万本电子书0元读

万本电子书0元读

顶部广告

Microsoft Forefront UAG 2010 Administrator's Handbook电子书

售       价:¥

0人正在读 | 0人评论 9.8

作       者:Erez Ben-Ari

出  版  社:Packt Publishing

出版时间:2011-01-24

字       数:201.8万

所属分类: 进口书 > 外文原版书 > 电脑/网络

温馨提示:数字商品不支持退换货,不提供源文件,不支持导出打印

为你推荐

  • 读书简介
  • 目录
  • 累计评论(0条)
  • 读书简介
  • 目录
  • 累计评论(0条)
This book is a hands-on guide, describing concepts, ideas and terminology related to UAG and related technologies. The book starts with a discussion of terms that UAG technology is based on, and proceeds with step-by-step guidance for performing the various tasks related to UAG's core features. Each topic is preceded by a discussion of considerations that the administrator and the organization needs to go through to prepare for the task at hand, and includes plenty of screenshots illustrating what the administrator should expect to see on-screen, with real-life examples of configuration options. If you are a Networking or Security engineer who intends to integrate UAG into the organization network, then this book is for you. You need no experience with UAG or its predecessors, though basic understanding of Networking and Windows Server management and engineering is required. Experience with security systems like Firewalls would also help you to better understand some of the topics covered by this book.
目录展开

Microsoft Forefront UAG 2010 Administrator's Handbook

Table of Contents

Microsoft Forefront UAG 2010 Administrator's Handbook

Credits

About the Authors

About the Reviewers

www.PacktPub.com

Support files, eBooks, discount offers and more

Why Subscribe?

Free Access for Packt account holders

Instant Updates on New Packt Books

Preface

What this book covers

What you need for this book

Who this book for

UAG versus IAG

What's in the box?

Conventions

Reader feedback

Errata

Piracy

Questions

1. Planning Your Deployment

Basic principles

How UAG works

Software requirements

Hardware requirements

Considerations for placing the server

Planning the networking infrastructure

Domain membership

Planning remote connectivity

Load balancing and high availability

Choosing clients

From test to production

Tips for a successful deployment

Deployment checklist

Do's and Don'ts for a successful deployment

Summary

2. Installing UAG

What the installation contains

Service Packs and updates

Preparing your server

Pre-installation checklist

Preparing the installation files

Installation

Verifying the installation

Running the Getting Started Wizard

Applying updates or Service Packs

Common issues during installation

Post installation issues

Summary

3. UAG Building Blocks

What are trunks and applications?

Types of trunks

Types of applications

Built-in services

Web applications

Client/Server and Legacy

Browser-embedded applications

Terminal Services (TS) / Remote Desktop Services (RDS)

What is URL signing and how does it work?

Designing your trunks, applications, and nesting

Some common applications and the appropriate templates

DNS name resolution

Preparing for an HTTPS trunk

Asymmetric encryption

Digital certificates

Creating an HTTPS trunk

Publishing an HTTP trunk

What happens when you add a trunk?

Summary

4. Publishing Web Applications

The four steps to application publishing

Application specific hostname applications versus Portal hostname applications

The Add Application Wizard

Application order

Considerations for Exchange publishing

Considerations for SharePoint publishing

Different internal and external names

Same internal and external FQDN names but different protocols

Same internal and external names and protocols

Sharepoint and IE security enhancements

What is the Active Directory Federation Services 2.0 application?

Certificate validation for published web servers

Did you remember to activate?

Summary

5. Advanced Applications and Services

Advanced application types

Remote connectivity

Configuring browser embedded applications

Configuring client/server applications

Enhanced Generic Client Applications

Enhanced HAT

Generic HTTP Proxy Enabled Client Application

Generic SOCKS Enabled Client Application

Citrix Program Neighborhood (Direct)

Outlook (corporate/workgroup mode)

SSL Application Tunneling component automatic disconnection

Local Drive Mapping

Remote Network Access

SSL Network Tunneling (Network Connector)

Planning for Network Connector

Adding Network Connector to the portal

Configuring the Network Connector server

Activating and testing the Network Connector

Network Connector disconnecting?

SSTP

Remote Desktop applications

Remote Desktop RDG templates

Remote Desktop—predefined and user defined

Remote Desktop considerations

File Access

Preparing to Publish File Access

Configuring File Access Domains, Servers, and Shares

Using File Access

More fun with File Access

Summary

6. Authenticating and Controlling Access

UAG session and authentication concepts

The basic authentication flow

Trunk level authentication settings

Authentication servers

RADIUS

RSA SecurID

WinHTTP

Authentication server of the type "Other"

Smart card/client certificate authentication

Special handling for MS Office Rich Clients

Application level authentication settings

Handling form based authentication to backend applications

Kerberos constrained delegation

Application authorization settings

Local groups

AD FS 2.0

Requirements and limitations for AD FS 2.0 in UAG

Configuring the AD FS 2.0 authentication server in UAG

Additional configuration steps on the AD FS 2.0 server

Summary

7. Configuring UAG Clients

What are the client components?

Endpoint detection

SSL Application Tunneling component

Socket Forwarding

SSL Network Tunneling component

Endpoint Session Cleanup component

Supported platforms

Installing and uninstalling the client components

Preemptive installation of the components

Checking the client components version

The trusted sites list

Don't need the Client components?

Summary

8. Endpoint Policies

What endpoint policies can do and how they work?

How it works?

Endpoint policies access type

Platform specific policies

Assigning endpoint policies

Built-in policies

Choosing or designing the appropriate policies for your organization

Creating policies using the policy editor

Editing policies in script mode

Configuring upload and download settings

Identify by URL

Identify by extension

Identify by size

Configuring restricted zone settings

Certified Endpoints

Integration with Network Access Protection

How does NAP work?

Configuring UAG to use NAP

Summary

9. Server Maintenance and Upkeep

Who needs monitoring?

The UAG activation monitor

The UAG Web Monitor

Monitoring sessions

General

Applications

Endpoint Information

Parameters

Session Statistics

Monitoring applications and users

Monitoring server farms

Monitoring server array members

Event Viewer

Event Query

Configuring UAG event logging

Queue and report size

Built-in

RADIUS and Syslog

Mail

UAG services

UAG and the System Event Log

Publishing the UAG Web Monitor

Live Monitoring using TMG

The Windows Performance Monitor

Running a server trace

Updating the server with Windows Updates

Updating the server with UAG updates

Other updates

Antivirus on the server and other tools

Backing up UAG

Restoring UAG (to itself, and to other servers)

Summary

10. Advanced Configuration

Basic trunk configuration

Advanced configuration overview

The General tab

The Authentication tab

The Session tab

The Application Customization tab

The Portal tab

The URL Inspection tab

Global URL Settings and URL Set tabs

Rule editing and modification

NLB and Arrays

Adding load balancing into the mix

Putting it all together

Summary

11. DirectAccess

What's in it for me?

A little bit of history

How does DirectAccess work?

IPSec and its tunnels

IPv6—what's the big deal?

Hardware considerations

Connecting your server to the Internet

The Network Location Server

More infrastructure considerations

Client connection modes

Setting up the IP-HTTPS public site

DirectAccess name resolution

ISATAP, DNS64, and NAT64

Tunneling mode

DirectAccess Connectivity Assistant

Putting it all together

Wizard Rime

Client and GPO configuration

The DirectAccess Connectivity Assistant

DirectAccess Server configuration

Infrastructure Servers configuration

End-to-End Access configuration

Keeping an eye on the server

Trouble?

Removing DirectAccess

Setup and configuration errors

Whose fault is it?

DCA to the rescue

Server related issues

Client side issues

Transition technology issues

Advanced troubleshooting

Additional resources

Summary

12. Troubleshooting

Whodunnit?

Administrative errors

File Access

SSL Network Tunneling

Certificate problems during activation

Backup and restore

Updating the server

Portal and Trunk issues

Application issues

Common application publishing mishaps

Blocking uploads and downloads

URL limits

Server Performance

Other optimizations

SharePoint issues

SSL tunneling

SSTP

Other server and application issues

Client issues

Client misbehavior

RDS client issues

Misc client issues

Customization issues

General errors

Tracing problems

What's next?

Summary

A. Introduction to RegEx RegEx

Why do I need this?

What are Regular Expressions?

The UAG RegEx RegEx syntax

Literals

Special characters

B. Introduction to ASP

What is ASP, and how does it work?

What can you do with it?

Getting started with ASP

Putting the pieces together

Some more ASP principles

No one likes to repeat himself

So, what's in it for me?

Index

累计评论(0条) 0个书友正在讨论这本书 发表评论

发表评论

发表评论,分享你的想法吧!

买过这本书的人还买过

读了这本书的人还在读

回顶部