top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Mastering Microsoft Forefront UAG 2010 customization [[electronic resource] ] : discover the secrets to extending and customizing Microsoft Forefront Unified Access Gateway : [professional expertise distilled] / / Erez Ben-Ari, Rainier Amara
Mastering Microsoft Forefront UAG 2010 customization [[electronic resource] ] : discover the secrets to extending and customizing Microsoft Forefront Unified Access Gateway : [professional expertise distilled] / / Erez Ben-Ari, Rainier Amara
Autore Ben-Ari Erez
Pubbl/distr/stampa Olton Birmingham [England], : Packt Pub., 2012
Descrizione fisica 1 online resource (186 p.)
Disciplina 005.8
Altri autori (Persone) AmaraRainier
Soggetto topico Microsoft software
Soggetto genere / forma Electronic books.
ISBN 1-280-11899-7
9786613523273
1-84968-539-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; What this book covers; What you need for this book; Who this book is for; Conventions; Reader feedback; Customer support; Chapter 1: Customization Building Blocks; Introduction to UAG and how it works; The UAG detection, login, and authentication flow; Fetching pages from applications; Single Sign On; Host Address Translation (HAT); Customization and supportability; The CustomUpdate mechanism; HTML, CSS, JavaScript, ASP, and ASP.NET; Other web technologies
Reading, editing, and debugging ASP codeA word about security; Further reading; Summary; Chapter 2: Customizing UAG's Look and Feel; Honey, I wouldn't change a thing!; The UI pages; Customizing the login and admin pages; Customizing the portal; Portal application icons; Changing texts; Adding a user interface language; Another tip for text changing; Portal selection for clients; Summary; Chapter 3: Customizing Endpoint Detection and Policies; How does endpoint detection work?; Things you can do with custom detection scripts; Creating and placing a custom detection script
Custom detection script tipsIntegrating custom detection with endpoint policies; Troubleshooting and debugging detection scripts; Endpoint detection in the real world; Summary; Chapter 4: The Application Wrapper and SRA; What content alteration can do for you; The Application Wrapper and SRA configuration files; How the AppWrap and SRA engines work; Having your own way; AppWrap syntax; More fun with AppWrap; SRA syntax; Summary; Chapter 5: Creating Custom Application Templates; Building SSL-VPN templates; Creating your own templates; Template customizations and enhancements
More parameters used in the templateWizardDefault; SSL-VPN specific settings and configuration; Tying in to the SSL-VPN template list; Summary; Chapter 6: Custom Certificate Authentication; Certificate authentication concepts and terminologies; UAG and certificate authentication; Understanding the pieces of cert authentication for UAG; Login.inc; Validate.inc; Repository.inc; Certificate authentication with KCD; Troubleshooting certificate authentication; Summary; Chapter 7: Custom Authentication Repositories; How does custom authentication work?; Verifying usernames
Working with an SQL databaseMore elaborate code; Testing and debugging your code; Putting it all together; Summary; Chapter 8: Extending the Login Process with Customization; The UAG authentication flow; Creating a Post Post Validate file; Integrating your own code and interacting with UAG's COM object; Putting data into the session; Adding parameters; Sending data to the backend server; More ideas; Summary; Chapter 9: Customizing Endpoint Components; Controlling component deployment; Adding links to the portal for the client installation; Customizing SSTP; Summary
Chapter 10: Additional Customizations
Record Nr. UNINA-9910461212103321
Ben-Ari Erez  
Olton Birmingham [England], : Packt Pub., 2012
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Mastering Microsoft Forefront UAG 2010 customization [[electronic resource] ] : discover the secrets to extending and customizing Microsoft Forefront Unified Access Gateway : [professional expertise distilled] / / Erez Ben-Ari, Rainier Amara
Mastering Microsoft Forefront UAG 2010 customization [[electronic resource] ] : discover the secrets to extending and customizing Microsoft Forefront Unified Access Gateway : [professional expertise distilled] / / Erez Ben-Ari, Rainier Amara
Autore Ben-Ari Erez
Pubbl/distr/stampa Olton Birmingham [England], : Packt Pub., 2012
Descrizione fisica 1 online resource (186 p.)
Disciplina 005.8
Altri autori (Persone) AmaraRainier
Soggetto topico Microsoft software
ISBN 1-280-11899-7
9786613523273
1-84968-539-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; What this book covers; What you need for this book; Who this book is for; Conventions; Reader feedback; Customer support; Chapter 1: Customization Building Blocks; Introduction to UAG and how it works; The UAG detection, login, and authentication flow; Fetching pages from applications; Single Sign On; Host Address Translation (HAT); Customization and supportability; The CustomUpdate mechanism; HTML, CSS, JavaScript, ASP, and ASP.NET; Other web technologies
Reading, editing, and debugging ASP codeA word about security; Further reading; Summary; Chapter 2: Customizing UAG's Look and Feel; Honey, I wouldn't change a thing!; The UI pages; Customizing the login and admin pages; Customizing the portal; Portal application icons; Changing texts; Adding a user interface language; Another tip for text changing; Portal selection for clients; Summary; Chapter 3: Customizing Endpoint Detection and Policies; How does endpoint detection work?; Things you can do with custom detection scripts; Creating and placing a custom detection script
Custom detection script tipsIntegrating custom detection with endpoint policies; Troubleshooting and debugging detection scripts; Endpoint detection in the real world; Summary; Chapter 4: The Application Wrapper and SRA; What content alteration can do for you; The Application Wrapper and SRA configuration files; How the AppWrap and SRA engines work; Having your own way; AppWrap syntax; More fun with AppWrap; SRA syntax; Summary; Chapter 5: Creating Custom Application Templates; Building SSL-VPN templates; Creating your own templates; Template customizations and enhancements
More parameters used in the templateWizardDefault; SSL-VPN specific settings and configuration; Tying in to the SSL-VPN template list; Summary; Chapter 6: Custom Certificate Authentication; Certificate authentication concepts and terminologies; UAG and certificate authentication; Understanding the pieces of cert authentication for UAG; Login.inc; Validate.inc; Repository.inc; Certificate authentication with KCD; Troubleshooting certificate authentication; Summary; Chapter 7: Custom Authentication Repositories; How does custom authentication work?; Verifying usernames
Working with an SQL databaseMore elaborate code; Testing and debugging your code; Putting it all together; Summary; Chapter 8: Extending the Login Process with Customization; The UAG authentication flow; Creating a Post Post Validate file; Integrating your own code and interacting with UAG's COM object; Putting data into the session; Adding parameters; Sending data to the backend server; More ideas; Summary; Chapter 9: Customizing Endpoint Components; Controlling component deployment; Adding links to the portal for the client installation; Customizing SSTP; Summary
Chapter 10: Additional Customizations
Record Nr. UNINA-9910790193603321
Ben-Ari Erez  
Olton Birmingham [England], : Packt Pub., 2012
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Mastering Microsoft Forefront UAG 2010 customization : discover the secrets to extending and customizing Microsoft Forefront Unified Access Gateway : [professional expertise distilled] / / Erez Ben-Ari, Rainier Amara
Mastering Microsoft Forefront UAG 2010 customization : discover the secrets to extending and customizing Microsoft Forefront Unified Access Gateway : [professional expertise distilled] / / Erez Ben-Ari, Rainier Amara
Autore Ben-Ari Erez
Edizione [1st ed.]
Pubbl/distr/stampa Olton Birmingham [England], : Packt Pub., 2012
Descrizione fisica 1 online resource (186 p.)
Disciplina 005.8
Altri autori (Persone) AmaraRainier
Soggetto topico Microsoft software
ISBN 1-280-11899-7
9786613523273
1-84968-539-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; What this book covers; What you need for this book; Who this book is for; Conventions; Reader feedback; Customer support; Chapter 1: Customization Building Blocks; Introduction to UAG and how it works; The UAG detection, login, and authentication flow; Fetching pages from applications; Single Sign On; Host Address Translation (HAT); Customization and supportability; The CustomUpdate mechanism; HTML, CSS, JavaScript, ASP, and ASP.NET; Other web technologies
Reading, editing, and debugging ASP codeA word about security; Further reading; Summary; Chapter 2: Customizing UAG's Look and Feel; Honey, I wouldn't change a thing!; The UI pages; Customizing the login and admin pages; Customizing the portal; Portal application icons; Changing texts; Adding a user interface language; Another tip for text changing; Portal selection for clients; Summary; Chapter 3: Customizing Endpoint Detection and Policies; How does endpoint detection work?; Things you can do with custom detection scripts; Creating and placing a custom detection script
Custom detection script tipsIntegrating custom detection with endpoint policies; Troubleshooting and debugging detection scripts; Endpoint detection in the real world; Summary; Chapter 4: The Application Wrapper and SRA; What content alteration can do for you; The Application Wrapper and SRA configuration files; How the AppWrap and SRA engines work; Having your own way; AppWrap syntax; More fun with AppWrap; SRA syntax; Summary; Chapter 5: Creating Custom Application Templates; Building SSL-VPN templates; Creating your own templates; Template customizations and enhancements
More parameters used in the templateWizardDefault; SSL-VPN specific settings and configuration; Tying in to the SSL-VPN template list; Summary; Chapter 6: Custom Certificate Authentication; Certificate authentication concepts and terminologies; UAG and certificate authentication; Understanding the pieces of cert authentication for UAG; Login.inc; Validate.inc; Repository.inc; Certificate authentication with KCD; Troubleshooting certificate authentication; Summary; Chapter 7: Custom Authentication Repositories; How does custom authentication work?; Verifying usernames
Working with an SQL databaseMore elaborate code; Testing and debugging your code; Putting it all together; Summary; Chapter 8: Extending the Login Process with Customization; The UAG authentication flow; Creating a Post Post Validate file; Integrating your own code and interacting with UAG's COM object; Putting data into the session; Adding parameters; Sending data to the backend server; More ideas; Summary; Chapter 9: Customizing Endpoint Components; Controlling component deployment; Adding links to the portal for the client installation; Customizing SSTP; Summary
Chapter 10: Additional Customizations
Record Nr. UNINA-9910817174403321
Ben-Ari Erez  
Olton Birmingham [England], : Packt Pub., 2012
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Microsoft Forefront UAG 2010 administrator's handbook [[electronic resource] ] : take full command of Microsoft Forefront Unified Access Gateway to secure your business applications and provide dynamic remote access with DirectAccess / / Erez Ben-Ari, Ran Dolev
Microsoft Forefront UAG 2010 administrator's handbook [[electronic resource] ] : take full command of Microsoft Forefront Unified Access Gateway to secure your business applications and provide dynamic remote access with DirectAccess / / Erez Ben-Ari, Ran Dolev
Autore Ben-Ari Erez
Pubbl/distr/stampa Olton, Birmingham, : Packt Pub. Ltd., 2011
Descrizione fisica 1 online resource (484 p.)
Disciplina 005.8
Altri autori (Persone) DolevRan
Soggetto topico Computer security
Computer networks - Security measures
Soggetto genere / forma Electronic books.
ISBN 1-280-23767-8
9786613545886
1-84968-163-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Planning Your Deployment; Basic principles; How UAG works; Software requirements; Hardware requirements; Considerations for placing the server; Planning the networking infrastructure; Domain membership; Planning remote connectivity; Load balancing and high availability; Choosing clients; From test to production; Tips for a successful deployment; Deployment checklist; Dos and Don'ts for a successful deployment; Summary; Chapter 2: Installing UAG
What the installation contains Service Packs and updates; Preparing your server; Pre-installation checklist; Preparing the installation files; Installation; Verifying the installation; Running the Getting Started Wizard; Applying updates or Service Packs; Common issues during installation ; Post-installation issues; Summary; Chapter 3: UAG Building Blocks; What are Trunks and Applications?; Types of trunks; Types of applications; Built-in services; Web Applications; Client/Server and Legacy; Browser-embedded applications; Terminal Services (TS) / Remote Desktop Services (RDS)
What is URL signing and how does it work?Designing your trunks, applications, and nesting; Some common applications and the appropriate templates; DNS name resolution; Preparing for an HTTPS trunk; Asymmetric encryption; Digital certificates; Creating an HTTPS trunk; Publishing an HTTP trunk; What happens when you add a trunk?; Summary; Chapter 4: Publishing Web Applications; The four steps to application publishing; Application specific hostname applications versus Portal hostname applications; The Add Application Wizard; Application order; Considerations for Exchange publishing
Considerations for Share Point publishing Different internal and external names; Same internal and external FQDN names but different protocols; Same internal and external names and protocols; Share point and IE security enhancements; What is the Active Directory Federation Services 2.0 application?; Certificate validation for published web servers; Did you remember to activate?; Summary; Chapter 5: Advanced Applications and Services; Advanced application types; Remote connectivity; Configuring browser embedded applications; Configuring client/server applications
Enhanced Generic Client Applications Enhanced HAT; Generic HTTP Proxy Enabled Client Application; Generic SOCKS Enabled Client Application; Citrix Program Neighborhood (Direct); Outlook (corporate/workgroup mode); SSL Application Tunneling component automatic disconnection; Local Drive Mapping; Remote Network Access; SSL Network Tunneling (Network Connector); Planning for Network Connector; Adding Network Connector to the portal; Configuring the Network Connector server; Activating and testing the Network Connector; Network Connector disconnecting?; SSTP; Remote Desktop applications
Remote Desktop RDG templates
Record Nr. UNINA-9910458850503321
Ben-Ari Erez  
Olton, Birmingham, : Packt Pub. Ltd., 2011
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Microsoft Forefront UAG 2010 administrator's handbook [[electronic resource] ] : take full command of Microsoft Forefront Unified Access Gateway to secure your business applications and provide dynamic remote access with DirectAccess / / Erez Ben-Ari, Ran Dolev
Microsoft Forefront UAG 2010 administrator's handbook [[electronic resource] ] : take full command of Microsoft Forefront Unified Access Gateway to secure your business applications and provide dynamic remote access with DirectAccess / / Erez Ben-Ari, Ran Dolev
Autore Ben-Ari Erez
Pubbl/distr/stampa Olton, Birmingham, : Packt Pub. Ltd., 2011
Descrizione fisica 1 online resource (484 p.)
Disciplina 005.8
Altri autori (Persone) DolevRan
Soggetto topico Computer security
Computer networks - Security measures
ISBN 1-280-23767-8
9786613545886
1-84968-163-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Planning Your Deployment; Basic principles; How UAG works; Software requirements; Hardware requirements; Considerations for placing the server; Planning the networking infrastructure; Domain membership; Planning remote connectivity; Load balancing and high availability; Choosing clients; From test to production; Tips for a successful deployment; Deployment checklist; Dos and Don'ts for a successful deployment; Summary; Chapter 2: Installing UAG
What the installation contains Service Packs and updates; Preparing your server; Pre-installation checklist; Preparing the installation files; Installation; Verifying the installation; Running the Getting Started Wizard; Applying updates or Service Packs; Common issues during installation ; Post-installation issues; Summary; Chapter 3: UAG Building Blocks; What are Trunks and Applications?; Types of trunks; Types of applications; Built-in services; Web Applications; Client/Server and Legacy; Browser-embedded applications; Terminal Services (TS) / Remote Desktop Services (RDS)
What is URL signing and how does it work?Designing your trunks, applications, and nesting; Some common applications and the appropriate templates; DNS name resolution; Preparing for an HTTPS trunk; Asymmetric encryption; Digital certificates; Creating an HTTPS trunk; Publishing an HTTP trunk; What happens when you add a trunk?; Summary; Chapter 4: Publishing Web Applications; The four steps to application publishing; Application specific hostname applications versus Portal hostname applications; The Add Application Wizard; Application order; Considerations for Exchange publishing
Considerations for Share Point publishing Different internal and external names; Same internal and external FQDN names but different protocols; Same internal and external names and protocols; Share point and IE security enhancements; What is the Active Directory Federation Services 2.0 application?; Certificate validation for published web servers; Did you remember to activate?; Summary; Chapter 5: Advanced Applications and Services; Advanced application types; Remote connectivity; Configuring browser embedded applications; Configuring client/server applications
Enhanced Generic Client Applications Enhanced HAT; Generic HTTP Proxy Enabled Client Application; Generic SOCKS Enabled Client Application; Citrix Program Neighborhood (Direct); Outlook (corporate/workgroup mode); SSL Application Tunneling component automatic disconnection; Local Drive Mapping; Remote Network Access; SSL Network Tunneling (Network Connector); Planning for Network Connector; Adding Network Connector to the portal; Configuring the Network Connector server; Activating and testing the Network Connector; Network Connector disconnecting?; SSTP; Remote Desktop applications
Remote Desktop RDG templates
Record Nr. UNINA-9910791689703321
Ben-Ari Erez  
Olton, Birmingham, : Packt Pub. Ltd., 2011
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Microsoft Forefront UAG 2010 administrator's handbook : take full command of Microsoft Forefront Unified Access Gateway to secure your business applications and provide dynamic remote access with DirectAccess / / Erez Ben-Ari, Ran Dolev
Microsoft Forefront UAG 2010 administrator's handbook : take full command of Microsoft Forefront Unified Access Gateway to secure your business applications and provide dynamic remote access with DirectAccess / / Erez Ben-Ari, Ran Dolev
Autore Ben-Ari Erez
Edizione [1st ed.]
Pubbl/distr/stampa Olton, Birmingham, : Packt Pub. Ltd., 2011
Descrizione fisica 1 online resource (484 p.)
Disciplina 005.8
Altri autori (Persone) DolevRan
Soggetto topico Computer security
Computer networks - Security measures
ISBN 1-280-23767-8
9786613545886
1-84968-163-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Planning Your Deployment; Basic principles; How UAG works; Software requirements; Hardware requirements; Considerations for placing the server; Planning the networking infrastructure; Domain membership; Planning remote connectivity; Load balancing and high availability; Choosing clients; From test to production; Tips for a successful deployment; Deployment checklist; Dos and Don'ts for a successful deployment; Summary; Chapter 2: Installing UAG
What the installation contains Service Packs and updates; Preparing your server; Pre-installation checklist; Preparing the installation files; Installation; Verifying the installation; Running the Getting Started Wizard; Applying updates or Service Packs; Common issues during installation ; Post-installation issues; Summary; Chapter 3: UAG Building Blocks; What are Trunks and Applications?; Types of trunks; Types of applications; Built-in services; Web Applications; Client/Server and Legacy; Browser-embedded applications; Terminal Services (TS) / Remote Desktop Services (RDS)
What is URL signing and how does it work?Designing your trunks, applications, and nesting; Some common applications and the appropriate templates; DNS name resolution; Preparing for an HTTPS trunk; Asymmetric encryption; Digital certificates; Creating an HTTPS trunk; Publishing an HTTP trunk; What happens when you add a trunk?; Summary; Chapter 4: Publishing Web Applications; The four steps to application publishing; Application specific hostname applications versus Portal hostname applications; The Add Application Wizard; Application order; Considerations for Exchange publishing
Considerations for Share Point publishing Different internal and external names; Same internal and external FQDN names but different protocols; Same internal and external names and protocols; Share point and IE security enhancements; What is the Active Directory Federation Services 2.0 application?; Certificate validation for published web servers; Did you remember to activate?; Summary; Chapter 5: Advanced Applications and Services; Advanced application types; Remote connectivity; Configuring browser embedded applications; Configuring client/server applications
Enhanced Generic Client Applications Enhanced HAT; Generic HTTP Proxy Enabled Client Application; Generic SOCKS Enabled Client Application; Citrix Program Neighborhood (Direct); Outlook (corporate/workgroup mode); SSL Application Tunneling component automatic disconnection; Local Drive Mapping; Remote Network Access; SSL Network Tunneling (Network Connector); Planning for Network Connector; Adding Network Connector to the portal; Configuring the Network Connector server; Activating and testing the Network Connector; Network Connector disconnecting?; SSTP; Remote Desktop applications
Remote Desktop RDG templates
Record Nr. UNINA-9910814523703321
Ben-Ari Erez  
Olton, Birmingham, : Packt Pub. Ltd., 2011
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Windows Server 2012 unified remote access planning and deployment [[electronic resource] ] : discover how to seamlessly plan and deploy remote access with Windows Server 2012's successor to DirectAccess / / Erez Ben-Ari, Bala Natarajan
Windows Server 2012 unified remote access planning and deployment [[electronic resource] ] : discover how to seamlessly plan and deploy remote access with Windows Server 2012's successor to DirectAccess / / Erez Ben-Ari, Bala Natarajan
Autore Ben-Ari Erez
Pubbl/distr/stampa Birmingham, UK, : Packt Pub., 2012
Descrizione fisica 1 online resource (328 p.)
Disciplina 005.446
005.7/13769
Altri autori (Persone) NatarajanBala
Soggetto topico Windows (Computer programs)
Computer network resources
Soggetto genere / forma Electronic books.
ISBN 1-283-93805-7
1-84968-829-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1:Understanding IPv6 and IPv4-IPv6 interoperability; My network's fine, so if it ain't broken, why fix it?; The IPv6 addressing schemes; IPv6 address assignment; IPv6 and name resolution; A little more about DNS; Multiple stacks; Operating system compatibility; Protocol transition technologies; ISATAP; DNS64 and NAT64; 6to4; Teredo; IP-HTTPS; Practical considerations for IPv6 and IPv4; Unified Remote Access and Group Policy; Public Key Infrastructure (PKI); Summary
Chapter 2:Planning a Unified Remote Access DeploymentServer requirements and placement; Capacity planning for URA; Low-end server; High-end server; Server requirements - considerations; Basic scenarios; Network Location Server; URA certificates; Basic scenario considerations; PKI; PKI considerations; Group Policy; Client platforms (and unsupported clients); Additional client considerations; Cloud scenarios; Advanced scenarios; NAP; OTP; Arrays; How arrays work with load balancing; Array challenges; Multi-geographic distribution; Forced tunneling; How much can my server handle?; Summary
Chapter 3:Preparing a Group Policy and Certificate InfrastructureDeploying GPO in an organization; Group Policy Management; Group policy and the registry; Linking, scoping, and filtering policies; Policy replication; Manual updates; New features with Windows Server 2012 and Windows 8 Group Policy; Planning group membership for URA clients and servers; GPO management policies and authorities; Managing GPO on URA servers and clients; Protect your stuff; Basic GPO problems and troubleshooting; Some more insight into GPOs; Diagnosing and fixing group policy problems
Client specific group policy issuesIntroduction to certificates and PKI; Asymmetric encryption; Digital certificates; Authorities, roots, and the trust chain; Certificate revocation and expiration; Certificate intended purpose; Certificate validation; Certificates used by URA; Public versus private certificates; Enterprise Certificate Authority versus Standalone Certificate Authority; Root Certificate Authorities and Subordinate Certificate Authorities; Summary; Chapter 4:Installing and Configuring the Unified Remote Access Role; Adding the URA role; Configuring the basic URA scenario
Connecting and testing with a clientEditing the configuration; Remote client options; Full DirectAccess or just remote management; Enable force tunneling; Helpdesk e-mail address; Remote Access Server options; Topology; Public URL or IP that clients use to connect to the server; Certificate selection for the IP-HTTPS interface; Enable and configure use of computer certificate; Enable Network Access Protection (NAP); Infrastructure Servers options; Selection of a local NLS on the URA server, or point to a separate server; Certificate selection for a local NLS
Configuration of the Name Resolution Policy Table (NRPT)
Record Nr. UNINA-9910462467403321
Ben-Ari Erez  
Birmingham, UK, : Packt Pub., 2012
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Windows Server 2012 unified remote access planning and deployment [[electronic resource] ] : discover how to seamlessly plan and deploy remote access with Windows Server 2012's successor to DirectAccess / / Erez Ben-Ari, Bala Natarajan
Windows Server 2012 unified remote access planning and deployment [[electronic resource] ] : discover how to seamlessly plan and deploy remote access with Windows Server 2012's successor to DirectAccess / / Erez Ben-Ari, Bala Natarajan
Autore Ben-Ari Erez
Pubbl/distr/stampa Birmingham, UK, : Packt Pub., 2012
Descrizione fisica 1 online resource (328 p.)
Disciplina 005.446
005.7/13769
Altri autori (Persone) NatarajanBala
Soggetto topico Windows (Computer programs)
Computer network resources
ISBN 1-283-93805-7
1-84968-829-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1:Understanding IPv6 and IPv4-IPv6 interoperability; My network's fine, so if it ain't broken, why fix it?; The IPv6 addressing schemes; IPv6 address assignment; IPv6 and name resolution; A little more about DNS; Multiple stacks; Operating system compatibility; Protocol transition technologies; ISATAP; DNS64 and NAT64; 6to4; Teredo; IP-HTTPS; Practical considerations for IPv6 and IPv4; Unified Remote Access and Group Policy; Public Key Infrastructure (PKI); Summary
Chapter 2:Planning a Unified Remote Access DeploymentServer requirements and placement; Capacity planning for URA; Low-end server; High-end server; Server requirements - considerations; Basic scenarios; Network Location Server; URA certificates; Basic scenario considerations; PKI; PKI considerations; Group Policy; Client platforms (and unsupported clients); Additional client considerations; Cloud scenarios; Advanced scenarios; NAP; OTP; Arrays; How arrays work with load balancing; Array challenges; Multi-geographic distribution; Forced tunneling; How much can my server handle?; Summary
Chapter 3:Preparing a Group Policy and Certificate InfrastructureDeploying GPO in an organization; Group Policy Management; Group policy and the registry; Linking, scoping, and filtering policies; Policy replication; Manual updates; New features with Windows Server 2012 and Windows 8 Group Policy; Planning group membership for URA clients and servers; GPO management policies and authorities; Managing GPO on URA servers and clients; Protect your stuff; Basic GPO problems and troubleshooting; Some more insight into GPOs; Diagnosing and fixing group policy problems
Client specific group policy issuesIntroduction to certificates and PKI; Asymmetric encryption; Digital certificates; Authorities, roots, and the trust chain; Certificate revocation and expiration; Certificate intended purpose; Certificate validation; Certificates used by URA; Public versus private certificates; Enterprise Certificate Authority versus Standalone Certificate Authority; Root Certificate Authorities and Subordinate Certificate Authorities; Summary; Chapter 4:Installing and Configuring the Unified Remote Access Role; Adding the URA role; Configuring the basic URA scenario
Connecting and testing with a clientEditing the configuration; Remote client options; Full DirectAccess or just remote management; Enable force tunneling; Helpdesk e-mail address; Remote Access Server options; Topology; Public URL or IP that clients use to connect to the server; Certificate selection for the IP-HTTPS interface; Enable and configure use of computer certificate; Enable Network Access Protection (NAP); Infrastructure Servers options; Selection of a local NLS on the URA server, or point to a separate server; Certificate selection for a local NLS
Configuration of the Name Resolution Policy Table (NRPT)
Record Nr. UNINA-9910786096703321
Ben-Ari Erez  
Birmingham, UK, : Packt Pub., 2012
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Windows Server 2012 unified remote access planning and deployment : discover how to seamlessly plan and deploy remote access with Windows Server 2012's successor to DirectAccess / / Erez Ben-Ari, Bala Natarajan
Windows Server 2012 unified remote access planning and deployment : discover how to seamlessly plan and deploy remote access with Windows Server 2012's successor to DirectAccess / / Erez Ben-Ari, Bala Natarajan
Autore Ben-Ari Erez
Edizione [1st ed.]
Pubbl/distr/stampa Birmingham, UK, : Packt Pub., 2012
Descrizione fisica 1 online resource (328 p.)
Disciplina 005.446
005.7/13769
Altri autori (Persone) NatarajanBala
Soggetto topico Windows (Computer programs)
Computer network resources
ISBN 1-283-93805-7
1-84968-829-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1:Understanding IPv6 and IPv4-IPv6 interoperability; My network's fine, so if it ain't broken, why fix it?; The IPv6 addressing schemes; IPv6 address assignment; IPv6 and name resolution; A little more about DNS; Multiple stacks; Operating system compatibility; Protocol transition technologies; ISATAP; DNS64 and NAT64; 6to4; Teredo; IP-HTTPS; Practical considerations for IPv6 and IPv4; Unified Remote Access and Group Policy; Public Key Infrastructure (PKI); Summary
Chapter 2:Planning a Unified Remote Access DeploymentServer requirements and placement; Capacity planning for URA; Low-end server; High-end server; Server requirements - considerations; Basic scenarios; Network Location Server; URA certificates; Basic scenario considerations; PKI; PKI considerations; Group Policy; Client platforms (and unsupported clients); Additional client considerations; Cloud scenarios; Advanced scenarios; NAP; OTP; Arrays; How arrays work with load balancing; Array challenges; Multi-geographic distribution; Forced tunneling; How much can my server handle?; Summary
Chapter 3:Preparing a Group Policy and Certificate InfrastructureDeploying GPO in an organization; Group Policy Management; Group policy and the registry; Linking, scoping, and filtering policies; Policy replication; Manual updates; New features with Windows Server 2012 and Windows 8 Group Policy; Planning group membership for URA clients and servers; GPO management policies and authorities; Managing GPO on URA servers and clients; Protect your stuff; Basic GPO problems and troubleshooting; Some more insight into GPOs; Diagnosing and fixing group policy problems
Client specific group policy issuesIntroduction to certificates and PKI; Asymmetric encryption; Digital certificates; Authorities, roots, and the trust chain; Certificate revocation and expiration; Certificate intended purpose; Certificate validation; Certificates used by URA; Public versus private certificates; Enterprise Certificate Authority versus Standalone Certificate Authority; Root Certificate Authorities and Subordinate Certificate Authorities; Summary; Chapter 4:Installing and Configuring the Unified Remote Access Role; Adding the URA role; Configuring the basic URA scenario
Connecting and testing with a clientEditing the configuration; Remote client options; Full DirectAccess or just remote management; Enable force tunneling; Helpdesk e-mail address; Remote Access Server options; Topology; Public URL or IP that clients use to connect to the server; Certificate selection for the IP-HTTPS interface; Enable and configure use of computer certificate; Enable Network Access Protection (NAP); Infrastructure Servers options; Selection of a local NLS on the URA server, or point to a separate server; Certificate selection for a local NLS
Configuration of the Name Resolution Policy Table (NRPT)
Record Nr. UNINA-9910823486203321
Ben-Ari Erez  
Birmingham, UK, : Packt Pub., 2012
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui