图书介绍

Microsoft ISA Server 2000 英文影印版PDF|Epub|txt|kindle电子书版本网盘下载

Microsoft ISA Server 2000 英文影印版
  • (美)Microsoft公司著 著
  • 出版社: 北京:北京大学出版社
  • ISBN:7301051603
  • 出版时间:2001
  • 标注页数:608页
  • 文件大小:52MB
  • 文件页数:654页
  • 主题词:

PDF下载


点此进入-本书在线PDF格式电子书下载【推荐-云解压-方便快捷】直接下载PDF格式图书。移动端-PC端通用
种子下载[BT下载速度快]温馨提示:(请使用BT下载软件FDM进行下载)软件下载地址页直链下载[便捷但速度慢]  [在线试读本书]   [在线获取解压码]

下载说明

Microsoft ISA Server 2000 英文影印版PDF格式电子书版下载

下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。

建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!

(文件页数 要大于 标注页数,上中下等多册电子书除外)

注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具

图书目录

Chapter 1 Introduction to Microsoft Internet Security and Acceleration Server 20001

About This Chapter1

Before You Begin2

Lesson 1 Overview of ISA Server3

Editions Comparison3

ISA Server Enterprise Edition3

ISA Server Standard Edition4

Key Differences4

ISA Server Roles4

Internet Firewall5

Secure Server Publishing5

Forward Web Caching Server5

Reverse Web Caching Server5

Integrated Firewall and Web Cache Server5

Windows 2000 Integration6

Extensibility9

Scalability9

ISA Server Architecture10

Practice:ISA Server Overview Presentation15

Lesson Summary16

Lesson 2 Introduction to the ISA Server Firewall17

Filtering Methods17

IP Packet Filtering17

Circuit-Level(Protocol)Filtering18

Application Filtering19

Bandwidth Rules22

Integrated Virtual Private Networking22

Integrated Intrusion Detection24

Packet Filter Intrusions24

Secure Publishing25

Lesson Summary27

Lesson 3 Overview of ISA Server Caching28

High-Performance Web Cache28

Forward Web Caching Server28

Reverse Web Caching Server30

Active Caching31

Scheduled Content Download31

CARP and Cache Server Scalability32

Hierarchical Caching33

Web Proxy Routing34

Lesson Summary35

Lesson 4 ISA Server s Management Features37

Intuitive User Interface37

Policy-Based Access Control38

Integrated Administration38

Tiered Policy40

Array Policy40

Enterprise Policy41

Lesson Summary41

Review43

Chapter 2 Installing Microsoft Internet Security and Acceleration Server 200045

About This Chapter45

Before You Begin46

Capacity Planning47

Lesson 1 Planning for an ISA Server Installation47

Minimal Requirements48

Remote Administration Requirements48

Firewall Requirements48

Forward Caching Requirements49

Publishing and Reverse Caching Requirements50

Array Considerations50

Standalone Servers and Single-Server Arrays51

Array Requirements51

ISA Server Mode52

Internet Connectivity Considerations53

Publishing and Connectivity54

ISA Server in the Network54

Windows NT 4.0 Domain54

ISA Server Configuration Data54

Small Office Scenario55

ISA Server Network Topology Scenarios55

Remote Access Server55

Internet Connection Server55

Enterprise Scenario56

Enterprise Network Configuration56

Web Publishing Topologies58

Co-Located Web Server58

Web Server on Local Network58

Co-Located Exchange Server59

Exchange Server Publishing Topologies59

Exchange Server on Local Network60

Perimeter Network(DMZ)Scenarios60

Back-to-Back Perimeter Network Configuration61

Three-Homed Perimeter Network(DMZ)Configuration62

Lesson Summary63

Lesson 2 Performing an ISA Server Installation64

Before You Install ISA Server64

Setting Up the Network Adapter64

Setting Up a Modem or ISDN Adapter65

TCP/IP Settings65

Windows 2000 Routing Table66

Installing ISA Server66

Initializing the Enterprise67

Installation Procedure68

Constructing the Local Address Table70

Windows 2000 Routing Table71

Default Settings71

Troubleshooting ISA Server Installation72

Practice:Installing ISA Server Enterprise Edition73

Exercise 1:Initializing the Enterprise73

Exercise 2:Installing ISA Server Software74

Lesson Summary77

Lesson 3 Migrating from Proxy Server 2.078

Migrating from Microsoft Proxy Server 2.078

Operating System Considerations78

Proxy Server on Windows 200078

Proxy Server on Windows NT 4.079

Proxy Server 2.0 Array Considerations80

Migrating to an Array81

Migrating Proxy Server 2.0 Configuration82

Proxy Chains82

Web Proxy Client Requests82

Publishing82

Cache82

SOCKS82

Lesson Summary83

Rules and Policies83

Review84

Chapter 3 Configuring Secure Internet Access85

About This Chapter85

Before You Begin86

Lesson 1 Configuring Local Clients for Secure Internet Access87

About ISA Server Clients87

Assessing Client Requirements88

Configuring SecureNAT Clients90

Configuring SecureNAT Clients on a Simple Network91

Configuring SecureNAT Clients on a Complex Network91

Additional SecureNAT Configuration for Dial-up Networks91

Resolving Names for SecureNAT Clients92

Internet Access Only92

Internal Network and Internet Access92

Firewall Clients92

Advanced Client Configuration94

Firewall Client Application Settings94

Sample Wspcfg.ini File95

Web Proxy Service97

Configuring Web Proxy Clients98

Direct Access99

Practice 1:Establishing Secure Internet Access for Web Proxy Clients99

Exercise 1:Creating a Protocol Rule100

Exercise 2:Configuring Internet Explorer to Use the Web Proxy Service101

Practice 2:Installing Firewall Client101

Lesson Summary102

Exercise:Installing Firewall Client over the Local Network102

Lesson 2 Configuring ISA Server Dial-up Connections103

Configuring Dial-up Entries103

Dial-on-Demand105

Configuring Dial-on-Demand106

Limiting ISA Server Dial-out to External Sites107

Closing Dial-up Connections108

Practice:Configuring a Dial-up Entry108

Exercise 1:Testing Internet Connectivity108

Exercise 2:Creating a New Dial-up Entry109

Exercise 3:Configuring ISA Server to Route through the Dial-up Entry110

Exercise 4:Restarting the Firewall Service110

Exercise 5:Viewing SecureNAT Session Information111

Lesson Summary111

Lesson 3 Configuring Automatic Discovery of ISA Server112

Automatic Discovery112

Configuring WPAD and WSPAD on the DNS or DHCP Server113

Verifying Automatic Discovery for Firewall Clients115

Automatic Discovery for Firewall Clients115

Automatic Discovery for Web Proxy Clients116

Troubleshooting Automatic Discovery116

Practice:Configuring Automatic Discovery117

Exercise 1:Publishing Automatic Discovery117

Exercise 2:Creating a WPAD Alias(CNAME)Record in DNS118

Exercise 3:Enabling Automatic Discovery on a Firewall Client118

Exercise 4:Testing Automatic Discovery118

Lesson Summary119

Lesson 4 Troubleshooting ISA Server Client Connectivity120

Troubleshooting Client Connections120

Troubleshooting Dial-up Entries122

Restarting Services after Configuration Changes123

Lesson Summary126

Review127

Chapter 4 Configuring Internet Security Using Access Policies129

About This Chapter129

Before You Begin130

Lesson 1 Creating an Access Policy with ISA Server131

Controlling Outgoing Requests131

Configuring Access Policy133

Rules and Authentication134

SecureNAT Clients and Authentication134

Firewall Clients and Authentication135

Web Proxy Clients and Authentication135

ISA Server System Security(System Hardening)136

Getting Started Wizard137

Lesson Summary139

Lesson 2 Creating Customized Policy Elements140

Policy Elements140

Array-Level and Enterprise-Level Policy Elements140

Configuring Schedules141

Configuring Destination Sets142

Client Address Sets144

Configuring Protocol Definitions145

Client Users and Groups145

Direction146

Configuring Content Groups147

Practice:Creating Policy Elements149

Exercise 1:Creating a Schedule149

Exercise 2:Creating a Destination Set150

Lesson Summary151

Lesson 3 Configuring Protocol Rules152

Protocol Rules152

Protocol Rule Configuration Scenario153

Protocol Availability154

Application Filters and Protocol Availability155

Processing Order156

Array-Level and Enterprise-Level Protocol Rules156

Web Protocols156

Protocol Definitions that are Installed with ISA Server157

Practice:Assigning Protocol Rules to User Accounts160

Exercise 2:Requiring Authentication for Web Sessions161

Exercise 1:Monitoring Sessions in ISA Management161

Exercise 3:Assigning a Protocol Rule to a Windows 2000 User162

Lesson Summary164

Lesson 4 Configuring Site and Content Rules165

Site and Content Rules165

Processing Order165

Allow and Deny Actions166

Destination Sets and Path Processing166

Array-Level and Enterprise-Level Site and Content Rules167

Sample Site and Content Rule168

Content Groups168

Practice:Creating New Site and Content Rules174

Exercise 1:Denying Userl Access to Audio and Video Content175

Exercise 2: Testing the Configuration176

Lesson Summary177

Lesson 5 Configuring IP Packet Filters178

When to Use IP Packet Filters178

Creating IP Packet Filters179

Configuring Packet Filter Options183

IP Fragment Filtering183

IP Options Filtering184

Logging Packets184

Practice:Running Internet Services on the ISA Server Computer185

Exercise 1:Creating an IP Packet Filter for Incoming(POP3)Mail185

Exercise 2:Creating an IP Packet Filter for Outgoing(SMTP)Mail187

Exercise 3:Creating an IP Packet Filter for NNTP188

Exercise 4:Creating an IP Packet Filter to Allow Outgoing Web Requests(DNS Queries)189

Exercise 5:Creating an IP Packet Filter for Web Content(HTTP)190

Lesson Summary191

Lesson 6 Configuring ISA Server to Detect External Attacks and Intrusions192

Intrusion Types and Alerts192

Port Scan Attack193

All Ports Scan Attack193

Enumerated Port Scan Attack193

Ping of Death Attack194

Land Attack194

IP Half Scan Attack194

UDP Bomb Attack195

Windows Out-of-Band Attack(WinNuke)195

Configuring Intrusion Detection195

Practice:Configuring Intrusion Detection on ISA Server197

Exercise:Enabling Intrusion Detection197

Lesson Summary198

Review199

Before You Begin201

Chapter 5 Configuring Internet Acceleration through the ISA Server Cache201

About This Chapter201

Lesson 1 Creating a Basic Cache Policy with Routing Rules202

How Caching Works202

Processing Caching Rules202

Cache Configuration Properties203

Routing Rules203

When to Cache Content203

Applying Routing Rules to Particular Destinations204

When to Retrieve Objects from the Cache204

Default Routing Rule208

Processing Flow for Caching208

Rule Order208

Cache Filtering210

Additional Cache Policy211

Practice:Caching Dynamic Content211

Exercise:Creating a Routing Rule Caching Both Non-Dynamic and Dynamic Content211

Lesson Summary213

Cache Requirements and Recommendations214

Lesson 2 Configuring Cache Properties in ISA Server214

Configuring Cache Drives214

Configuring Size and Location215

Cache Content Files216

Configuring How ISA Server Caches Objects217

Configuring Which Content to Cache217

Configuring Expiration Policy218

Request Headers218

Response Headers218

RAM Caching218

HTTP Object Caching219

FTP Object Caching220

Returning Expired Objects221

Configuring Active Caching223

Configuring Negative Caching224

Practice 1:Enabling Active Caching224

Exercise:Enabling Active Caching224

Practice 2:Adjusting the Amount of RAM Used for Caching225

Exercise:Adjusting the Percentage of Available Memory Used for Caching225

Lesson Summary225

Lesson 3 Scheduling Cache Content Downloads226

Scheduled Cache Content Downloads226

Updating Cache Content Automatically226

Configuring Properties for Existing Download Jobs227

Configuring the Schedule for Content Download Jobs229

Downloading Dynamic Content229

Practice:Creating a Scheduled Content Download Job230

Exercise:Scheduling a Content Download for Microsoft Online Seminars230

Lesson Summary231

Review232

Chapter 6 Secure Server Publishing233

About This Chapter233

Before You Begin233

Publishing Policy Rules234

Lesson 1 Publishing Servers Securely234

Server Publishing Rules235

How Server Publishing Works235

Server Publishing Rule Actions237

Sample Rule Action237

Client Address Sets238

Server Publishing Rules and IP Packet Filters239

Publishing Servers on a Perimeter Network239

Practice:Publishing an Internal Server240

Server on the Same Computer as ISA Server240

Exercise 1:Creating a Publishing Rule on Serverl241

Exercise 2:Verifying the FTP Server Connection242

Lesson Summary243

Lesson 2 Publishing Web Servers Securely244

Web Publishing Rules244

Destination Sets and Client Sets244

Web Publishing Rule Actions246

SSL and HTTP Bridging247

Rule Order248

Default Web Publishing Rule248

Sample Web Publishing Rule248

Publishing a Web Server on the Local Network249

Publishing a Web Server Hosted on the ISA Server Computer250

Using Packet Filters to Publish a Web Server on the ISA Server Compute250

Practice:Publishing a Web Server on the ISA Server Computer251

Exercise 1:Configuring Incoming Web Request Properties251

Exercise 2:Creating a Destination Set for the Web Server252

Exercise 4:Creating a Web Publishing Rule253

Exercise 3:Preparing the Web Site253

Exercise 5:Testing the Configuration254

Lesson Summary255

Lesson 3 Publishing Mail Servers256

Mail Server Security Wizard256

Mail Wizard Settings257

Content Filtering257

Exchange Server on the ISA Server Computer258

Configuring Exchange Server on the Local Network258

Practice:Publishing the SMTP Service259

Exercise 1:Configuring the SMTP Service259

Exercise 2:Creating a Mail Wizard Rule260

Exercise 3:Configuring Outlook Express261

Exercise 4:Testing the Configuration262

Lesson Summary263

Review264

Before You Begin265

About This Chapter265

Chapter 7 Securing Enterprise Networks with ISA Server265

Lesson 1 Applying Enterprise Policies266

Enterprise Policies and Arrays266

How Enterprise Policies are Applied266

Creating an Enterprise Policy267

Configuring the Policy Settings for an Enterprise268

Backing Up and Restoring an Enterprise Configuration271

Practice:Creating and Applying an Enterprise Policy272

Exercise 1:Creating an Enterprise Policy272

Exercise 2:Creating a New Array that Inherits the Default Enterprise Policy274

Exercise 3:Testing the Configuration275

Lesson Summary277

Lesson 2 Configuring ISA Server Arrays279

Creating ISA Server Arrays279

Array Requirements280

Arrays and Standalone Servers280

Promoting Standalone Servers281

Array Member Settings283

Storing an Array Configuration283

Controlling Array Membership284

Backing Up and Restoring an Array Configuration285

Backing Up the Configuration285

Backing Up a Standalone Server Configuration286

Restoring the Configuration286

Using Arrays to Provide Fault Tolerance287

Fault Tolerance for Firewall Clients288

Fault Tolerance for SecureNAT Clients288

Cache Array Routing Protocol290

How CARP Works290

Configuring CARP291

Configuring the Load Factor292

CARP and Scheduled Content Download292

Lesson Summary293

Integrating Virtual Private Networks with ISA Server294

Lesson 3 Securing Virtual Private Networks with ISA Server294

Configuring the Network for VPN Connectivity295

Using the ISA Server VPN Configuration Wizards296

Local ISA Server VPN Configuration Wizard296

Remote ISA Server VPN Configuration Wizard297

ISA Virtual Private Network Configuration Wizard298

Reconfiguring the VPN298

ISA Server and IPSec299

Large Network Scenario with VPN and Routing300

Large Network VPN Description300

Meeting Network Requirements301

ISA Server Array at the United States Headquarters301

ISA Server Array at the Canada Branch Office301

ISA Server Array at the United Kingdom Branch Office301

Enterprise Policy at Headquarters302

ISA Server Policy at the Canada Branch Office303

Lesson Summary304

ISA Server Policy at the United Kingdom Branch Office304

Review305

Chapter 8 Secure Videoconferencing with H.323 Gatekeeper307

About This Chapter307

Before You Begin308

Lesson 1 Configuring Clients to Use H.323 Gatekeeper309

H.323 Protocol309

Intra-Enterprise Conference Call Scenario310

H.323 Gatekeeper Usage Scenarios310

H.323 Gatekeeper Snap-in310

Overview of H.323 Gatekeeper310

Inter-Enterprise Conference Call Scenario311

PSTN Call Scenario312

Registering Clients with H.323 Gatekeeper313

Endpoint Attributes314

Aliases314

Client Address Translation315

From within Your Company316

At the Destination316

Installing H.323 Gatekeeper317

Practice:Configuring a Client to use H.323 Gatekeeper318

Exercise 1:Adding a Gatekeeper318

Exercise 2:Configuring NetMeeting to Use H.323 Gatekeeper318

Exercise 3:Testing the Configuration320

Lesson Summary320

Lesson 2 Routing Conference Calls with H.323 Gatekeeper322

Call Routing Rules322

Phone Number Rules323

Example of a Phone Number Rule324

IP Address Rules326

IP Address Rule Resolution Example327

E-mail Address Rules327

Rule Processing and Destinations330

None330

Registration Database330

Gateway/Proxy331

Internet Locator Service(ILS)331

Local Network332

Active Directory Directory Services332

Gatekeeper332

DNS332

Multicast Gatekeeper332

Applying Rules to Calls333

Inbound Calls333

Outbound Calls334

Lesson Summary335

Review336

Chapter 9 Monitoring and Optimizing ISA Server Performance337

About This Chapter337

Before You Begin338

Lesson 1 Configuring Alerts339

Preconfigured Alerts339

Alert Conditions341

Event Location342

Event Thresholds342

Alert Action343

ISA Server Events345

Practice:Configuring an Alert to Send an E-mail Message348

Exercise:Configuring the Intrusion Detected Alert to Send You an E-mail Message348

Lesson Summary349

Lesson 2 Logging ISA Server Activity350

Managing ISA Server Logs350

Logging to a File352

W3C Format353

Log File Names354

ISA Format354

Log File Options355

Logging to a Database356

Logging Packets359

Firewall and Web Proxy Log Fields360

Packet Filter Log Fields370

Practice:Reading Web Logs372

Exercise:Analyzing a Web Log372

Lesson Summary373

Configuring Reports374

Lesson 3 Creating ISA Server Reports374

Viewing Reports375

Summary Reports375

Web Usage Reports376

Application Usage Reports376

Security Reports377

Configuring Report Jobs377

Traffic Utilization Reports377

Report Job Credentials379

Configuring Report Log Summaries380

Report Database381

Practice:Creating and Viewing Reports382

Exercise 1:Creating a Report Job382

Exercise 2:Viewing Reports384

Lesson Summary385

Effective Bandwidth for Dial-up Connections386

Lesson 4 Controlling Bandwidth386

Determining Effective Bandwidth386

Effective Bandwidth for Dedicated Network Connections387

Configuring Bandwidth Priorities389

Configuring Bandwidth Rules391

Rule Order393

Default Bandwidth Rule394

Practice:Creating a Bandwidth Rule394

Exercise 1:Creating a New Bandwidth Priority Policy Element394

Exercise 2:Creating a New Bandwidth Rule395

Lesson Summary396

Lesson 5 Additional Tuning and Monitoring Tools397

Tuning ISA Server Performance397

Tuning Cache Performance398

ISA Server Performance Objects and Counters399

ISA Server Performance Monitor400

Performance Objects and Counters Included in ISA Server402

Lesson Summary421

Review422

Chapter 10 Troubleshooting ISA Server423

About This Chapter423

Before You Begin423

Lesson 1 Troubleshooting Tools in ISA Server424

Troubleshooting Tools424

ISA Server Reports424

Event Viewer425

Netstat426

Performance Monitor426

Telnet428

Network Monitor429

The Routing Table430

The Route Determination Process431

Troubleshooting Routing Tables431

Practice:Testing Port Status432

Exercise:Testing ISA Server ports432

Lesson Summary435

Lesson 2 Troubleshooting Strategies in ISA Server436

Troubleshooting User Access436

Authentication436

Troubleshooting Packet-Based Access Problems438

VPN Network Considerations439

Additional Troubleshooting Notes440

Lesson Summary444

Review446

Appendix A Questions and Answers449

Appendix B Deploying and Administering ISA Server in a Complex Network479

About This Appendix479

Before You Begin479

Scenario Background480

Questions480

Appendix C Event Messages489

Alert Event Messages490

Bandwidth Event Messages491

Cache Event Messages492

Common Service Event Messages495

Dial-up Connection Events499

Firewall Service Event Messages500

Winsock Error Code Messages505

Intrusion Detection Event Messages538

Log Event Messages543

Control Service Event Messages547

Packet Filter Event Messages549

Server Event Messages551

Web Proxy Service Event Messages555

HTTP Messages558

HTML Messages561

Gopher Messages562

FTP Messages563

Internet Messages563

Appendix D Glossary567

Index581

热门推荐