limited Forefront TMG functionality. In this
topology, Forefront TMG is connected to one network only, either the internal network or a
perimeter network. Typically, you would use this configuration when Forefront TMG is located in
the internal corporate network or in a perimeter network, and another firewall is located at the
edge, protecting corporate resources from the Internet.
Info:
For more information about how to install and configure TMG visit:
http://technet.microsoft.com/en-us/library/cc441445.aspx
http://technet.microsoft.com/en-us/library/cc441445.aspx.
For TMG minimum systems requirements visit:
http://www.microsoft.com/forefront/threat-management-gateway/en/us/system-requirements.aspx
http://www.microsoft.com/forefront/threat-management-gateway/en/us/system-requirements.aspx.
For pricing details visit:
http://www.microsoft.com/forefront/threat-management-gateway/en/us/pricing-licensing.aspx
http://www.microsoft.com/forefront/threat-management-gateway/en/us/pricing-licensing.aspx.
5.4.2.2 Understanding Forefront Threat Management Gateway
authentication
TMG provides 3 general methods of authenticating users and they are:
Zobrazit stránku 99
1 2 ... 95 96 97 98 99 100 101 102 103 104 105 ... 258 259

Komentáře k této Příručce

Žádné komentáře