Book description
Dr. Tom and Debra Shinder have become synonymous with Microsoft's flagship firewall product ISA Server, as a result of Tom's prominent role as a member of the beta development team, and Tom and Deb's featured placement on both Microsoft's ISA Server Web site and ISAserver.org. Tom and Deb's book on the first release of the product "Configuring ISA Server 2000" dominated the ISA Server 2000 book market having sold over 40,000 copies worldwide, and the ISA Server community is eagerly awaiting Tom and Deb's book on ISA Server 2004, which is the dramatically upgraded new release from Microsoft.Dr. Tom and Debra Shinder have become synonymous with Microsoft's flagship firewall product ISA Server, as a result of Tom's prominent role as a member of the beta development team, and Tom and Deb's featured placement on both Microsoft's ISA Server Web site and ISAserver.org. Tom and Deb's book on the first release of the product "Configuring ISA Server 2000" dominated the ISA Server 2000 book market having sold over 40,000 copies worldwide, and the ISA Server community is eagerly awaiting Tom and Deb's book on ISA Server 2004, which is the dramatically upgraded new release from Microsoft. This book will be featured prominently on the ISAserver.org home page as well as referenced on Microsoft TechNet and ISA Server Web pages. Tom and Deb's unparalleled technical expertise combined with prime on-line marketing opportunities will make this the #1 book again in the ISA Server market.
* This book will provide readers with unparalleled information on installing, confiuguring, and troubleshooting ISA Server 2004 by teaching readers to: * Deploy ISA Server 2004 in small businesses and large organizations.
* Learn how to configure complex DMZ configurations using ISA Server 2004's new network awareness features and built-in multinetworking capabilities.
* Learn how to take advantage of ISA Server 2004's new VPN capabilities!
Table of contents
- Cover image
- Title page
- Table of Contents
- Register for Free Membership to solutions@syngress.com
- Dedications
- Copyright
- Acknowledgments
- About the Authors
- Technical Editor
- A Note From the Publisher
- From Deb and Tom Shinder, Authors
- Chapter 1: Evolution of a Firewall: From Proxy 1.0 to ISA 2004
- Chapter 2: Examining the ISA Server 2004 Feature Set
- Chapter 3: Stalking the Competition: How ISA 2004 Stacks Up
-
Chapter 4: ISA 2004 Network Concepts and Preparing the Network Infrastructure
- Our Approach to ISA Firewall Network Design and Defense Tactics
- Tom and Deb Shinder’s Configuring ISA 2004 Network Layout
- How ISA Firewall’s Define Networks and Network Relationships
- Web Proxy Chaining as a Form of Network Routing
- Firewall Chaining as a Form of Network Routing
- Configuring the ISA Firewall as a DHCP Server
- Summary
- Solutions Fast Track
- Chapter 5: ISA 2004 Client Types and Automating Client Provisioning
-
Chapter 6: Installing and Configuring the ISA Firewall Software
- Pre-installation Tasks and Considerations
- Performing a Clean Installation on a Multihomed Machine
- Default Post-installation ISA Firewall Configuration
- The Post-installation System Policy
- Performing an Upgrade Installation
- Performing a Single NIC Installation (Unihomed ISA Firewall)
- Quick Start Configuration for ISA Firewalls
- Hardening the Base ISA Firewall Configuration and Operating System
- Summary
- Solutions Fast Track
-
Chapter 7: Creating and Using ISA 2004 Firewall Access Policy
- Introduction
- ISA Firewall Access Rule Elements
- Configuring Access Rules for Outbound Access through the ISA Firewall
- Using Scripts to Populate Domain Name Sets
- Creating and Configuring a Public Address Trihomed DMZ Network
- Allowing Intradomain Communications through the ISA Firewall
- Summary
- Solutions Fast Track
-
Chapter 8: Publishing Network Services with ISA 2004 Firewalls
- Overview of Web Publishing and Server Publishing
- Creating and Configuring Non-SSL Web Publishing Rules
- Creating and Configuring SSL Web Publishing Rules
- SSL Bridging
- SSL “Tunneling” versus SSL “Bridging”
- What About SSL-to-HTTP Bridging?
- Enterprise and Standalone Certificate Authorities
- SSL-to-SSL Bridging and Web Site Certificate Configuration
- Importing Web Site Certificates into The ISA Firewall’s Machine Certificate Store
- Requesting a User Certificate for the ISA Firewall to Present to SSL Web Sites
- Creating an SSL Web Publishing Rule
- The Publishing Mode Page
- The Select Rule Action page
- The Bridging Mode Page
- The Define Website to Publish Page
- The Public Name Details Page
- The Select Web Listener Page
- The User Sets Page
- The SSL Web Publishing Rule Properties Dialog Box
- Creating Server Publishing Rules
- Creating Mail Server Publishing Rules
- Summary
- Solutions Fast Track
-
Chapter 9: Creating Remote Access and Site-to-Site VPNs with ISA Firewalls
- Overview of ISA Firewall VPN Networking
- Creating a Remote Access PPTP VPN Server
- Creating a Remote Access L2TP/IPSec Server
- Creating a PPTP Site-to-Site VPN
- Creating an L2TP/IPSec Site-to-Site VPN
- IPSec Tunnel Mode Site-to-Site VPNs with Downlevel VPN Gateways
- Using RADIUS for VPN Authentication and Remote Access Policy
- Using EAP User Certificate Authentication for Remote Access VPNs
- Supporting Outbound VPN Connections through the ISA Firewall
- Installing and Configuring the DHCP Server and DHCP Relay Agent on the ISA Firewall
- Creating a Site-to-Site VPN Between an ISA Server 2000 and ISA Firewall
- A Note on VPN Quarantine
- Summary
- Solutions Fast Track
- Chapter 10: ISA 2004 Stateful Inspection and Application Layer Filtering
- Chapter 11: Accelerating Web Performance with ISA 2004 Caching Capabilities
- Chapter 12: Using ISA Server 2004’s Monitoring, Logging, and Reporting Tools
- Index
Product information
- Title: Dr. Tom Shinder's Configuring ISA Server 2004
- Author(s):
- Release date: December 2004
- Publisher(s): Syngress
- ISBN: 9780080477404
You might also like
book
Dr. Tom Shinder's ISA Server 2006 Migration Guide
Dr. Tom Shinder’s ISA Server 2006 Migration Guide provides a clear, concise, and thorough path to …
book
Linux® Quick Fix Notebook
"Where has this book been all my professional life? It is about time someone wrote this …
book
Microsoft® Windows® XP Networking and Security Inside Out: Also Covers Windows 2000
Configure and manage your PC network-and help combat privacy and security threats-from the inside out! This …
book
Deploying Cisco Wide Area Application Services
Design and deploy Cisco WAN optimization and application acceleration solutions for the enterprise WAN Today, IT …