These release notes address late-breaking issues for Forefront Unified Access Gateway (UAG) Service Pack One (SP1). In addition to reviewing these release notes, we recommend that you review the Release notes for Forefront UAG 2010, which include a list of RTM issues fixed by SP1.
If you are reading this help from the Forefront UAG Management console, the latest version of this topic is available in the Forefront UAG TechNet library.
- Installation and
administration issues
- Forefront UAG
DirectAccess issues
- Publishing
issues
- Client issues
Installation and upgrade issues
- We recommend that you add a restore point on the Forefront UAG
server before running SP1 installation.
- Installing SP1 on a server running Forefront UAG that has not
had the configuration activated is not supported.
- We recommend that you do not have installations of other
applications in progress when you install SP1 on an existing
Forefront UAG server. Otherwise you might receive the following
message during SP1 installation: “Setup failed during Forefront UAG
prerequisites installation”. If you do receive this error, do the
following:
- Restart the computer.
- Wait several minutes for any installations that are in progress
to complete.
- Reinstall SP1.
- Restart the computer.
- After cancelling Forefront UAG SP1 setup during installation of
Forefront TMG SP1 or Forefront TMG SP1 Update 1 installation, the
following might occur:
- Activation and export of the Forefront UAG configuration might
not work as expected.
- You cannot rerun Forefront UAG SP1 setup.
Copy Code set fpc = CreateObject("FPC.ROOT") set arr = fpc.GetContainingArray For Each srv in arr.Servers WScript.Echo "Removing SP1-specific filters from server " & srv.Name srv.InstalledWebFilters.RemoveSpecified "{9599218C-CCE6-4C39-B0DB-A0F2DFF0C486}" Next WScript.Echo "Saving..." arr.Save WScript.Echo "Done."
- Activation and export of the Forefront UAG configuration might
not work as expected.
- After installing SP1 RTM on a Forefront UAG server running SP1
RC and acting as a DirectAccess server, the DNS64 service will be
set to Manual. Following the installation, set the DNS64
service to Automatic and start the service.
- When you install SP1 on an existing Forefront UAG server,
customized endpoint access policies (including download and upload
policies) might be deleted. Record your customized policies and
expressions before upgrading, and recreate them manually after
completing SP1 installation.
- When you install SP1 on an existing Forefront UAG server,
registry values you have customized might be overwritten with
default values. Note custom values before running SP1 setup, and
verify after installation. For more information about customizable
values, see Forefront UAG registry
keys.
- If you receive the error “Setup failed during Forefront TMG SP1
Update 1 installation” when installing SP1 on an existing Forefront
UAG server, do the following:
- Press Enter to close the error dialog box.
- Restart the computer.
- Open a command line prompt and type: net stop isactrl /y. This
stops the service and dependent services.
- Run the SP1 installation again.
- Press Enter to close the error dialog box.
- If you install SP1 on a Forefront UAG server that publishes
multiple Outlook Web Access 2007 or Outlook Web App 2010
applications via the same trunk (using different host names),
following installation each application will be assigned the same
host name. As a workaround, record the host names before installing
the service pack, and then manually modify the host names after
installation.
- After installing SP1 RTM on a Forefront UAG server running SP1
RC, uninstalling the RTM service pack and rolling back to SP1 RC is
not supported. For a complete list of uninstall scenarios, see
Uninstalling and
rolling back Forefront UAG SP1.
Forefront UAG DirectAccess issues
- When deploying Forefront UAG DirectAccess for remote management
only, under specific circumstances clients can potentially access a
server in the internal network via DirectAccess, by creating and
merging local IPsec rules with corporate policy rules. To ensure
this does not occur, we recommend that you do not provide users
with local administrator privileges on DirectAccess client
computers. For more information about this issue, see Selecting a deployment
model in SP1.
- After installing SP1 on a Forefront UAG RTM server, folders in
the Built-in Server Groups section on the Management
Servers page of the DirectAccess Infrastructure Server
Configuration Wizard are duplicated in the User-Defined Server
Groups section. Do the following:
- Click Refresh All to ensure that servers that are
automatically discovered appear in the built-in servers list.
- Copy any servers that do not exist in the Windows Update
Servers group from the user-defined Windows Update
group.
- Copy any servers that do not exist in the SCCM Servers
group from the user-defined Client Management group.
- Copy any servers that do not exist in the HRA Servers
group from the user-defined NAP group.
- Click Refresh All to ensure that servers that are
automatically discovered appear in the built-in servers list.
- On DirectAccess client computers, Forefront UAG DirectAccess
configures a NAT compatibility setting for the SMB protocol.
This setting remains even if you disable DirectAccess or
remove the client computer from the group of devices that receive
the client GPO. To revert the setting manually, configure the
following registry key via group policy:
In HKEY_LOCAL_MACHINE\ SYSTEM\CurrentControlSet\Services\Lanmanworkstation\ set the SMB1NATCompatibilityLevel value to 0.
- When you configure OTP CA settings with the automatically
generated script, Forefront UAG enables the setting Do not
include revocation information in issued certificates on the
OTP client certificate templates. With this setting enabled, if you
use OSCP server URLs in the AIA template files, CA services might
not work as expected unless the OCSP URL locations appear last on
the AIA extension list. As a workaround, disable the Do not
include revocation information in issued certificates
setting.
- When using Forefront UAG DirectAccess, do not configure
Forefront UAG trunks with the external IP addresses that are
defined for DirectAccess.
- When querying SQL Server Forefront UAG log fields using the
Forefront TMG log viewer, the log cannot be filtered with the
UAG error code field.
- If Forefront UAG DirectAccess is deployed for intranet access
with force tunneling and you want to change the deployment mode to
remote management only, do the following to ensure that
DirectAccess clients do not lose Internet connectivity.
- Disable force tunneling.
- Enable DirectAccess for remote management only.
- Apply the configuration and activate.
- Disable force tunneling.
Publishing issues
- When you publish an application with an application-specific
hostname and identical internal and external host names, the port
for the backend application must use the same standard port as the
Forefront UAG trunk via which the application is published.
- After installing SP1 on a Forefront UAG server that publishes
the Forefront Identify Manager 2010 or Rights Management Server
applications, we recommend that you do the following:
- Record the publishing settings
- Remove the existing application from the portal
- Republish the application
- Record the publishing settings
- When publishing Forefront Identify Manager 2010 via Forefront
UAG, the application does not open in the portal as expected. As a
workaround, ensure that the setting Open in a new window is
enabled in the Portal Link tab of the application
properties.
- After installing SP1 on a u server that publishes SharePoint
Server, clients might experience issues when syncing with Office
applications. To avoid this issue, do the following to ensure that
Forefront UAG does not replace URLs in the Web Service
response:
- In the properties of the trunk via which the SharePoint Server
is published, open the Portal tab.
- Click the Edit button next to Do not parse the
response bodies of the response to these requests.
- In the URLs without body parsing in response dialog box,
under Servers, click Add.
- Specify the name of the server running SharePoint Server. For
example, if the server URL is https://contoso, specify the name
contoso.
- In the URLs without body parsing dialog box, under
URLs, click Add.
- In the Add URLS dialog box, add the following:
- * .*/_vti_bin/webs\.asm
- * .*/_vti_bin/lists\.asmx
- * .*/_vti_bin/webs\.asm
- In the properties of the trunk via which the SharePoint Server
is published, open the Portal tab.
- When you publish Outlook Web App via an anonymous trunk that
does not require session authentication, clients logged on to
Outlook Web App with a password that is about to expire might be
presented with a policy error page instead of the password expired
page. To ensure this does not occur, configure URL filtering to
allow access to the password expired web page as follows:
- On the URL Set tab of the trunk properties, click Add
Primary.
- Configure a rule with the following settings:
- Name: ExchangePub2010_Rule43 or
ExchangePub2007_Rule37
- Action: Accept
- URL: /owa/auth/expiredpassword.aspx
- Parameters: Ignore
- Method: POST, GET
- Name: ExchangePub2010_Rule43 or
ExchangePub2007_Rule37
- On the URL Set tab of the trunk properties, click Add
Primary.
Client issues
- When more than one client device accesses a Forefront UAG
portal simultaneously after configuration settings have been
activated, the portal toolbar might not display as expected. To
ensure this does not occur, always access the portal from a single
client device directly after each activation. If the issue occurs,
do either of the following:
- Activate again and access the portal from a single client
device directly after activation.
- Alternatively, open the file
\von\PortalHomePage\Data\SiteMap\ToolBar\Web.sitemap, and save it
without making any changes. A single client device should then
access the portal.
- Activate again and access the portal from a single client
device directly after activation.
- After installing DirectAccess Connectivity Assistant (DCA) 1.5
on client computers running DCA 1.0, both DCA 1.0 and DCA 1.5 might
appear in the Programs and Features list of the Control Panel. This
does not cause unexpected behavior and can be ignored.
- In Forefront UAG RTM, mobile devices including the iPhone,
Android and Windows Mobile were included in the Windows, Mac, and
Linux platform-specific policies, and allowed access by the
Forefront UAG Default Session Access policy. In Forefront
UAG SP1, mobile devices were removed from this policy, and now
belong to the Other platform-specific policy. To continue to
include them in the Default Session Access Policy, do the
following:
- In the trunk that allows access to these devices, open the
Endpoint Access Settings tab, and click Edit Endpoint
Policies.
- In the Manage Policies and Expressions list, click
Default Session Access, and then click Edit
Policy.
- In Other, select Always.
- Apply the configuration.
- In the trunk that allows access to these devices, open the
Endpoint Access Settings tab, and click Edit Endpoint
Policies.
- Forefront UAG access policies allow or block access based on
client device settings. If devices of one type access Forefront UAG
resources acting as devices of a different type (for example, if
you access a portal using a Windows Phone 7 device, and select the
Desktop version as a website preference in Internet
Explorer) then access policies might not be applied as expected.
Note that even if portal access is allowed for a device, client
components will not be installed.
- When client devices are running Outlook, and User Account
Control (UAC) is enabled, the Email Logs button in
DirectAccess Connectivity Assistant 1.5 might not work as
expected.
- If a DirectAccess client computer has no connection to a
DirectAccess server, DirectAccess Connectivity Assistant
incorrectly shows a yellow warning icon instead of a red error
icon. This occurs because the DirectAccess server address is stored
in the DNS cache of the client computer. To show the correct icon,
DirectAccess Connectivity Assistant users can clear the cache on
the DirectAccess client computer by opening an elevated command
line and running ipconfig/flushdns from the command line. If the
cache is not cleared manually, the DNS entry expires after a
predefined period (one hour by default).