图书介绍
Microsoft ISA Server 2000 英文影印版PDF|Epub|txt|kindle电子书版本网盘下载
- (美)Microsoft公司著 著
- 出版社: 北京:北京大学出版社
- ISBN:7301051603
- 出版时间:2001
- 标注页数:608页
- 文件大小:52MB
- 文件页数:654页
- 主题词:
PDF下载
下载说明
Microsoft ISA Server 2000 英文影印版PDF格式电子书版下载
下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!
(文件页数 要大于 标注页数,上中下等多册电子书除外)
注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具
图书目录
Chapter 1 Introduction to Microsoft Internet Security and Acceleration Server 20001
About This Chapter1
Before You Begin2
Lesson 1 Overview of ISA Server3
Editions Comparison3
ISA Server Enterprise Edition3
ISA Server Standard Edition4
Key Differences4
ISA Server Roles4
Internet Firewall5
Secure Server Publishing5
Forward Web Caching Server5
Reverse Web Caching Server5
Integrated Firewall and Web Cache Server5
Windows 2000 Integration6
Extensibility9
Scalability9
ISA Server Architecture10
Practice:ISA Server Overview Presentation15
Lesson Summary16
Lesson 2 Introduction to the ISA Server Firewall17
Filtering Methods17
IP Packet Filtering17
Circuit-Level(Protocol)Filtering18
Application Filtering19
Bandwidth Rules22
Integrated Virtual Private Networking22
Integrated Intrusion Detection24
Packet Filter Intrusions24
Secure Publishing25
Lesson Summary27
Lesson 3 Overview of ISA Server Caching28
High-Performance Web Cache28
Forward Web Caching Server28
Reverse Web Caching Server30
Active Caching31
Scheduled Content Download31
CARP and Cache Server Scalability32
Hierarchical Caching33
Web Proxy Routing34
Lesson Summary35
Lesson 4 ISA Server s Management Features37
Intuitive User Interface37
Policy-Based Access Control38
Integrated Administration38
Tiered Policy40
Array Policy40
Enterprise Policy41
Lesson Summary41
Review43
Chapter 2 Installing Microsoft Internet Security and Acceleration Server 200045
About This Chapter45
Before You Begin46
Capacity Planning47
Lesson 1 Planning for an ISA Server Installation47
Minimal Requirements48
Remote Administration Requirements48
Firewall Requirements48
Forward Caching Requirements49
Publishing and Reverse Caching Requirements50
Array Considerations50
Standalone Servers and Single-Server Arrays51
Array Requirements51
ISA Server Mode52
Internet Connectivity Considerations53
Publishing and Connectivity54
ISA Server in the Network54
Windows NT 4.0 Domain54
ISA Server Configuration Data54
Small Office Scenario55
ISA Server Network Topology Scenarios55
Remote Access Server55
Internet Connection Server55
Enterprise Scenario56
Enterprise Network Configuration56
Web Publishing Topologies58
Co-Located Web Server58
Web Server on Local Network58
Co-Located Exchange Server59
Exchange Server Publishing Topologies59
Exchange Server on Local Network60
Perimeter Network(DMZ)Scenarios60
Back-to-Back Perimeter Network Configuration61
Three-Homed Perimeter Network(DMZ)Configuration62
Lesson Summary63
Lesson 2 Performing an ISA Server Installation64
Before You Install ISA Server64
Setting Up the Network Adapter64
Setting Up a Modem or ISDN Adapter65
TCP/IP Settings65
Windows 2000 Routing Table66
Installing ISA Server66
Initializing the Enterprise67
Installation Procedure68
Constructing the Local Address Table70
Windows 2000 Routing Table71
Default Settings71
Troubleshooting ISA Server Installation72
Practice:Installing ISA Server Enterprise Edition73
Exercise 1:Initializing the Enterprise73
Exercise 2:Installing ISA Server Software74
Lesson Summary77
Lesson 3 Migrating from Proxy Server 2.078
Migrating from Microsoft Proxy Server 2.078
Operating System Considerations78
Proxy Server on Windows 200078
Proxy Server on Windows NT 4.079
Proxy Server 2.0 Array Considerations80
Migrating to an Array81
Migrating Proxy Server 2.0 Configuration82
Proxy Chains82
Web Proxy Client Requests82
Publishing82
Cache82
SOCKS82
Lesson Summary83
Rules and Policies83
Review84
Chapter 3 Configuring Secure Internet Access85
About This Chapter85
Before You Begin86
Lesson 1 Configuring Local Clients for Secure Internet Access87
About ISA Server Clients87
Assessing Client Requirements88
Configuring SecureNAT Clients90
Configuring SecureNAT Clients on a Simple Network91
Configuring SecureNAT Clients on a Complex Network91
Additional SecureNAT Configuration for Dial-up Networks91
Resolving Names for SecureNAT Clients92
Internet Access Only92
Internal Network and Internet Access92
Firewall Clients92
Advanced Client Configuration94
Firewall Client Application Settings94
Sample Wspcfg.ini File95
Web Proxy Service97
Configuring Web Proxy Clients98
Direct Access99
Practice 1:Establishing Secure Internet Access for Web Proxy Clients99
Exercise 1:Creating a Protocol Rule100
Exercise 2:Configuring Internet Explorer to Use the Web Proxy Service101
Practice 2:Installing Firewall Client101
Lesson Summary102
Exercise:Installing Firewall Client over the Local Network102
Lesson 2 Configuring ISA Server Dial-up Connections103
Configuring Dial-up Entries103
Dial-on-Demand105
Configuring Dial-on-Demand106
Limiting ISA Server Dial-out to External Sites107
Closing Dial-up Connections108
Practice:Configuring a Dial-up Entry108
Exercise 1:Testing Internet Connectivity108
Exercise 2:Creating a New Dial-up Entry109
Exercise 3:Configuring ISA Server to Route through the Dial-up Entry110
Exercise 4:Restarting the Firewall Service110
Exercise 5:Viewing SecureNAT Session Information111
Lesson Summary111
Lesson 3 Configuring Automatic Discovery of ISA Server112
Automatic Discovery112
Configuring WPAD and WSPAD on the DNS or DHCP Server113
Verifying Automatic Discovery for Firewall Clients115
Automatic Discovery for Firewall Clients115
Automatic Discovery for Web Proxy Clients116
Troubleshooting Automatic Discovery116
Practice:Configuring Automatic Discovery117
Exercise 1:Publishing Automatic Discovery117
Exercise 2:Creating a WPAD Alias(CNAME)Record in DNS118
Exercise 3:Enabling Automatic Discovery on a Firewall Client118
Exercise 4:Testing Automatic Discovery118
Lesson Summary119
Lesson 4 Troubleshooting ISA Server Client Connectivity120
Troubleshooting Client Connections120
Troubleshooting Dial-up Entries122
Restarting Services after Configuration Changes123
Lesson Summary126
Review127
Chapter 4 Configuring Internet Security Using Access Policies129
About This Chapter129
Before You Begin130
Lesson 1 Creating an Access Policy with ISA Server131
Controlling Outgoing Requests131
Configuring Access Policy133
Rules and Authentication134
SecureNAT Clients and Authentication134
Firewall Clients and Authentication135
Web Proxy Clients and Authentication135
ISA Server System Security(System Hardening)136
Getting Started Wizard137
Lesson Summary139
Lesson 2 Creating Customized Policy Elements140
Policy Elements140
Array-Level and Enterprise-Level Policy Elements140
Configuring Schedules141
Configuring Destination Sets142
Client Address Sets144
Configuring Protocol Definitions145
Client Users and Groups145
Direction146
Configuring Content Groups147
Practice:Creating Policy Elements149
Exercise 1:Creating a Schedule149
Exercise 2:Creating a Destination Set150
Lesson Summary151
Lesson 3 Configuring Protocol Rules152
Protocol Rules152
Protocol Rule Configuration Scenario153
Protocol Availability154
Application Filters and Protocol Availability155
Processing Order156
Array-Level and Enterprise-Level Protocol Rules156
Web Protocols156
Protocol Definitions that are Installed with ISA Server157
Practice:Assigning Protocol Rules to User Accounts160
Exercise 2:Requiring Authentication for Web Sessions161
Exercise 1:Monitoring Sessions in ISA Management161
Exercise 3:Assigning a Protocol Rule to a Windows 2000 User162
Lesson Summary164
Lesson 4 Configuring Site and Content Rules165
Site and Content Rules165
Processing Order165
Allow and Deny Actions166
Destination Sets and Path Processing166
Array-Level and Enterprise-Level Site and Content Rules167
Sample Site and Content Rule168
Content Groups168
Practice:Creating New Site and Content Rules174
Exercise 1:Denying Userl Access to Audio and Video Content175
Exercise 2: Testing the Configuration176
Lesson Summary177
Lesson 5 Configuring IP Packet Filters178
When to Use IP Packet Filters178
Creating IP Packet Filters179
Configuring Packet Filter Options183
IP Fragment Filtering183
IP Options Filtering184
Logging Packets184
Practice:Running Internet Services on the ISA Server Computer185
Exercise 1:Creating an IP Packet Filter for Incoming(POP3)Mail185
Exercise 2:Creating an IP Packet Filter for Outgoing(SMTP)Mail187
Exercise 3:Creating an IP Packet Filter for NNTP188
Exercise 4:Creating an IP Packet Filter to Allow Outgoing Web Requests(DNS Queries)189
Exercise 5:Creating an IP Packet Filter for Web Content(HTTP)190
Lesson Summary191
Lesson 6 Configuring ISA Server to Detect External Attacks and Intrusions192
Intrusion Types and Alerts192
Port Scan Attack193
All Ports Scan Attack193
Enumerated Port Scan Attack193
Ping of Death Attack194
Land Attack194
IP Half Scan Attack194
UDP Bomb Attack195
Windows Out-of-Band Attack(WinNuke)195
Configuring Intrusion Detection195
Practice:Configuring Intrusion Detection on ISA Server197
Exercise:Enabling Intrusion Detection197
Lesson Summary198
Review199
Before You Begin201
Chapter 5 Configuring Internet Acceleration through the ISA Server Cache201
About This Chapter201
Lesson 1 Creating a Basic Cache Policy with Routing Rules202
How Caching Works202
Processing Caching Rules202
Cache Configuration Properties203
Routing Rules203
When to Cache Content203
Applying Routing Rules to Particular Destinations204
When to Retrieve Objects from the Cache204
Default Routing Rule208
Processing Flow for Caching208
Rule Order208
Cache Filtering210
Additional Cache Policy211
Practice:Caching Dynamic Content211
Exercise:Creating a Routing Rule Caching Both Non-Dynamic and Dynamic Content211
Lesson Summary213
Cache Requirements and Recommendations214
Lesson 2 Configuring Cache Properties in ISA Server214
Configuring Cache Drives214
Configuring Size and Location215
Cache Content Files216
Configuring How ISA Server Caches Objects217
Configuring Which Content to Cache217
Configuring Expiration Policy218
Request Headers218
Response Headers218
RAM Caching218
HTTP Object Caching219
FTP Object Caching220
Returning Expired Objects221
Configuring Active Caching223
Configuring Negative Caching224
Practice 1:Enabling Active Caching224
Exercise:Enabling Active Caching224
Practice 2:Adjusting the Amount of RAM Used for Caching225
Exercise:Adjusting the Percentage of Available Memory Used for Caching225
Lesson Summary225
Lesson 3 Scheduling Cache Content Downloads226
Scheduled Cache Content Downloads226
Updating Cache Content Automatically226
Configuring Properties for Existing Download Jobs227
Configuring the Schedule for Content Download Jobs229
Downloading Dynamic Content229
Practice:Creating a Scheduled Content Download Job230
Exercise:Scheduling a Content Download for Microsoft Online Seminars230
Lesson Summary231
Review232
Chapter 6 Secure Server Publishing233
About This Chapter233
Before You Begin233
Publishing Policy Rules234
Lesson 1 Publishing Servers Securely234
Server Publishing Rules235
How Server Publishing Works235
Server Publishing Rule Actions237
Sample Rule Action237
Client Address Sets238
Server Publishing Rules and IP Packet Filters239
Publishing Servers on a Perimeter Network239
Practice:Publishing an Internal Server240
Server on the Same Computer as ISA Server240
Exercise 1:Creating a Publishing Rule on Serverl241
Exercise 2:Verifying the FTP Server Connection242
Lesson Summary243
Lesson 2 Publishing Web Servers Securely244
Web Publishing Rules244
Destination Sets and Client Sets244
Web Publishing Rule Actions246
SSL and HTTP Bridging247
Rule Order248
Default Web Publishing Rule248
Sample Web Publishing Rule248
Publishing a Web Server on the Local Network249
Publishing a Web Server Hosted on the ISA Server Computer250
Using Packet Filters to Publish a Web Server on the ISA Server Compute250
Practice:Publishing a Web Server on the ISA Server Computer251
Exercise 1:Configuring Incoming Web Request Properties251
Exercise 2:Creating a Destination Set for the Web Server252
Exercise 4:Creating a Web Publishing Rule253
Exercise 3:Preparing the Web Site253
Exercise 5:Testing the Configuration254
Lesson Summary255
Lesson 3 Publishing Mail Servers256
Mail Server Security Wizard256
Mail Wizard Settings257
Content Filtering257
Exchange Server on the ISA Server Computer258
Configuring Exchange Server on the Local Network258
Practice:Publishing the SMTP Service259
Exercise 1:Configuring the SMTP Service259
Exercise 2:Creating a Mail Wizard Rule260
Exercise 3:Configuring Outlook Express261
Exercise 4:Testing the Configuration262
Lesson Summary263
Review264
Before You Begin265
About This Chapter265
Chapter 7 Securing Enterprise Networks with ISA Server265
Lesson 1 Applying Enterprise Policies266
Enterprise Policies and Arrays266
How Enterprise Policies are Applied266
Creating an Enterprise Policy267
Configuring the Policy Settings for an Enterprise268
Backing Up and Restoring an Enterprise Configuration271
Practice:Creating and Applying an Enterprise Policy272
Exercise 1:Creating an Enterprise Policy272
Exercise 2:Creating a New Array that Inherits the Default Enterprise Policy274
Exercise 3:Testing the Configuration275
Lesson Summary277
Lesson 2 Configuring ISA Server Arrays279
Creating ISA Server Arrays279
Array Requirements280
Arrays and Standalone Servers280
Promoting Standalone Servers281
Array Member Settings283
Storing an Array Configuration283
Controlling Array Membership284
Backing Up and Restoring an Array Configuration285
Backing Up the Configuration285
Backing Up a Standalone Server Configuration286
Restoring the Configuration286
Using Arrays to Provide Fault Tolerance287
Fault Tolerance for Firewall Clients288
Fault Tolerance for SecureNAT Clients288
Cache Array Routing Protocol290
How CARP Works290
Configuring CARP291
Configuring the Load Factor292
CARP and Scheduled Content Download292
Lesson Summary293
Integrating Virtual Private Networks with ISA Server294
Lesson 3 Securing Virtual Private Networks with ISA Server294
Configuring the Network for VPN Connectivity295
Using the ISA Server VPN Configuration Wizards296
Local ISA Server VPN Configuration Wizard296
Remote ISA Server VPN Configuration Wizard297
ISA Virtual Private Network Configuration Wizard298
Reconfiguring the VPN298
ISA Server and IPSec299
Large Network Scenario with VPN and Routing300
Large Network VPN Description300
Meeting Network Requirements301
ISA Server Array at the United States Headquarters301
ISA Server Array at the Canada Branch Office301
ISA Server Array at the United Kingdom Branch Office301
Enterprise Policy at Headquarters302
ISA Server Policy at the Canada Branch Office303
Lesson Summary304
ISA Server Policy at the United Kingdom Branch Office304
Review305
Chapter 8 Secure Videoconferencing with H.323 Gatekeeper307
About This Chapter307
Before You Begin308
Lesson 1 Configuring Clients to Use H.323 Gatekeeper309
H.323 Protocol309
Intra-Enterprise Conference Call Scenario310
H.323 Gatekeeper Usage Scenarios310
H.323 Gatekeeper Snap-in310
Overview of H.323 Gatekeeper310
Inter-Enterprise Conference Call Scenario311
PSTN Call Scenario312
Registering Clients with H.323 Gatekeeper313
Endpoint Attributes314
Aliases314
Client Address Translation315
From within Your Company316
At the Destination316
Installing H.323 Gatekeeper317
Practice:Configuring a Client to use H.323 Gatekeeper318
Exercise 1:Adding a Gatekeeper318
Exercise 2:Configuring NetMeeting to Use H.323 Gatekeeper318
Exercise 3:Testing the Configuration320
Lesson Summary320
Lesson 2 Routing Conference Calls with H.323 Gatekeeper322
Call Routing Rules322
Phone Number Rules323
Example of a Phone Number Rule324
IP Address Rules326
IP Address Rule Resolution Example327
E-mail Address Rules327
Rule Processing and Destinations330
None330
Registration Database330
Gateway/Proxy331
Internet Locator Service(ILS)331
Local Network332
Active Directory Directory Services332
Gatekeeper332
DNS332
Multicast Gatekeeper332
Applying Rules to Calls333
Inbound Calls333
Outbound Calls334
Lesson Summary335
Review336
Chapter 9 Monitoring and Optimizing ISA Server Performance337
About This Chapter337
Before You Begin338
Lesson 1 Configuring Alerts339
Preconfigured Alerts339
Alert Conditions341
Event Location342
Event Thresholds342
Alert Action343
ISA Server Events345
Practice:Configuring an Alert to Send an E-mail Message348
Exercise:Configuring the Intrusion Detected Alert to Send You an E-mail Message348
Lesson Summary349
Lesson 2 Logging ISA Server Activity350
Managing ISA Server Logs350
Logging to a File352
W3C Format353
Log File Names354
ISA Format354
Log File Options355
Logging to a Database356
Logging Packets359
Firewall and Web Proxy Log Fields360
Packet Filter Log Fields370
Practice:Reading Web Logs372
Exercise:Analyzing a Web Log372
Lesson Summary373
Configuring Reports374
Lesson 3 Creating ISA Server Reports374
Viewing Reports375
Summary Reports375
Web Usage Reports376
Application Usage Reports376
Security Reports377
Configuring Report Jobs377
Traffic Utilization Reports377
Report Job Credentials379
Configuring Report Log Summaries380
Report Database381
Practice:Creating and Viewing Reports382
Exercise 1:Creating a Report Job382
Exercise 2:Viewing Reports384
Lesson Summary385
Effective Bandwidth for Dial-up Connections386
Lesson 4 Controlling Bandwidth386
Determining Effective Bandwidth386
Effective Bandwidth for Dedicated Network Connections387
Configuring Bandwidth Priorities389
Configuring Bandwidth Rules391
Rule Order393
Default Bandwidth Rule394
Practice:Creating a Bandwidth Rule394
Exercise 1:Creating a New Bandwidth Priority Policy Element394
Exercise 2:Creating a New Bandwidth Rule395
Lesson Summary396
Lesson 5 Additional Tuning and Monitoring Tools397
Tuning ISA Server Performance397
Tuning Cache Performance398
ISA Server Performance Objects and Counters399
ISA Server Performance Monitor400
Performance Objects and Counters Included in ISA Server402
Lesson Summary421
Review422
Chapter 10 Troubleshooting ISA Server423
About This Chapter423
Before You Begin423
Lesson 1 Troubleshooting Tools in ISA Server424
Troubleshooting Tools424
ISA Server Reports424
Event Viewer425
Netstat426
Performance Monitor426
Telnet428
Network Monitor429
The Routing Table430
The Route Determination Process431
Troubleshooting Routing Tables431
Practice:Testing Port Status432
Exercise:Testing ISA Server ports432
Lesson Summary435
Lesson 2 Troubleshooting Strategies in ISA Server436
Troubleshooting User Access436
Authentication436
Troubleshooting Packet-Based Access Problems438
VPN Network Considerations439
Additional Troubleshooting Notes440
Lesson Summary444
Review446
Appendix A Questions and Answers449
Appendix B Deploying and Administering ISA Server in a Complex Network479
About This Appendix479
Before You Begin479
Scenario Background480
Questions480
Appendix C Event Messages489
Alert Event Messages490
Bandwidth Event Messages491
Cache Event Messages492
Common Service Event Messages495
Dial-up Connection Events499
Firewall Service Event Messages500
Winsock Error Code Messages505
Intrusion Detection Event Messages538
Log Event Messages543
Control Service Event Messages547
Packet Filter Event Messages549
Server Event Messages551
Web Proxy Service Event Messages555
HTTP Messages558
HTML Messages561
Gopher Messages562
FTP Messages563
Internet Messages563
Appendix D Glossary567
Index581