intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Course 2824B: Implementing Microsoft internet security and acceleration server 2004 - Module 4

Chia sẻ: Nothing Nothing | Ngày: | Loại File: PPT | Số trang:31

36
lượt xem
3
download
 
  Download Vui lòng tải xuống để xem tài liệu đầy đủ

Module 4: Configuring ISA server as a firewall. This module explains how to configure ISA Server 2004 to provide firewall capabilities and restrict traffic into and out of the network. The module describes how to configure firewall policies and rules to provide specific functionality.

Chủ đề:
Lưu

Nội dung Text: Course 2824B: Implementing Microsoft internet security and acceleration server 2004 - Module 4

  1. Module 4: Configuring ISA Server as a Firewall
  2. Overview Using ISA Server as a Firewall Examining Perimeter Networks and Templates Configuring System Policies Configuring Intrusion Detection and IP Preferences
  3. Lesson: Using ISA Server as a Firewall What Is a TCP/IP Packet? What Is Packet Filtering? What Is Stateful Filtering? What Is Application Filtering? What Is Intrusion Detection? How ISA Server 2004 Filters Network Traffic Implementing ISA Server 2004 as a Firewall
  4. What Is a TCP/IP Packet? Network Destination Address: 0003FFD329B0 Physical Interface Source Address: 0003FFFDFFFFpayload Layer Destination: 192.168.1.1 Internet IP Source: 192.168.1.10 Layer payload Protocol: TCP Destination Port: 80 Transport Source Port: 1159 TCP Layer Sequence: 3837066872 payload Acknowledgment: 2982470625 HTTP Request Method: Get Application HTTP Protocol Version: =HTTP/1.1 Layer HTTP Host: =www.contoso.com
  5. What Is Packet Filtering? Is the … Source address allowed? Web Destination address Server allowed? Protocol allowed? Destination port allowed? ISA Packet Filter Server
  6. What Is Stateful Filtering? Connection Rules Create connection rule Web Is packet part of a Server connection? Web Server ISA Server
  7. What Is Application Filtering? Get Get method Respond to www.contoso.co allowed? client m Web Server ISA Server Does the response contain only allowed content and methods?
  8. What Is Intrusion Detection? Alert the Port scan limit All ports scan administrator exceeded attack ISA Server
  9. How ISA Server 2004 Filters Network Traffic 3 Applicatio Web n filtering Filters Web 2Stateful and protocol Proxy Application filtering Filter Filters Firewa ll Rules Servic Engin e e Firewall Engine 4 Kernel mode TCP/IP Packet data 1 filtering pump
  10. Implementing ISA Server 2004 as a Firewall To Determine configure perimeter ISA Server as a firewall: network configuration Configure networks and network rules Configure system policy Configure intrusion detection Configure access rule elements and access rules Configure server and Web publishing
  11. Practice: Applying Firewall Concepts In this practice, you will analyze three scenarios describing an organization’s network security requirements and determine what firewall functionality is required in each scenario
  12. Lesson: Examining Perimeter Networks and Templates What Is a Perimeter Network? Why Use a Perimeter Network? Network Perimeter Configurations About Network Templates How to Use the Network Template Wizard Modifying Rules Applied by Network Templates
  13. What Is a Perimeter Network? Perimeter Network Firew all Firew all Intern et Internal Network
  14. Why Use a Perimeter Network? A perimeter network provides an additional Betweenlayer the publicly accessible servers of security: and the internal network Between the Internet and confidential data or critical applications stored on servers on the internal network Between potentially nonsecure networks such as wireless networks and the internal network Use defense in depth in addition to perimeter network security
  15. Network Perimeter Configurations Bastion host Three-legged configuration LA Perimeter N Network Web LA Serv N er Back-to-back configuration LA Perimeter N Network
  16. About Network Templates Bastion host Three-legged configuration LA Perimeter N Network Web LA Serv N er Back-to-back configuration Deploy the Edge Deploy the 3-Leg Firewall templatePerimeter template LA Perimeter N Deploy the Network Front-End or Back-End template Deploy the Single Network Adapter template for proxy and caching only
  17. How to Use the Network Template Wizard
  18. Modifying Rules Applied by Network Templates You may need to modify the rules applied by a network template to: Modify Internet access based on user or computer sets Modify Internet access based on protocols Modify network rules to change network relationships You can either change the properties of one of the rules configured by the network template, or you can create a new access rule to apply a specific setting
  19. Practice: Implementing Network Templates Applying the 3-Legged Network Template Reviewing the Access Rules Created by the 3-Legged Network Template Gen-Web-01 Testing Internet Access Den-ISA-01 Internet Den-Clt-01Den-DC-01
  20. Lesson: Configuring System Policies What Is System Policy? System Policy Settings How to Modify System Policy Settings
ADSENSE

CÓ THỂ BẠN MUỐN DOWNLOAD

 

Đồng bộ tài khoản
2=>2