did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780735614420

Microsoft Internet Security and Acceleration (ISA) Server 2000 Administrator's Pocket Consultant

by ;
  • ISBN13:

    9780735614420

  • ISBN10:

    0735614423

  • Format: Paperback
  • Copyright: 2003-07-16
  • Publisher: Microsoft Pr
  • Purchase Benefits
List Price: $29.99
We're Sorry.
No Options Available at This Time.

Summary

Protect and accelerate your e-business systems with Microsoft Internet Security and Acceleration (ISA) Server 2000 with this no-nonsense technical reference, which provides everything the IT professional needs to know to support ISA Server 2000.

Table of Contents

Acknowledgments xxvii
Introduction xxix
Part I Microsoft ISA Server 2000 Administrator's Fundamentals
3(284)
Overview of Microsoft ISA Server 2000 Administration
3(18)
How ISA Server Operates as a Caching and Firewall Server
3(2)
Firewall: The Secure Server
4(1)
Caching: The Acceleration Server
4(1)
ISA Server Product Editions
5(7)
Quick Comparison of ISA Product Editions
5(1)
Operating System Compatibility
6(1)
Basic Hardware and Server Requirements for ISA Server
7(1)
Detailed Comparison of ISA Server Implementations
8(1)
Small Business Server 2000
8(2)
ISA Server 2000 Standard Edition
10(1)
ISA Server 2000 Enterprise Edition
11(1)
Using Common ISA Server Tools and Utilities
12(7)
Using the ISA Management Console
12(1)
Console View Options
13(1)
Working with ISA Management Nodes
14(3)
ISA Server Wizards
17(1)
Commonly Used MMCs
17(1)
Command-Line Utilities
18(1)
ISA Community
18(1)
Add-Ons for ISA Server
18(1)
Administering ISA Server Remotely
19(1)
ISA Management Console
19(1)
Terminal Services
19(1)
Third-Party Products
20(1)
Additional Resources
20(1)
Installing and Configuring Microsoft ISA Server 2000
21(24)
Installing ISA Server 2000
21(5)
Before You Begin
21(5)
Installing ISA Server on Windows Server 2003
26(1)
Installing ISA Server Service Pack 1
26(1)
Modifying the Role of ISA Server: Enabling Array Membership
26(4)
Joining ISA Server to a Domain
27(1)
Running the Enterprise Initialization Tool
27(1)
Configuring Enterprise Policy Settings
28(1)
Verifying Schema Extensions
29(1)
Promoting a Stand-Alone Server to an Array Member
29(1)
Configuring ISA Server
30(12)
Configuring the Local Address Table (LAT)
31(1)
Manually Creating a New Local Address Table (LAT) Entry
31(1)
Automatically Constructing the Local Address Table (LAT)
31(1)
Modifying a LAT Entry
32(1)
Deleting a LAT Entry
32(1)
Configuring the Local Domain Table (LDT)
32(1)
Creating a New LDT Entry
33(1)
Modifying an LDT Entry
33(1)
Deleting an LDT Entry
33(1)
Configuring Automatic Discovery
33(1)
Enabling Automatic Discovery
33(2)
Configuring the ISA Server Cache
35(1)
Setting the Size of the Cache
36(1)
Configuring the Cache Properties
36(2)
Determining the Load Factor
38(1)
Configuring the Intra-Array Address
38(1)
Configuring Scheduled Content Downloads
39(1)
Installing ISA Server Feature Pack 1
40(1)
Uninstalling ISA Server Feature Pack 1
41(1)
Uninstalling ISA Server
42(1)
Performing an Uninstall with Add/Remove Programs
42(1)
Performing an Uninstall with Rmisa.exe
42(1)
Additional Resources
43(2)
Installing and Configuring Microsoft ISA Server 2000 Clients
45(14)
Working with the SecureNAT Client
46(2)
Installation
46(1)
Simple Network vs. Complex Network
47(1)
Configuration
47(1)
Configuring the HTTP Redirector Filter
47(1)
Working with the Web Proxy Client
48(3)
Installation
49(1)
Configuration
49(2)
Working with the Firewall Client
51(6)
Installation
51(1)
UNC-Based Installation
51(1)
IIS Web-Based Installation
52(1)
Group Policy--Based Installation
53(1)
Silent Installations
54(1)
Configuration
55(1)
Firewall Client Configuration
56(1)
Firewall Client Configuration Properties in the ISA Management Console
56(1)
Configuring a Workstation with All Clients
57(1)
Client Dependencies on the Infrastructure
57(1)
DNS Requirements and Considerations
57(1)
Configure a Protocol Rule to Allow DNS Lookups
57(1)
DHCP Services
58(1)
Additional Resources
58(1)
Configuring ISA Server on Small Business Server Installations
59(14)
Limitations and Differences of ISA Server with SBS
59(9)
Installation
60(3)
Configuration
63(1)
Small Business Server Internet Connection Wizard
63(5)
Common Procedures and Troubleshooting Steps
68(3)
Internet Connection Wizard Doesn't Start
68(1)
ISA Server Services Won't Start If Network Address Translation (NAT) is Enabled
68(1)
Use Only the Dial-Up Connection Specified in ISA Server to Connect to the Internet
69(1)
Dynamic DNS Services for Small Businesses
69(1)
Can't Renew DHCP Assigned IP Address on External ISA Interface
69(1)
Disabling ICW for Dial-Up Connections
69(1)
Manually Assigning Fax Server Privileges
70(1)
Logging User Activity
70(1)
Problems with ISA Server and IIS on the Same Computer
71(1)
Removing ISA Server from SBS
71(1)
Additional Resources
71(2)
Migrating from Microsoft Proxy Server 2.0
73(10)
Prerequisites to Upgrading Proxy Server 2.0 to ISA Server
73(1)
Upgrading the Proxy Server from Windows NT 4 to Windows 2000
74(2)
Backing Up the Proxy 2.0 Server
75(1)
Uninstalling Proxy Server 2.0
75(1)
Upgrading the Operating System to Windows 2000
75(1)
Installing the Microsoft Proxy Server 2.0 Update for Windows 2000
76(1)
Restoring the Proxy Server 2.0 Configuration
76(1)
Performing an Upgrade to ISA Server 2000
76(4)
Stopping Proxy 2.0 Server Services
77(1)
Removing a Proxy 2.0 Server from an Array
77(1)
Installing ISA Server to Upgrade Proxy Server 2.0
78(2)
Differences Between Proxy Server and ISA Server
80(1)
Configure the Outbound Web Requests Listener
80(1)
Be Aware of Differences Between the Winsock Client and the ISA Firewall Client
80(1)
Configure Published Servers as SecureNAT Clients for Convenience
81(1)
Reconfigure IIS After Installing ISA Server
81(1)
Additional Resources
81(2)
Monitoring and Reporting
83(20)
Services
83(2)
Monitoring ISA Server Services
83(1)
Service Monitoring in ISA Management Console
84(1)
Services Console
84(1)
Command-Line Service Management
85(1)
Sessions
85(2)
Monitoring Sessions
85(1)
Determining Session Type
86(1)
Aborting Sessions
86(1)
Events
87(1)
Monitoring Events
87(1)
Analyzing Events
88(1)
Alerts
88(5)
Creating an Alert
88(1)
Sending an E-Mail Message
89(1)
Running a Program
90(1)
Reporting the Event to a Windows 2000 Event Log
90(1)
Stopping Selected ISA Server Services
90(1)
Starting Selected ISA Server Services
90(1)
Configuring an Alert
91(1)
Viewing Alerts
92(1)
Resetting Alerts
93(1)
Reporting with ISA Server
93(3)
Generating Reports
93(1)
Reporting Job Properties
93(1)
Creating a Report
94(1)
Report Types
95(1)
Viewing Reports
95(1)
Saving Reports
96(1)
Logging Transactions in ISA Server
96(4)
ISA Log Components
96(1)
Configuring Logs
97(1)
Logging to a File
98(1)
Logging to a Database
98(1)
Executing SQL Scripts
98(1)
Defining an ODBC System DSN
99(1)
Configuring ISA to Log to an ODBC Database
99(1)
Additional Resources
100(3)
Part II Microsoft ISA Server 2000 Policy Management and Publishing Services
Configuring ISA Policy Elements
103(16)
Policy Elements Explained
103(2)
Serving Multiple Purposes
104(1)
Enterprise Policies and Policy Elements
105(1)
Schedules
105(2)
Creating New Schedules
105(1)
Deleting Schedules
106(1)
Adjusting Existing Schedules
106(1)
Destination Sets
107(2)
Creating New Destination Sets
107(1)
Deleting Destination Sets
108(1)
Configuring Destination Sets
108(1)
Client Address Sets
109(1)
Creating Client Address Sets
109(1)
Deleting Client Address Sets
109(1)
Configuring Client Address Sets
110(1)
User Manager
110(1)
Protocol Definitions
110(2)
Creating Protocol Definitions
111(1)
Deleting Protocol Definitions
111(1)
Configuring Protocol Definitions
112(1)
Content Groups
112(2)
Creating Content Groups
113(1)
Deleting Content Groups
113(1)
Configuring Content Groups
114(1)
Dial-Up Entries
114(3)
Configuring a Network Dial-Up Connection on Windows 2000 Server
114(1)
Configuring a Network Dial-Up Connection on Windows Server 2003
115(1)
Creating Dial-Up Entries
116(1)
Deleting Dial-Up Entries
116(1)
Configuring Dial-Up Entries
117(1)
Bandwidth Priorities
117(1)
Creating Bandwidth Priority Entries
117(1)
Deleting Bandwidth Priority Entries
118(1)
Configuring Bandwidth Priorities
118(1)
Additional Resources
118(1)
Configuring ISA Access Policy
119(28)
Processing Outgoing Requests
119(1)
Primary Access Policy Components
120(8)
Site and Content Rules
120(1)
Creating a Site and Content Rule
121(1)
Deleting a Site and Content Rule
122(1)
Configuring a Site and Content Rule
123(1)
Enabling and Disabling a Site and Content Rule
123(1)
Protocol Rules
123(1)
Creating a Protocol Rule
124(1)
Deleting a Protocol Rule
125(1)
Configuring a Protocol Rule
125(1)
IP Packet Filters
126(1)
Creating an IP Packet Filter
126(1)
Deleting an IP Packet Filter
127(1)
Configuring an IP Packet Filter
128(1)
Ancillary Access Policy Components
128(12)
Bandwidth Rules
128(1)
Creating a Bandwidth Rule
129(1)
Deleting a Bandwidth Rule
129(1)
Modifying a Bandwidth Rule
130(1)
Modifying Bandwidth Rule Processing Order
131(1)
Routing Rules
131(1)
Creating a Routing Rule
131(2)
Deleting a Routing Rule
133(1)
Configuring a Routing Rule
133(1)
Firewall Chaining
134(1)
Outgoing Web Requests
135(1)
Creating an Outgoing Listener
135(2)
Configuring and Deleting an Outgoing Listener
137(1)
Configuring Outgoing Authentication
137(1)
Resolving Requests Within an Array
138(1)
Altering the Outgoing Web Requests Port Values
138(1)
Modifying Outgoing Web Requests Connection Settings
139(1)
Optimizing Server Performance
140(1)
ISA Server Extensions
140(5)
Application Filters
140(1)
Enabling/Disabling an Application Filter
141(1)
FTP Access Filter
141(1)
HTTP Redirector Filter
142(1)
SOCKS V4 Filter
143(1)
Streaming Media Filter
143(1)
Web Filters
144(1)
Additional Resources
145(2)
Publishing Fundamentals
147(24)
Installation Modes
147(1)
Processing Incoming Requests
148(1)
Web Publishing
148(13)
Prerequisites
149(1)
Incoming Web Requests
149(1)
Creating an Incoming Listener
150(1)
Configuring and Deleting an Incoming Listener
151(1)
Configuring Incoming Authentication
152(1)
Resolving Requests Within an Array
152(1)
Altering the Incoming Web Requests Port Values
152(1)
Modifying Incoming Web Requests Connection Settings
153(1)
Creating a Web Publishing Rule
154(1)
Deleting a Web Publishing Rule
155(1)
Configuring a Web Publishing Rule
155(1)
Enabling/Disabling a Web Publishing Rule
156(1)
Adjusting the Rule Processing Order
156(1)
Accessing Secured Sites
157(1)
Web Publishing and SSL Bridging
157(1)
Server Publishing and SSL Tunneling
158(1)
Web Filters for Inbound Access
158(1)
Using Link Translation
158(3)
Server Publishing
161(3)
Limitations
161(1)
Prerequisites
162(1)
Creating a Server Publishing Rule
162(1)
Deleting a Server Publishing Rule
163(1)
Configuring a Server Publishing Rule
163(1)
Enabling/Disabling a Server Publishing Rule
164(1)
Routing and IP Packet Filters
164(2)
Enabling Packet Filtering
165(1)
Enabling IP Routing
166(1)
Application Filters for Inbound Access
166(3)
DNS Intrusion Detection Filter
166(1)
H.323 Filter
167(1)
POP Intrusion Detection Filter
168(1)
RPC Filter
168(1)
SMTP Filter
168(1)
Additional Resources
169(2)
Common Web and Server Publishing Scenarios
171(30)
Common Prerequisites
171(3)
Configuring the LAT
172(1)
Configuring DNS Resolution
172(1)
Routing
172(1)
Disabling Socket Pooling
172(2)
Publishing Web Server
174(2)
Publishing a Web Site Behind the ISA Server
174(1)
Creating a Destination Set
174(1)
Creating a Web Listener for Incoming Web Requests
175(1)
Creating a Web Publishing Rule
175(1)
Publishing a Web Site on the ISA Server
176(1)
Modifying Web Site Properties in IIS
176(1)
Creating a Web Publishing Rule
176(1)
Publishing Secured Web Site (HTTPS)
176(2)
Web Server Certificate
177(1)
Creating an Incoming Listener
177(1)
Using the Predefined HTTPS Protocol Definition
177(1)
Creating an HTTPS (SSL) Server Publishing Rule
177(1)
Publishing FTP Server
178(4)
Using Packet Filters to Provide FTP Services
179(1)
Configuring FTP Packet Filters to Allow PASV Clients
180(1)
Publishing FTP Using ISA Server
180(1)
Disabling Socket Pooling
180(1)
Configuring FTP Server to Listen on the Internal Interface
181(1)
Disabling Port Attack Mechanism
181(1)
Configuring the Server Publishing Rule
181(1)
Enabling the FTP Access Filter
182(1)
Publishing Exchange Server
182(7)
Publishing a Mail Server Located Behind ISA Server
183(1)
Configuring DNS Resolution
183(1)
Configuring Server Client Type
183(1)
Creating Client Address Sets
183(1)
Creating Protocol Definitions
184(1)
Running the Secure Mail Publishing Wizard
184(1)
Publishing Exchange Using the RPC Publishing Wizard for Outlook Clients
185(1)
Configuring DNS Resolution Configure Server Client Type
185(1)
Creating a Site and Content Rule
185(1)
Configuring Client Address Sets
186(1)
Creating Protocol Rules
186(1)
Enabling Client Authentication
186(1)
Creating a Server Publishing Rule
186(1)
Configuring the Outlook Clients
186(1)
Enabling Access to Exchange Servers Outside ISA Server
187(1)
Publishing an OWA Server
187(1)
Prerequisites
187(1)
Using a Web Publishing Rule
188(1)
Using the OWA Web Publishing Wizard
189(1)
Publishing SQL Server
189(2)
Creating an Incoming Listener
189(1)
Using the Predefined Protocol Definition
190(1)
Creating a SQL Server Publishing Rule
190(1)
Publishing Remote Desktop or a Terminal Server
191(1)
Creating an RDP Protocol Definition
191(1)
Creating a RDP Publishing Rule
192(1)
Publishing a Citrix Server
192(2)
Configuring the Citrix Server as a SecureNAT Client
193(1)
Creating a Citrix ICA Protocol Definition
193(1)
Creating a Citrix Server Publishing Rule
193(1)
Configuring the Citrix Server
194(1)
Configuring the Citrix Clients
194(1)
Publishing a DNS Server
194(4)
Publishing a Public DNS Server Located Behind an ISA Server
195(1)
Creating an Incoming Listener
195(1)
Using the Predefined Protocol Definition
195(1)
Creating a DNS Server Publishing Rule
195(1)
Publishing a Public DNS Server on the ISA Server
196(1)
Using the Predefined DNS Query Packet Filter
196(1)
Creating Two DNS Server Packet Filters
197(1)
Additional Resources
198(3)
General Scenario-Based References
198(1)
Microsoft Knowledge Base References
198(3)
Part III Microsoft ISA Server 2000 and Enterprise Systems Administration
Managing ISA Server and Windows Active Directory
201(10)
Stand-Alone Versus Array Members
201(1)
Characteristics of a Stand-Alone ISA Server
201(1)
Characteristics of an ISA Server Array Member
202(1)
Active Directory Interoperability
202(1)
Creating and Configuring ISA Server Arrays
202(5)
ISA Server Array Criteria
203(1)
Administrative Requirements for ISA Server Arrays
203(1)
Creating the Array Environment
203(1)
Creating a New Array
204(1)
Adding or Removing Array Members
205(1)
Moving an ISA Array Member to a Different Array
206(1)
Configuring Array Permissions
207(1)
ISA Server 2000 and Domain Integration
207(2)
Managing a Multidomain Configuration and Trust Relationships
207(1)
ISA Server and Windows NT 4.0 domains
207(1)
ISA Server and Windows 2000 and Windows Server 2003 Domains
208(1)
Additional Resources
209(2)
Using Enterprise and Array Policies
211(12)
Enterprise and Array Policies Explained
211(2)
Enterprise and Array Decisions
212(1)
Configuring Enterprise Policy Settings
213(1)
Enterprise Policy Administration
213(5)
Creating Enterprise Policies
214(1)
Configuring Enterprise Policies
214(1)
Backing Up and Restoring an Enterprise Configuration
215(1)
Deleting Enterprise Policies
216(1)
Enterprise Administration and Permissions
216(1)
Connecting to Remote Enterprise and Arrays
217(1)
Applying an Enterprise Policy to Selective Arrays
217(1)
Setting a Default Enterprise Policy
218(1)
Array Policy Administration
218(3)
Allowing Array Policies
218(1)
Configuring Array Policies
219(1)
Forcing Packet Filtering for an Array
219(1)
Allowing Publishing Rules in an Array
219(1)
Configuring Enterprise Policy Settings for an Array
219(1)
Backing Up, Restoring and Deleting an Array Configuration
220(1)
Additional Resources
221(2)
Working with Enterprise Technologies and ISA Server 2000
223(30)
Cache Array Routing Protocol (CARP)
223(3)
Enabling CARP for Outgoing and Incoming Web Requests
224(1)
Configuring Intra-Array Communication
225(1)
Configuring the CARP Load Factor
225(1)
CARP and Scheduled Content Download
226(1)
Network Load Balancing
226(5)
Prerequisites
227(1)
Installing and Configuring Network Load Balancing
227(2)
Additional Configuration for ISA Server and Network Load Balancing
229(1)
Server Publishing and Network Load Balancing
230(1)
Using DNS Round Robin
230(1)
Virtual Private Networks (VPNs)
231(10)
Using ISA Server as a VPN Server
231(1)
Configuring a Gateway-to-Gateway VPN
231(1)
Configuring the Local VPN Server
231(2)
Configuring the Remote VPN Server
233(1)
Confirming the Gateway-to-Gateway Configuration
234(1)
Connecting Remote Clients Using VPN
234(1)
Configuring a Client Virtual Private Network (VPN)
234(2)
Configuring a VPN Connectoid
236(1)
Configuring VPN Pass-Through
237(1)
Manually Configuring the VPN
238(3)
H.323 Gatekeeper
241(8)
Prerequisites
241(1)
Create a DNS Service Record for the H.323 Gatekeeper
241(1)
Defining Access to the H.323 Protocol
242(1)
Installing and Configuring the H.323 Gatekeeper
243(1)
Installing the H.323 Gatekeeper Service Management Console
243(1)
Enabling the H.323 Filter
244(1)
Adding an H.323 Gatekeeper
244(1)
Configuring H.323 Gatekeeper Properties
244(1)
Configuring H.323 Gatekeeper Permissions
245(1)
Enable IP Routing to Improve H.323 Performance
245(1)
Configure Call Routing Rules
245(1)
Creating a Call Routing Rule
245(3)
Configuring an Internal NetMeeting Client to Use an H.323 Gatekeeper
248(1)
Configuring an External NetMeeting Client to Use an H.323 Gatekeeper
249(1)
Additional Resources
249(4)
Part IV Microsoft ISA Server 2000 Security Management
Microsoft ISA Server 2000 and Perimeter Networks
253(16)
Perimeter Networks Explained
253(1)
Trihomed ISA Server Perimeter Networks
254(2)
Configuring the Trihomed ISA Server Network Interfaces
254(1)
Configuring the Trihomed Perimeter Network
255(1)
Limitations of a Trihomed Perimeter Network
256(1)
Back-to-Back ISA Server Perimeter Networks
256(7)
Configuring the Back-to-Back ISA Servers
257(1)
Configuring Back-to-Back Perimeter Networks
258(1)
Configuring a Private Address Perimeter Network
259(1)
Configuring a Public Address Perimeter Network
260(3)
Limitations of Perimeter Networks
263(1)
Publishing Services in Perimeter Networks
263(2)
Publishing Web Servers
264(1)
Configuring the Web Server in a Trihomed Perimeter Network
264(1)
Configuring the Web Server in a Back-to-Back Perimeter Network
264(1)
Publishing FTP Services
265(3)
Configuring the PORT Mode FTP Server in a Trihomed Perimeter Network
265(1)
Configuring the PASV Mode FTP Server in a Trihomed Perimeter Network
266(1)
Configuring FTP in a Back-to-Back Perimeter Network
266(1)
Publishing SMTP Services in a Trihomed Perimeter Network
267(1)
Additional Resources
268(1)
Securing ISA Server 2000
269(18)
Trustworthy Computing
269(2)
Common Types of Attacks and Best Prevention Practices
270(1)
Intrusion Detection
271(4)
Configuring Intrusion Detection
272(3)
Intrusion Detection Alerts and Actions
275(1)
ISA Server Security Wizards
275(3)
Security Templates
276(2)
Optimizing ISA Server Security
278(9)
Checklist for Securing ISA Server 2000
278(1)
Securing the Network Interface Adapters
279(2)
Disabling Services
281(1)
Running ISA Server on a Dedicated Server
282(1)
URLScan 2.5 for ISA Server
282(1)
Installing URLScan 2.5
283(1)
Disabling the URLScan Web Filter
284(1)
Configuring the Urlscan.ini File
284(1)
A Look at Web Authentication with RSA SecurID
285(1)
Installing the RSA SecurID Web Filter
286(1)
Additional Resources
286(1)
Security References
286(1)
Trustworthy Computing
287(1)
Securing ISA Server 2000
287

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program