買這商品的人也買了...
-
$600$540 -
$420$357 -
$760$600 -
$1,045Java How to Program, 4/e
-
$580$452 -
$680$537 -
$1,710$1,625 -
$2,450$2,328 -
$1,090$1,068 -
$380$304 -
$450$360 -
$1,860$1,767 -
$620$558 -
$780$741 -
$650$553 -
$650$553 -
$580$458 -
$280$221 -
$620$527 -
$720$562 -
$720$569 -
$400$316 -
$850$723 -
$750$675 -
$590$466
相關主題
商品描述
Description:
Official Microsoft® study guide for the skills you need on the job—and on the exam.
Learn how to deliver faster, more secure Web access to your business—and prepare for the Microsoft® Certified Professional (MCP) exam—with this official Microsoft study guide. Work through the lessons and hands-on exercises to gain practical experience using Internet Security and Acceleration (ISA) Server 2000 to optimize network performance and security. As you build these real-world support skills, you’re also preparing for MCP Exam 70-227—a key elective on the MCSE/MCSA tracks.
HERE’S WHAT YOU’LL LEARN.
• Installing ISA Server, including upgrading from Microsoft Proxy Server 2.0
• Setting up hosting roles, VPNs, dial-up connections, and an H.323 Gatekeeper
• Creating and administering access control and bandwidth policies
• Configuring clients for secure network address translation, firewall software, and other services
• Managing arrays of multiple ISA Server computers
• Applying forward and reverse caching for faster Web connectivity
• Monitoring server performance with alerts, logs, reports, and performance counters
• Troubleshooting problems with access, network usage, and security
HERE’S WHAT’S INSIDE.
• Comprehensive self-paced training manual that maps to MCP exam goals and objectives
• Skill-building exercises that help you apply what you learn to the job
• Summaries and end-of-chapter review questions to help gauge your progress
• 120-day evaluation version of ISA Server 2000 Enterprise Edition
• All the book’s content on CD-ROM
Table of Contents:
About This Book | xxiii |
Intended Audience | xxiv |
Prerequisites | xxiv |
Reference Materials | xxiv |
About the CD-ROM | xxv |
Features of This Book | xxv |
Notes | xxvi |
Conventions | xxvi |
Notational Conventions | xxvi |
Keyboard Conventions | xxvii |
Chapter and Appendix Overview | xxviii |
Finding the Best Starting Point for You | xxx |
Where to Find Specific Skills in This Book | xxx |
Installing ISA Server | xxx |
Configuring and Troubleshooting ISA Server Services | xxxi |
Configuring, Managing, and Troubleshooting Policies and Rules | xxxii |
Deploying, Configuring, and Troubleshooting the Client Computer | xxxiii |
Monitoring, Managing, and Analyzing ISA Server Use | xxxiii |
Getting Started | xxxiv |
Hardware Requirements | xxxiv |
Software Requirements | xxxv |
Setup Instructions | xxxv |
The Microsoft Certified Professional Program | xxxvii |
Microsoft Certification Benefits | xxxviii |
Microsoft Certification Benefits for Individuals | xxxviii |
Microsoft Certification Benefits for Employers and Organizations | xxxix |
Requirements for Becoming a Microsoft Certified Professional | xl |
Technical Training for Computer Professionals | xli |
Self-Paced Training | xli |
Online Training | xli |
Microsoft Certified Technical Education Centers | xlii |
Technical Support | xlii |
CHAPTER 1 Introduction to Microsoft Internet Security and Acceleration Server 2000 | 1 |
About This Chapter | 1 |
Before You Begin | 2 |
Lesson 1 Overview of ISA Server | 3 |
Editions Comparison | 3 |
ISA Server Enterprise Edition | 3 |
ISA Server Standard Edition | 4 |
Key Differences | 4 |
ISA Server Roles | 4 |
Internet Firewall | 5 |
Secure Server Publishing | 5 |
Forward Web Caching Server | 5 |
Reverse Web Caching Server | 5 |
Integrated Firewall and Web Cache Server | 5 |
Windows 2000 Integration | 6 |
Scalability | 9 |
Extensibility | 9 |
ISA Server Architecture | 10 |
Practice: ISA Server Overview Presentation | 15 |
Lesson Summary | 16 |
Lesson 2 Introduction to the ISA Server Firewall | 17 |
Filtering Methods | 17 |
IP Packet Filtering | 17 |
Circuit-Level (Protocol) Filtering | 18 |
Application Filtering | 19 |
Bandwidth Rules | 22 |
Integrated Virtual Private Networking | 22 |
Integrated Intrusion Detection | 24 |
Packet Filter Intrusions | 24 |
Secure Publishing | 25 |
Lesson Summary | 27 |
Lesson 3 Overview of ISA Server Caching | 28 |
High-Performance Web Cache | 28 |
Forward Web Caching Server | 28 |
Reverse Web Caching Server | 30 |
Scheduled Content Download | 31 |
Active Caching | 31 |
CARP and Cache Server Scalability | 32 |
Hierarchical Caching | 33 |
Web Proxy Routing | 34 |
Lesson Summary | 35 |
Lesson 4 ISA Servers Management Features | 37 |
Intuitive User Interface | 37 |
Integrated Administration | 38 |
Policy-Based Access Control | 38 |
Tiered Policy | 40 |
Array Policy | 40 |
Enterprise Policy | 41 |
Lesson Summary | 41 |
Review | 43 |
CHAPTER 2 Installing Microsoft Internet Security and Acceleration Server 2000 | 45 |
About This Chapter | 45 |
Before You Begin | 46 |
Lesson 1 Planning for an ISA Server Installation | 47 |
Capacity Planning | 47 |
Minimal Requirements | 48 |
Remote Administration Requirements | 48 |
Firewall Requirements | 48 |
Forward Caching Requirements | 49 |
Publishing and Reverse Caching Requirements | 50 |
Array Considerations | 50 |
Array Requirements | 51 |
Standalone Servers and Single-Server Arrays | 51 |
ISA Server Mode | 52 |
Internet Connectivity Considerations | 53 |
Publishing and Connectivity | 54 |
ISA Server in the Network | 54 |
Windows NT 4.0 Domain | 54 |
ISA Server Configuration Data | 54 |
Internet Connection Server | 55 |
Remote Access Server | 55 |
ISA Server Network Topology Scenarios | 55 |
Small Office Scenario | 55 |
Enterprise Scenario | 56 |
Enterprise Network Configuration | 56 |
Web Publishing Topologies | 58 |
Co-Located Web Server | 58 |
Web Server on Local Network | 58 |
Exchange Server Publishing Topologies | 59 |
Co-Located Exchange Server | 59 |
Exchange Server on Local Network | 60 |
Perimeter Network (DMZ) Scenarios | 60 |
Back-to-Back Perimeter Network Configuration | 61 |
Three-Homed Perimeter Network (DMZ) Configuration | 62 |
Lesson Summary | 63 |
Lesson 2 Performing an ISA Server Installation | 64 |
Before You Install ISA Server | 64 |
Setting Up the Network Adapter | 64 |
TCP/IP Settings | 65 |
Setting Up a Modem or ISDN Adapter | 65 |
Windows 2000 Routing Table | 66 |
Installing ISA Server | 66 |
Initializing the Enterprise | 67 |
Installation Procedure | 68 |
Constructing the Local Address Table | 70 |
Windows 2000 Routing Table | 71 |
Default Settings | 71 |
Troubleshooting ISA Server Installation | 72 |
Practice: Installing ISA Server Enterprise Edition | 73 |
Exercise 1: Initializing the Enterprise | 73 |
Exercise 2: Installing ISA Server Software | 74 |
Lesson Summary | 77 |
Lesson 3 Migrating from Proxy Server 2.0 | 78 |
Migrating from Microsoft Proxy Server 2.0 | 78 |
Operating System Considerations | 78 |
Proxy Server on Windows 2000 | 78 |
Proxy Server on Windows NT 4.0 | 79 |
Proxy Server 2.0 Array Considerations | 80 |
Migrating to an Array | 81 |
Migrating Proxy Server 2.0 Configuration | 82 |
Proxy Chains | 82 |
Web Proxy Client Requests | 82 |
Publishing | 82 |
Cache | 82 |
SOCKS | 82 |
Rules and Policies | 83 |
Lesson Summary | 83 |
Review | 84 |
CHAPTER 3 Configuring Secure Internet Access | 85 |
About This Chapter | 85 |
Before You Begin | 86 |
Lesson 1 Configuring Local Clients for Secure Internet Access | 87 |
About ISA Server Clients | 87 |
Assessing Client Requirements | 88 |
Configuring SecureNAT Clients | 90 |
Configuring SecureNAT Clients on a Simple Network | 91 |
Configuring SecureNAT Clients on a Complex Network | 91 |
Additional SecureNAT Configuration for Dial-up Networks | 91 |
Resolving Names for SecureNAT Clients | 92 |
Internet Access Only | 92 |
Internal Network and Internet Access | 92 |
Firewall Clients | 92 |
Firewall Client Application Settings | 94 |
Advanced Client Configuration | 94 |
Sample Wspcfg.ini File | 95 |
Web Proxy Service | 97 |
Configuring Web Proxy Clients | 98 |
Direct Access | 99 |
Practice 1: Establishing Secure Internet Access for Web Proxy Clients | 99 |
Exercise 1: Creating a Protocol Rule | 100 |
Exercise 2: Configuring Internet Explorer to Use the Web Proxy Service | 101 |
Practice 2: Installing Firewall Client | 101 |
Exercise: Installing Firewall Client over the Local Network | 102 |
Lesson Summary | 102 |
Lesson 2 Configuring ISA Server Dial-up Connections | 103 |
Configuring Dial-up Entries | 103 |
Dial-on-Demand | 105 |
Configuring Dial-on-Demand | 106 |
Limiting ISA Server Dial-out to External Sites | 107 |
Closing Dial-up Connections | 108 |
Practice: Configuring a Dial-up Entry | 108 |
Exercise 1: Testing Internet Connectivity | 108 |
Exercise 2: Creating a New Dial-up Entry | 109 |
Exercise 3: Configuring ISA Server to Route through the Dial-up Entry | 110 |
Exercise 4: Restarting the Firewall Service | 110 |
Exercise 5: Viewing SecureNAT Session Information | 111 |
Lesson Summary | 111 |
Lesson 3 Configuring Automatic Discovery of ISA Server | 112 |
Automatic Discovery | 112 |
Configuring WPAD and WSPAD on the DNS or DHCP Server | 113 |
Automatic Discovery for Firewall Clients | 115 |
Verifying Automatic Discovery for Firewall Clients | 115 |
Automatic Discovery for Web Proxy Clients | 116 |
Troubleshooting Automatic Discovery | 116 |
Practice: Configuring Automatic Discovery | 117 |
Exercise 1: Publishing Automatic Discovery | 117 |
Exercise 2: Creating a WPAD Alias (CNAME) Record in DNS | 118 |
Exercise 3: Enabling Automatic Discovery on a Firewall Client | 118 |
Exercise 4: Testing Automatic Discovery | 118 |
Lesson Summary | 119 |
Lesson 4 Troubleshooting ISA Server Client Connectivity | 120 |
Troubleshooting Client Connections | 120 |
Troubleshooting Dial-up Entries | 122 |
Restarting Services after Configuration Changes | 123 |
Lesson Summary | 126 |
Review | 127 |
CHAPTER 4 Configuring Internet Security Using Access Policies | 129 |
About This Chapter | 129 |
Before You Begin | 130 |
Lesson 1 Creating an Access Policy with ISA Server | 131 |
Controlling Outgoing Requests | 131 |
Configuring Access Policy | 133 |
Rules and Authentication | 134 |
SecureNAT Clients and Authentication | 134 |
Firewall Clients and Authentication | 135 |
Web Proxy Clients and Authentication | 135 |
ISA Server System Security (System Hardening) | 136 |
Getting Started Wizard | 137 |
Lesson Summary | 139 |
Lesson 2 Creating Customized Policy Elements | 140 |
Policy Elements | 140 |
Array-Level and Enterprise-Level Policy Elements | 140 |
Configuring Schedules | 141 |
Configuring Destination Sets | 142 |
Client Address Sets | 144 |
Client Users and Groups | 145 |
Configuring Protocol Definitions | 145 |
Direction | 146 |
Configuring Content Groups | 147 |
Practice: Creating Policy Elements | 149 |
Exercise 1: Creating a Schedule | 149 |
Exercise 2: Creating a Destination Set | 150 |
Lesson Summary | 151 |
Lesson 3 Configuring Protocol Rules | 152 |
Protocol Rules | 152 |
Protocol Rule Configuration Scenario | 153 |
Protocol Availability | 154 |
Application Filters and Protocol Availability | 155 |
Processing Order | 156 |
Array-Level and Enterprise-Level Protocol Rules | 156 |
Web Protocols | 156 |
Protocol Definitions that are Installed with ISA Server | 157 |
Practice: Assigning Protocol Rules to User Accounts | 160 |
Exercise 1: Monitoring Sessions in ISA Management | 161 |
Exercise 2: Requiring Authentication for Web Sessions | 161 |
Exercise 3: Assigning a Protocol Rule to a Windows 2000 User | 162 |
Lesson Summary | 164 |
Lesson 4 Configuring Site and Content Rules | 165 |
Site and Content Rules | 165 |
Processing Order | 165 |
Allow and Deny Actions | 166 |
Destination Sets and Path Processing | 166 |
Array-Level and Enterprise-Level Site and Content Rules | 167 |
Sample Site and Content Rule | 168 |
Content Groups | 168 |
Practice: Creating New Site and Content Rules | 174 |
Exercise 1: Denying User1 Access to Audio and Video Content | 175 |
Exercise 2: Testing the Configuration | 176 |
Lesson Summary | 177 |
Lesson 5 Configuring IP Packet Filters | 178 |
When to Use IP Packet Filters | 178 |
Creating IP Packet Filters | 179 |
Configuring Packet Filter Options | 183 |
IP Fragment Filtering | 183 |
IP Options Filtering | 184 |
Logging Packets | 184 |
Practice: Running Internet Services on the ISA Server Computer | 185 |
Exercise 1: Creating an IP Packet Filter for Incoming (POP3) Mail | 185 |
Exercise 2: Creating an IP Packet Filter for Outgoing (SMTP) Mail | 187 |
Exercise 3: Creating an IP Packet Filter for NNTP | 188 |
Exercise 4: Creating an IP Packet Filter to Allow Outgoing Web Requests (DNS Queries) | 189 |
Exercise 5: Creating an IP Packet Filter for Web Content (HTTP) | 190 |
Lesson Summary | 191 |
Lesson 6 Configuring ISA Server to Detect External Attacks and Intrusions | 192 |
Intrusion Types and Alerts | 192 |
Port Scan Attack | 193 |
All Ports Scan Attack | 193 |
Enumerated Port Scan Attack | 193 |
IP Half Scan Attack | 194 |
Land Attack | 194 |
Ping of Death Attack | 194 |
UDP Bomb Attack | 195 |
Windows Out-of-Band Attack (WinNuke) | 195 |
Configuring Intrusion Detection | 195 |
Practice: Configuring Intrusion Detection on ISA Server | 197 |
Exercise: Enabling Intrusion Detection | 197 |
Lesson Summary | 198 |
Review | 199 |
CHAPTER 5 Configuring Internet Acceleration through the ISA Server Cache | 201 |
About This Chapter | 201 |
Before You Begin | 201 |
Lesson 1 Creating a Basic Cache Policy with Routing Rules | 202 |
How Caching Works | 202 |
Processing Caching Rules | 202 |
Cache Configuration Properties | 203 |
Routing Rules | 203 |
When to Cache Content | 203 |
When to Retrieve Objects from the Cache | 204 |
Applying Routing Rules to Particular Destinations | 204 |
Rule Order | 208 |
Default Routing Rule | 208 |