,

Dr. Tom Shinder's Configuring ISA Server 2004

Specificaties
Paperback, blz. | Engels
Elsevier Science | e druk, 2004
ISBN13: 9781931836197
Rubricering
Elsevier Science e druk, 2004 9781931836197
Verwachte levertijd ongeveer 9 werkdagen

Samenvatting

Dr. Tom and Debra Shinder have become synonymous with Microsoft's flagship firewall product ISA Server, as a result of Tom's prominent role as a member of the beta development team, and Tom and Deb's featured placement on both Microsoft's ISA Server Web site and ISAserver.org. Tom and Deb's book on the first release of the product "Configuring ISA Server 2000" dominated the ISA Server 2000 book market having sold over 40,000 copies worldwide, and the ISA Server community is eagerly awaiting Tom and Deb's book on ISA Server 2004, which is the dramatically upgraded new release from Microsoft.

Dr. Tom and Debra Shinder have become synonymous with Microsoft's flagship firewall product ISA Server, as a result of Tom's prominent role as a member of the beta development team, and Tom and Deb's featured placement on both Microsoft's ISA Server Web site and ISAserver.org. Tom and Deb's book on the first release of the product "Configuring ISA Server 2000" dominated the ISA Server 2000 book market having sold over 40,000 copies worldwide, and the ISA Server community is eagerly awaiting Tom and Deb's book on ISA Server 2004, which is the dramatically upgraded new release from Microsoft. This book will be featured prominently on the ISAserver.org home page as well as referenced on Microsoft TechNet and ISA Server Web pages. Tom and Deb's unparalleled technical expertise combined with prime on-line marketing opportunities will make this the #1 book again in the ISA Server market.

Specificaties

ISBN13:9781931836197
Taal:Engels
Bindwijze:Paperback

Inhoudsopgave

<p>Dedications</p> <p>Acknowledgments</p> <p>About the Authors</p> <p>Technical Editor</p> <p>A Note From the Publisher</p> <p>From Deb and Tom Shinder, Authors</p> <p>Chapter 1: Evolution of a Firewall: From Proxy 1.0 to ISA 2004</p> <p>The Book: What it Covers and Who It’s For</p> <p>Security: The New Star of the Show</p> <p>Firewalls: The Guardians at the Gateway</p> <p>ISA: From Proxy Server to Full-Featured Firewall</p> <p>Summary</p> <p>Chapter 2: Examining the ISA Server 2004 Feature Set</p> <p>The New GUI: More Than Just a Pretty Interface</p> <p>Teaching Old Features New Tricks</p> <p>New Features on the Block</p> <p>Missing in Action: Gone but Not Forgotten</p> <p>Summary</p> <p>Solutions Fast Track</p> <p>Chapter 3: Stalking the Competition: How ISA 2004 Stacks Up</p> <p>Firewall Comparative Issues</p> <p>Comparing ISA 2004 to Other Firewall Products</p> <p>Summary</p> <p>Solutions Fast Track</p> <p>Chapter 4: ISA 2004 Network Concepts and Preparing the Network Infrastructure</p> <p>Our Approach to ISA Firewall Network Design and Defense Tactics</p> <p>Tom and Deb Shinder’s Configuring ISA 2004 Network Layout</p> <p>How ISA Firewall’s Define Networks and Network Relationships</p> <p>Web Proxy Chaining as a Form of Network Routing</p> <p>Firewall Chaining as a Form of Network Routing</p> <p>Configuring the ISA Firewall as a DHCP Server</p> <p>Summary</p> <p>Solutions Fast Track</p> <p>Chapter 5: ISA 2004 Client Types and Automating Client Provisioning</p> <p>Understanding ISA 2004 Client Types</p> <p>Automating ISA 2004 Client Provisioning</p> <p>Automating Installation of the Firewall Client</p> <p>Summary</p> <p>Chapter 6: Installing and Configuring the ISA Firewall Software</p> <p>Pre-installation Tasks and Considerations</p> <p>Performing a Clean Installation on a Multihomed Machine</p> <p>Default Post-installation ISA Firewall Configuration</p> <p>The Post-installation System Policy</p> <p>Performing an Upgrade Installation</p> <p>Performing a Single NIC Installation (Unihomed ISA Firewall)</p> <p>Quick Start Configuration for ISA Firewalls</p> <p>Hardening the Base ISA Firewall Configuration and Operating System</p> <p>Summary</p> <p>Solutions Fast Track</p> <p>Chapter 7: Creating and Using ISA 2004 Firewall Access Policy</p> <p>Introduction</p> <p>ISA Firewall Access Rule Elements</p> <p>Configuring Access Rules for Outbound Access through the ISA Firewall</p> <p>Using Scripts to Populate Domain Name Sets</p> <p>Creating and Configuring a Public Address Trihomed DMZ Network</p> <p>Allowing Intradomain Communications through the ISA Firewall</p> <p>Summary</p> <p>Solutions Fast Track</p> <p>Chapter 8: Publishing Network Services with ISA 2004 Firewalls</p> <p>Overview of Web Publishing and Server Publishing</p> <p>Creating and Configuring Non-SSL Web Publishing Rules</p> <p>Creating and Configuring SSL Web Publishing Rules</p> <p>SSL Bridging</p> <p>SSL “Tunneling” versus SSL “Bridging”</p> <p>What About SSL-to-HTTP Bridging?</p> <p>Enterprise and Standalone Certificate Authorities</p> <p>SSL-to-SSL Bridging and Web Site Certificate Configuration</p> <p>Importing Web Site Certificates into The ISA Firewall’s Machine Certificate Store</p> <p>Requesting a User Certificate for the ISA Firewall to Present to SSL Web Sites</p> <p>Creating an SSL Web Publishing Rule</p> <p>The Publishing Mode Page</p> <p>The Select Rule Action page</p> <p>The Bridging Mode Page</p> <p>The Define Website to Publish Page</p> <p>The Public Name Details Page</p> <p>The Select Web Listener Page</p> <p>The User Sets Page</p> <p>The SSL Web Publishing Rule Properties Dialog Box</p> <p>Creating Server Publishing Rules</p> <p>Creating Mail Server Publishing Rules</p> <p>Summary</p> <p>Solutions Fast Track</p> <p>Chapter 9: Creating Remote Access and Site-to-Site VPNs with ISA Firewalls</p> <p>Overview of ISA Firewall VPN Networking</p> <p>Creating a Remote Access PPTP VPN Server</p> <p>Creating a Remote Access L2TP/IPSec Server</p> <p>Creating a PPTP Site-to-Site VPN</p> <p>Creating an L2TP/IPSec Site-to-Site VPN</p> <p>IPSec Tunnel Mode Site-to-Site VPNs with Downlevel VPN Gateways</p> <p>Using RADIUS for VPN Authentication and Remote Access Policy</p> <p>Using EAP User Certificate Authentication for Remote Access VPNs</p> <p>Supporting Outbound VPN Connections through the ISA Firewall</p> <p>Installing and Configuring the DHCP Server and DHCP Relay Agent on the ISA Firewall</p> <p>Creating a Site-to-Site VPN Between an ISA Server 2000 and ISA Firewall</p> <p>A Note on VPN Quarantine</p> <p>Summary</p> <p>Solutions Fast Track</p> <p>Chapter 10: ISA 2004 Stateful Inspection and Application Layer Filtering</p> <p>Introduction</p> <p>Application Filters</p> <p>Web Filters</p> <p>IP Filtering and Intrusion Detection/Intrusion Prevention</p> <p>Summary</p> <p>Solutions Fast Track</p> <p>Chapter 11: Accelerating Web Performance with ISA 2004 Caching Capabilities</p> <p>Understanding Caching Concepts</p> <p>Understanding ISA Server 2004’s Web Caching Capabilities</p> <p>Configuring ISA Server 2004 as a Caching Server</p> <p>Summary</p> <p>Fast Track</p> <p>Chapter 12: Using ISA Server 2004’s Monitoring, Logging, and Reporting Tools</p> <p>Introduction</p> <p>Exploring the ISA Server 2004 Dashboard</p> <p>Creating and Configuring ISA Server 2004 Alerts</p> <p>Monitoring ISA Server 2004 Connectivity, Sessions, and Services</p> <p>Working with ISA Server 2004 Logs and Reports</p> <p>Using ISA Server 2004’s Performance Monitor</p> <p>Solutions Fast Track</p> <p>Index</p>

Rubrieken

    Personen

      Trefwoorden

        Dr. Tom Shinder's Configuring ISA Server 2004