ISA manual

zhaozj2021-02-16  62

ISA manual

-------------------------------------------------- ------------------------------

ISA complete name is Microsoft

Internet

Security

and

ACCELERATION

Server (Internet Security and Acceleration Server) is the next-generation product of Proxy2.0, which can be used well 2000 series products. Its and proxy's main difference is a great improvement in the function of firewall, so it is not Calling Internet

Security, integrated with the current firewall multi-function.

One,

Software and hardware configuration: Windows2000 AD, 256M memory, network card

two,

installation:

1.

Three modes:

(1)

Firewall mode: firewall

Mode

(2)

Cache mode: cache

Mode

(3)

Complete mode: integrated

Mode (add Web

Hosting

FunctionAlity)

2.

Stop IIS

Publishing

Service (W3SVC), Uninstall after installation

IIS or reconfigure IIS sites, do not use 80 and 8080 ports.

3.

Fill in the IP range (must contain the address of this unit)

three,

use:

1.

Monitoring:

(1)

Alerts: alarm

(2)

Services: Start and stop service

(3)

Sessions: conference

(4)

Reports: Report

2.

Computer: Display computer status

3.

ACCESS

Policy: Access Strategy

(1)

Site

and

Content

Rules: Site and Directory Rules

(2)

Protocol

Rules: Agreement Rules

(3)

IP

Packet

Filters: IP package filter

4.

Publishing: release

(1)

Web

Publishing

Rules: Site Publishing Rules

(2)

Server

Publishing

Rules: Server Publishing Rules

5.

Bandwidth

Rules: Bandwidth Restriction Rule

6.

Policy

Elements:

(1)

Schedules: Planning Tasks

(2)

Bandwidth

PRIORITIES: Bandwidth Priority

(3)

Destination

SETS: Target Address Settings

(4)

Client

Address

SETS: Customer Address Settings

(5)

Protocol

Definitions: protocol definition

(6)

Content

Groups: Content Group (7)

Dial-Up

ENTRIES: Dial-Dial Connection

7.

Cache

Configuration: set of cache

(1)

Schedules

Content

Download: Planned Task Download

(2)

Drivers: Disk size settings

8.

Monitoring

Configuration: Warning configuration

(1)

Alerts: alarm

(2)

Log: Day

(3)

Report

Jobs: report

9.

Extensions: Extended Features:

(1)

Application

Filters: Application filtering

(2)

Web

Filters: Web Filter

10.

NetWork

Configuration: Network configuration

(1)

Routing: routing

(2)

Local

Address

TABLE: List of local address

(3)

Local

Domain

TABLE: List of local domains

11.

Client

Configuration: Customer Configuration

(1)

Web

Browser: web browsing

(2)

Firewall

Client: Firewall Customer

four,

Corresponding service:

1.

Microsoft

FireWall:

FWSRV

2.

Microsoft

Server

CONTROL:

Isactrl

3.

Microsoft

Scheduled

Cache

Content

Download:

W3SCHDWN

4.

Microsoft

Web

Proxy:

W3Proxy

Among them, service 2 depends on 1, 3, 4

Fives,

Configuration strategy: (Take a few small examples)

1.

Secure

Your

ISA

Server

Computer: Customize your own solution

2.

Limit bandwidth: bandwidth- right-right-attribute

3.

From the case of using ISA, it seems that there is no bandwidth of each user directly, but can create some groups first, then set the bandwidth policy, then let these support to apply these policies, where the limit is achieved by priority, However, it is more perfect to use QoS to use.

4.

Close Ping (ICMP): IP

Packet

Filters - Name - Block

packet

Transmission-Predefine-ICMP

ping

Query-Default

IP

Address

for

Each

EXTERNAL

on

THE

ISA

Server

Computer-all

REMOTE

Computer- is done.

In addition, it can easily define protocol rules, package filtering rules, application filtering, site release rules, caches, etc., and finally, the function is still very powerful, and it is not one for example.

转载请注明原文地址:https://www.9cbs.com/read-24852.html

New Post(0)