PIRATED 20130913 2307

PIRATED 20130913 2307

NOTE: This content appears to have been plagiarized. Please leave a comment or email tnwiki at Microsoft (with a link to this article) if we are mistaken. The content was pulled from the following source:
The community rules state:
  • "Someone else has relevant content and you want to help them share it with the world. It's a nice thought, but do not copy other people's content to the Wiki, even if the owner said it was OK."



TMG (Threat Management Gateway)

UAG (Unified Access Gateway)

Replacement for ISA (Internet Security and Acceleration) Server 2006 that serves as a firewall Replacement for IAG (Intelligent Application Gateway) that serves as a remote access solution for applications
Primarily meant to be a firewall solution for internal network Does not offer a firewall solution but installs TMG, which is used as a firewall for UAG local host (not for internal network) and allows you to only publish SMTP server
Supports inbound and outbound access (firewall or forward proxy) Does not support outbound access
Supports forward-proxy Does not support forward-proxy
Supports reverse-proxy Supports reverse-proxy but because of some limitations TMG is considered a better reverse-proxy solution for certain situations
Can be used to publish internal resources to the outside world Better for publishing internal resources than TMG because it can publish multiple applications on a single IP address using the UAG portal, which is essentially one URL that gives users access to all published applications on internal network
Can be used for VPN connections Can be used for VPN connections
Supports PPTP and L2TP VPNs Does not support PPTP and L2TP VPNs
Much simpler to configure than UAG (keep in mind they serve different purposes), especially if upgrading from ISA Server 2006 because it may take just a few minutes to configure by simply exporting ISA Server 2006 configuration and importing it in TMG Complicated to configure than TMG (keep in mind they serve different purposes) because it can possibly take months to configure UAG properly
Does not include an advanced end-point mechanism similar to Network Access Protection (NAP) Includes an advanced end-point mechanism which is similar to Network Access Protection (NAP) where you can control access to your network by setting rules, such as restricting connections only to clients that have a certain operating system and anti-virus software installed
Licensing is per processor Licensing is per Client Access License (CAL)
Leave a Comment
  • Please add 4 and 8 and type the answer here:
  • Post
Wiki - Revision Comment List(Revision Comment)
Sort by: Published Date | Most Recent | Most Useful
Comments
  • Carsten Siemens edited Original. Comment: Pirated Content - see my comment

Page 1 of 1 (1 items)
Wikis - Comment List
Sort by: Published Date | Most Recent | Most Useful
Posting comments is temporarily disabled until 10:00am PST on Saturday, December 14th. Thank you for your patience.
Comments
  • Carsten Siemens edited Original. Comment: Pirated Content - see my comment

  • NOTE: This article was reported as Pirated/Plagiarized Content (content you didn't write) and will be removed. Please do not steal content from others. If you feel we are mistaken, please leave a comment or email tnwiki at Microsoft with a link to this article and with clear and detailed reasons why you own the content or have explicit permission from the author.

    Content was taken from: "What’s the Difference Between Unified Access Gateway (UAG) and Threat Management Gateway (TMG)?"

    Published by Zubair Alexander on December 9, 2012

    blog.techgalaxy.net/.../3745

Page 1 of 1 (2 items)