To create a web server publishing rule for AD RMS on a computer running TMG 2010, follow the steps below:

1. Click Start, point to Programs, point to Microsoft Forefront TMG, and then click Forefront TMG Management.



2. In the left pane, expand ServerName, right-click Firewall Policy, point to New, and then click Web Site Publishing Rule.



3. On the Welcome to the New Web Publishing Rule page, type a display name for the publishing rule (for example, AD-RMS-Pipeline-URLs).



4. On the Select Rule Action page, select Allow.



5. On the Publishing Type page, select Publish a single Web site or load balancer.



6. On the Server Connection Security page, select Use SSL to connect to the published Web server or server farm.



7. On the Internal Publishing Details page, type the fully qualified domain name (FQDN) of the internal web site in the Internal Site name box.

Note: If your internal server is a Standard Edition server, this FQDN is the Standard Edition server FQDN. If your internal server is a Front End pool, this FQDN is a hardware load balancer virtual IP (VIP) that load balances the internal web servers. The TMG server must be able to resolve the FQDN to the IP address of the internal web server. If the TMG server is not able to resolve the FQDN to the proper IP address, you can select Use a computer name or IP address to connect to the published server, and then in the Computer name or IP address box, type the IP address of the internal web server. If you do this, you must ensure that port 53 is open on the TMG server and that it can reach a DNS server that resides in the perimeter network. You can also use entries in the local hosts file to provide name resolution.

8. On the Internal Publishing Details page, in the Path (optional) box, type /_wmcs/Certification/* as the path of the folder to be published



9. Repeat the previous steps but for the path /_wmcs/Licensing/*

Note: In the website publishing wizard you can only specify one path. Additional paths can be added by modifying the properties of the rule.

10. On the Public Name Details page, confirm that This domain name is selected under Accept Requests for, type the external Web Services FQDN, in the Public Name box.



11. On Select Web Listener page, click New to open the New Web Listener Definition Wizard.



12. On the Welcome to the New Web Listener Wizard page, type a name for the web listener in the Web listener name box (for example, AD-RMS-Pipeline-URLs).



13. On the Client Connection Security page, select Require SSL secured connections with clients.



14. On the Web Listener IP Address page, select External, and then click Select IP Addresses.



15. On the External Listener IP selection page, select Specified IP address on the Forefront TMG computer in the selected network, select the appropriate IP address, click Add.



16. On the Listener SSL Certificates page, select Assign a certificate for each IP address, select the IP address that is associated with the external web FQDN, and then click Select Certificate.



17. On the Select Certificate page, select the certificate that matches the public names specified in step 9, click Select.



18. On the Authentication Setting page, select No Authentication.



19. On the Single Sign On Setting page, click Next.



20. On the Completing the Web Listener Wizard page, verify that the Web listener settings are correct, and then click Finish.



21. On the Authentication Delegation page, select No delegation, but client may authenticate directly.



22. On the User Set page, click Next.



23. On the Completing the New Web Publishing Rule Wizard page, verify that the web publishing rule settings are correct, and then click Finish.



24. Click Apply in the details pane to save the changes and update the configuration.

To modify the properties of the web publishing rule



________________________________________



1. Click Start, point to Programs, point to Microsoft Forefront TMG, and then click Forefront TMG Management.



2. In the left pane, expand ServerName, and then click Firewall Policy.



3. In the details pane, right-click the web server publishing rule that you created in the previous procedure (for example, AD-RMS-Pipeline-URLs), and then click Properties.



4. On the Properties page, on the From tab, do the following:



- In the This rule applies to traffic from these sources list, click Anywhere, and then click Remove.



- Click Add.



- In Add Network Entities, expand Networks, click External, click Add, and then click Close.



5. On the To tab, ensure that the Forward the original host header instead of the actual one check box is selected.



6. On the Bridging tab, select the Redirect request to SSL port check box, and then specify port 443.



7. On the Public Name tab, add the simple URLs (for example, rms.contoso.com).



8. Click Apply to save changes, and then click OK.



9. Click Apply in the details pane to save the changes and update the configuration.

 

See Also