Course 2824B: Implementing Microsoft internet security and acceleration server 2004 - Module 4
lượt xem 3
download
Module 4: Configuring ISA server as a firewall. This module explains how to configure ISA Server 2004 to provide firewall capabilities and restrict traffic into and out of the network. The module describes how to configure firewall policies and rules to provide specific functionality.
Bình luận(0) Đăng nhập để gửi bình luận!
Nội dung Text: Course 2824B: Implementing Microsoft internet security and acceleration server 2004 - Module 4
- Module 4: Configuring ISA Server as a Firewall
- Overview Using ISA Server as a Firewall Examining Perimeter Networks and Templates Configuring System Policies Configuring Intrusion Detection and IP Preferences
- Lesson: Using ISA Server as a Firewall What Is a TCP/IP Packet? What Is Packet Filtering? What Is Stateful Filtering? What Is Application Filtering? What Is Intrusion Detection? How ISA Server 2004 Filters Network Traffic Implementing ISA Server 2004 as a Firewall
- What Is a TCP/IP Packet? Network Destination Address: 0003FFD329B0 Physical Interface Source Address: 0003FFFDFFFFpayload Layer Destination: 192.168.1.1 Internet IP Source: 192.168.1.10 Layer payload Protocol: TCP Destination Port: 80 Transport Source Port: 1159 TCP Layer Sequence: 3837066872 payload Acknowledgment: 2982470625 HTTP Request Method: Get Application HTTP Protocol Version: =HTTP/1.1 Layer HTTP Host: =www.contoso.com
- What Is Packet Filtering? Is the … Source address allowed? Web Destination address Server allowed? Protocol allowed? Destination port allowed? ISA Packet Filter Server
- What Is Stateful Filtering? Connection Rules Create connection rule Web Is packet part of a Server connection? Web Server ISA Server
- What Is Application Filtering? Get Get method Respond to www.contoso.co allowed? client m Web Server ISA Server Does the response contain only allowed content and methods?
- What Is Intrusion Detection? Alert the Port scan limit All ports scan administrator exceeded attack ISA Server
- How ISA Server 2004 Filters Network Traffic 3 Applicatio Web n filtering Filters Web 2Stateful and protocol Proxy Application filtering Filter Filters Firewa ll Rules Servic Engin e e Firewall Engine 4 Kernel mode TCP/IP Packet data 1 filtering pump
- Implementing ISA Server 2004 as a Firewall To Determine configure perimeter ISA Server as a firewall: network configuration Configure networks and network rules Configure system policy Configure intrusion detection Configure access rule elements and access rules Configure server and Web publishing
- Practice: Applying Firewall Concepts In this practice, you will analyze three scenarios describing an organization’s network security requirements and determine what firewall functionality is required in each scenario
- Lesson: Examining Perimeter Networks and Templates What Is a Perimeter Network? Why Use a Perimeter Network? Network Perimeter Configurations About Network Templates How to Use the Network Template Wizard Modifying Rules Applied by Network Templates
- What Is a Perimeter Network? Perimeter Network Firew all Firew all Intern et Internal Network
- Why Use a Perimeter Network? A perimeter network provides an additional Betweenlayer the publicly accessible servers of security: and the internal network Between the Internet and confidential data or critical applications stored on servers on the internal network Between potentially nonsecure networks such as wireless networks and the internal network Use defense in depth in addition to perimeter network security
- Network Perimeter Configurations Bastion host Three-legged configuration LA Perimeter N Network Web LA Serv N er Back-to-back configuration LA Perimeter N Network
- About Network Templates Bastion host Three-legged configuration LA Perimeter N Network Web LA Serv N er Back-to-back configuration Deploy the Edge Deploy the 3-Leg Firewall templatePerimeter template LA Perimeter N Deploy the Network Front-End or Back-End template Deploy the Single Network Adapter template for proxy and caching only
- How to Use the Network Template Wizard
- Modifying Rules Applied by Network Templates You may need to modify the rules applied by a network template to: Modify Internet access based on user or computer sets Modify Internet access based on protocols Modify network rules to change network relationships You can either change the properties of one of the rules configured by the network template, or you can create a new access rule to apply a specific setting
- Practice: Implementing Network Templates Applying the 3-Legged Network Template Reviewing the Access Rules Created by the 3-Legged Network Template Gen-Web-01 Testing Internet Access Den-ISA-01 Internet Den-Clt-01Den-DC-01
- Lesson: Configuring System Policies What Is System Policy? System Policy Settings How to Modify System Policy Settings
CÓ THỂ BẠN MUỐN DOWNLOAD
-
Course 2824B: Implementing Microsoft internet security and acceleration server 2004 - Module 10
41 p | 41 | 4
-
Course 2824B: Implementing Microsoft internet security and acceleration server 2004 - Module 9
25 p | 56 | 4
-
Course 2824B: Implementing Microsoft internet security and acceleration server 2004 - Module 8
38 p | 47 | 4
-
Course 2824B: Implementing Microsoft internet security and acceleration server 2004 - Module 6
34 p | 49 | 4
-
Course 2824B: Implementing Microsoft internet security and acceleration server 2004 - Module 5
36 p | 50 | 4
-
Course 2824B: Implementing Microsoft internet security and acceleration server 2004 - Module 3
36 p | 41 | 4
-
Course 2824B: Implementing Microsoft internet security and acceleration server 2004 - Module 2
45 p | 39 | 4
-
Course 2824B: Implementing Microsoft internet security and acceleration server 2004 - Module 11
31 p | 44 | 3
-
Course 2824B: Implementing Microsoft internet security and acceleration server 2004 - Module 12
10 p | 46 | 3
-
Course 2824B: Implementing Microsoft internet security and acceleration server 2004 - Introduction
12 p | 47 | 3
-
Course 2824B: Implementing Microsoft internet security and acceleration server 2004 - Module 7
23 p | 50 | 3
-
Course 2824B: Implementing Microsoft internet security and acceleration server 2004 - Module 1
15 p | 53 | 3
-
Course 2824B: Implementing Microsoft internet security and acceleration server 2004 - Module 13
10 p | 37 | 3
Chịu trách nhiệm nội dung:
Nguyễn Công Hà - Giám đốc Công ty TNHH TÀI LIỆU TRỰC TUYẾN VI NA
LIÊN HỆ
Địa chỉ: P402, 54A Nơ Trang Long, Phường 14, Q.Bình Thạnh, TP.HCM
Hotline: 093 303 0098
Email: support@tailieu.vn