LEADER 05224nam 2200733 a 450 001 9910973623803321 005 20240516184915.0 010 $a9786613545886 010 $a9781280237676 010 $a1280237678 010 $a9781849681636 010 $a1849681635 035 $a(CKB)2560000000052513 035 $a(EBL)948568 035 $a(OCoLC)797917822 035 $a(SSID)ssj0000527886 035 $a(PQKBManifestationID)12222566 035 $a(PQKBTitleCode)TC0000527886 035 $a(PQKBWorkID)10544789 035 $a(PQKB)11384695 035 $a(Au-PeEL)EBL948568 035 $a(CaPaEBR)ebr10445339 035 $a(CaONFJC)MIL354588 035 $a(PPN)228041996 035 $a(FR-PaCSA)88851793 035 $a(MiAaPQ)EBC948568 035 $a(FRCYB88851793)88851793 035 $a(DE-B1597)722147 035 $a(DE-B1597)9781849681636 035 $a(EXLCZ)992560000000052513 100 $a20110215d2011 uy 0 101 0 $aeng 135 $aurunu||||| 181 $ctxt 182 $cc 183 $acr 200 10$aMicrosoft Forefront UAG 2010 administrator's handbook $etake full command of Microsoft Forefront Unified Access Gateway to secure your business applications and provide dynamic remote access with DirectAccess /$fErez Ben-Ari, Ran Dolev 205 $a1st ed. 210 $aOlton, Birmingham $cPackt Pub. Ltd.$d2011 215 $a1 online resource (484 p.) 300 $aIncludes index. 311 08$a9781849681629 311 08$a1849681627 327 $aCover; Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Planning Your Deployment; Basic principles; How UAG works; Software requirements; Hardware requirements; Considerations for placing the server; Planning the networking infrastructure; Domain membership; Planning remote connectivity; Load balancing and high availability; Choosing clients; From test to production; Tips for a successful deployment; Deployment checklist; Dos and Don'ts for a successful deployment; Summary; Chapter 2: Installing UAG 327 $aWhat the installation contains Service Packs and updates; Preparing your server; Pre-installation checklist; Preparing the installation files; Installation; Verifying the installation; Running the Getting Started Wizard; Applying updates or Service Packs; Common issues during installation ; Post-installation issues; Summary; Chapter 3: UAG Building Blocks; What are Trunks and Applications?; Types of trunks; Types of applications; Built-in services; Web Applications; Client/Server and Legacy; Browser-embedded applications; Terminal Services (TS) / Remote Desktop Services (RDS) 327 $aWhat is URL signing and how does it work?Designing your trunks, applications, and nesting; Some common applications and the appropriate templates; DNS name resolution; Preparing for an HTTPS trunk; Asymmetric encryption; Digital certificates; Creating an HTTPS trunk; Publishing an HTTP trunk; What happens when you add a trunk?; Summary; Chapter 4: Publishing Web Applications; The four steps to application publishing; Application specific hostname applications versus Portal hostname applications; The Add Application Wizard; Application order; Considerations for Exchange publishing 327 $aConsiderations for Share Point publishing Different internal and external names; Same internal and external FQDN names but different protocols; Same internal and external names and protocols; Share point and IE security enhancements; What is the Active Directory Federation Services 2.0 application?; Certificate validation for published web servers; Did you remember to activate?; Summary; Chapter 5: Advanced Applications and Services; Advanced application types; Remote connectivity; Configuring browser embedded applications; Configuring client/server applications 327 $aEnhanced Generic Client Applications Enhanced HAT; Generic HTTP Proxy Enabled Client Application; Generic SOCKS Enabled Client Application; Citrix Program Neighborhood (Direct); Outlook (corporate/workgroup mode); SSL Application Tunneling component automatic disconnection; Local Drive Mapping; Remote Network Access; SSL Network Tunneling (Network Connector); Planning for Network Connector; Adding Network Connector to the portal; Configuring the Network Connector server; Activating and testing the Network Connector; Network Connector disconnecting?; SSTP; Remote Desktop applications 327 $aRemote Desktop RDG templates 330 $aTake full command of Microsoft Forefront Unified Access Gateway to secure your business applications and provide dynamic remote access with DirectAccess with this book and eBook 606 $aComputer security 606 $aComputer networks$xSecurity measures 615 0$aComputer security. 615 0$aComputer networks$xSecurity measures. 676 $a005.8 700 $aBen-Ari$b Erez$01795390 701 $aDolev$b Ran$01798228 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910973623803321 996 $aMicrosoft Forefront UAG 2010 administrator's handbook$94340880 997 $aUNINA