Dr. Tom Shinder's ISA Server and Beyond
Real World Security Solutions for Microsoft Enterprise Networks
Thomas W. Shinder, Debra Littlejohn Shinder, Martin Grasdal
Résumé
Configure a Trihomed DMZ
The trihomed DMZ demands the use of public IP addresses, and this book includes ways to avoid common configuration pitfalls that may diminish the security of your network.
- Publish Virtually Any Type of Server to the
Internet
- Making servers located behind the ISA Server available to the Internet is one of the most popular and underdocumented ISA Server features.
- Use VMware to Test ISA Server Configuration
Scenarios
Create routed virtual networks of ISA Servers, Web Servers, mail servers, and clients to test your designs. - Configure Back-to-Back DMZs
Includes both private address and public address configurations. - Create a "pseudo-DMZ" out of a Trusted Network
Segment
The trusted internal network segment is contained in the LAT, and you can install multiple internal interfaces on the ISA Server computer. - Disable Socket Pooling
Socket pooling is a risk when your server is connected to multiple networks and not all of those networks are trusted. - Balance the Demands for Security With the Need for User
Access
One of the primary challenges faced by an IIS/ISA Server administrator is balancing security with access. - Configure Mail Services on the ISA Server
Computer
ISA Server integrates with Exchange 2000 by making it easy to securely publish Exchange RPC and Outlook Web Access. - Prepare for MCSE Exam 70-227
CD includes complete 55-question ISA Exam (Exam 70-227) from Transcender. - Register for Your 1 Year Upgrade
The Syngress Solutions upgrade plan protects you from content obsolescence and provides monthly mailings, whitepapers, and more!
Contents
Chapter 1 Defending the Network with ISA Server-and Beyond- Introduction
- Installing ISA Server
- Getting Started with ISA Server
- Installing Service Pack 1
- Supporting Network Design
- ISA Server Certification
- Beyond ISA Server
- Summary, Defensive Tactics Fast Track, Frequently Asked Questions
- Introduction
- Configuring a Trihomed DMZ
- Publishing DMZ SMTP Servers
- Publishing a Web Server
- Publishing an FTP Server on a Trihomed DMZ Segment
- External Network Clients Cannot Use the DMZ Interface to Connect to the Internal Network
- Summary, Defensive Tactics Fast Track, Frequently Asked Questions
- Introduction
- Configuring a Private Address Back-to-Back DMZ
- Configuring a Public Address Back-to-Back DMZ
- Summary, Defensive Tactics Fast Track, Frequently Asked Questions
- Introduction
- Using TCP/IP Filtering (TCP/IP Security)
- Using Routing and Remote Access Service (RRAS) Packet Filters
- Using IPSec Policies
- Summary, Defensive Tactics Fast Track, Frequently Asked Questions
- Introduction
- Disabling Socket Pooling
- Server Publishing
- Web Publishing
- Summary, Defensive Tactics Fast Track, Frequently Asked Questions
- Introduction
- Configuring Mail Services on the ISA Server Computer
- Configuring Mail Services on the Internal Network
- GFI's Mail Security and Mail Essentials for SMTP Servers
- Summary, Defensive Tactics Fast Track, Frequently Asked Questions
- Introduction
- Overview of Security Groups and Access Control
- Configuring Security during Windows 2000 Setup
- Default File System and Registry Permissions
- Default User Rights
- Default Group Membership
- Summary, Defensive Tactics Fast Track, Frequently Asked Questions
- Introduction
- Security Configuration Tool Set
- Configuring Security
- Analyzing Security
- Group Policy Integration
- Summary, Defensive Tactics Fast Track, Frequently Asked Questions
- Introduction
- The Role of EFS in a Network Security Plan
- Using the Encrypting File System
- User Operations
- EFS Architecture
- Summary, Defensive Tactics Fast Track, Frequently Asked Questions
- Introduction
- Network Encroachment Methodologies
- IPSec Architecture
- Deploying Windows IP Security
- Summary, Defensive Tactics Fast Track, Frequently Asked Questions
- Introduction
- Understanding Smart Card Technology
- Smart Card Interoperability
- Smart Card Components
- Enhanced Solutions
- Summary, Defensive Tactics Fast Track, Frequently Asked Questions
- Introduction
- PKI Concepts
- Windows 2000 PKI Components
- Certification Authorities
- Installing a Windows 2000 PKI
- Enabling Domain Clients
- Public Key Security Policy in Windows 2000
- Applications Overview
- Preparing to Implement the Windows 2000 PKI
- Backing Up and Restoring Certificate Services
- Summary, Defensive Tactics Fast Track, Frequently Asked Questions
- Introduction
- Preparing the OS
- Securing the Internet Information Service
- Running the IIS Lockdown Wizard
- Securing IIS Global Settings
- Securing the Default and Administration Web Sites
- Authenticating Users
- Summary, Defensive Tactics Fast Track, Frequently Asked Questions
- Introduction
- Understanding Wireless Networks
- Understanding Wireless Security
- Using a Layered Approach
- Summary
L'auteur - Thomas W. Shinder
Thomas W. Shinder et Debra Littlejohn Shinder (MCSE, MCP
+ I, MCT) sont specialistes des technologies Microsoft.
Tous deux formateurs, ils interviennent en tant que
consultants aupres des plus grandes entreprises de Dallas
(dont Xerox, Lucent Technologies, Fina Oil).
Thomas W. Shinder (MCSE, MCP+I, MCT) est spécialiste des
technologies Microsoft.
Formateur, il intervient en tant que consultant auprès des
plus grandes entreprises de Dallas (dont Xerox, Lucent
Technologies, Fina Oil).
L'auteur - Debra Littlejohn Shinder
Debra Littlejohn Shinder, MSc, MCT, is an instructor and
trainer at Eastfield College in Dallas County, Texas. She
is also a technology consultant for TACteam: Training and
Consulting, which she co-owns with her husband Tom Shinder.
Debra authored Troubleshooting Windows 2000 TCP/lP
(Syngress) and has contributed to more than 10 other
Windows books published by Syngress and Osborne.
Debra Littlejohn Shinder (MCSE, MCP+I, MCT) est spécialiste
des technologies Microsoft.
Formatrice, elle intervient en tant que consultante auprès
des plus grandes entreprises de Dallas (dont Xerox, Lucent
Technologies, Fina Oil).
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Syngress |
Auteur(s) | Thomas W. Shinder, Debra Littlejohn Shinder, Martin Grasdal |
Parution | 03/01/2003 |
Nb. de pages | 864 |
Format | 19,5 x 24,2 |
Couverture | Relié |
Poids | 1683g |
Intérieur | Noir et Blanc |
EAN13 | 9781931836661 |
ISBN13 | 978-1-931836-66-1 |
Avantages Eyrolles.com
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse