安全与速度的完美结合课件.ppt
《安全与速度的完美结合课件.ppt》由会员分享,可在线阅读,更多相关《安全与速度的完美结合课件.ppt(86页珍藏版)》请在三一办公上搜索。
1、郝雪莹Microsoft China,安全与速度的完美结合,Microsoft Internet Security and Acceleration Server 2000,2,Agenda,产品概述布署场景防火墙缓存管理可扩展性,3,新的机遇, 新的挑战,用网络连接你的客户,合作伙伴与雇员,在WEB上的电子商务给你的企业带来了新的商机,把有限资源的内部网变成溶合在 Internet的网络,把网络暴露在所有的黑客,病毒和非法用户面前,竞争非常激烈,你的WEB必需提供快速可靠的服务,管理这样的网络需要更高的技术,机遇,挑战,4,The Connected Business,New Concern
2、s保护你的内部网络免受黑客与其它非法入侵者的侵害管理与控制网络访问在加快网络访问速度的同时保护宝贵的带宽资源,5,微软公司对于安全的认识,安全缺陷和病毒攻击是严重、代价沉重、全行业业范围的问题Internet 安全是全世界范围内实现数字化商务运作的最基本的考虑因素作为业界的领导者,微软公司具有保护Internet和客户数据的特殊责任,6,Microsoft ISA Server 2000安全与速度的完美结合,用可伸缩的,多层次的防火墙保护网络环境,用可伸缩,高性能的WEB缓存实现快速访问,与Windows 2000集成的,强壮的策略和管理机制,安全的网络连接,快速的 Web 访问,统一的管理方
3、式,可扩展的开放平台,可以扩展与定制的高级平台,7,什么是 ISA Server 2000,防火墙与缓存ISA Server 的版本ISA Server 标准版ISA Server 企业版,8,Microsoft ISA Server 2000标准版与企业版功能比较表,9,What Is ISA Server 2000 ISA 系统需求,10,防火墙 & 缓存,两者都应存在于网络的边缘或者说结合点模块化安装统一的管理MMCLogging and ReportingMonitoring and Alerting一致的访问策略低廉的培训维护费用,11,与 Windows 2000 紧密集成,Sec
4、urity包过滤网络地址转换 (NAT & SecureNAT)AuthenticationSystem Hardening虚拟专用网 (VPN)管理MMCTerminal ServicesEvent logActive Directory Array configuration and policy data NOT required!带宽控制透明地支持在其它平台上的客户机与服务器,12,Much More Than “Proxy Server 3.0”,Transparency for all clients and serversEnterprise policyGroup policy
5、SchedulesActive Directory integrationExtensible application filtersSMTP filterStreaming media splittingH.323 filter & GatekeeperMMC-based UITask Pads, wizardsRemote administrationConfiguring Exchange server behind firewall,IIS separationRAM cachingNew cache storeScheduled content downloadVPN integra
6、tionIntrusion detectionSystem hardeningNTLM & Kerberos authenticationDual-hop SSLCustomizable alertsLogging: W3C format, selectable fieldsIntegrated reportingBandwidth controlNew APIsModular installation,Deployment Scenarios,Microsoft Internet Security & Acceleration Server 2000,14,Small Organizatio
7、n,Internet,ISA Server,15,Large Enterprise,Internet,ISA Server防火墙 & 缓存,共同管理,16,DMZ & Secure Publishing,Internet,ISA #2,ISA #1,DMZ #1,Intranet,17,Chaining,ISA Server,ISA Server Array,Leased line orVPN connection,Branch,Main,Internet,Firewall,用可伸缩,多层次防火墙保护网络环境,19,为什么要使用防火墙?,保护自己不受黑客,病毒与非法用户的攻击控制向外的 Int
8、ernet访问保护 web servers and email servers更加安全的数据访问 保护关键的数据与信息- 并且 - 管理信息访问,20,ISA Server Firewall,Packet, circuit, and application-level traffic screeningStateful inspection examines traffic in its contextReduce risk of unauthorized accessAnalyze or modify content with “Smart” application filtersInteg
9、rated intrusion detectionBased on technology licensed from Internet Security Systems (ISS) Secure publishingProtect servers accessible to the outside worldSystem hardening“Lock down” the operating system, further strengthening securityIntegrated with Windows 2000 VPNWizard for easy configuration,21,
10、多层次的防火墙,Bottom up protection at every levelPacket levelStatic filtersDynamic filtersIntrusion detectionCircuit (protocol) levelSession based filteringConnection associationApplication levelIntelligent payload inspection,Packetlevel,Applicationlevel,Circuitlevel,22,Smart Application Filters,Protocol
11、aware filtersAnalyze the trafficBlock, redirect, modifyIntelligent filtering out-of-the-box:HTTP: Web request cachingSMTP: Traffic filteringStreaming media: Stream splittingFTP: Read only restrictionH.323: NetMeeting through the firewall,23,Intrusion Detection,24,Additional Security Features,VPN int
12、egrationIntegrated with on Windows 2000 VPNWizard for easy configurationSystem hardening wizard“Lockdown” for the operating systemThree pre-defined levelsSecure publishingSSL BridgingEncrypted tunneling,25,ISA Server Microsofts Firewall ISA Server 特性,多层次的防火墙集中或分布式管理PublishingICSA certified,26,ISA Se
13、rver Microsofts Firewall How A Firewall Protects,A firewall filters network traffic that enters or leaves a protected network.Decisions:IP 地址,协议与端口号建立连接IP包的有效负载应用过滤AuthenticationLogging and Alerting,27,ISA Server Microsofts FirewallISA Server Architecture,28,ISA Server Microsofts FirewallOutgoing FW
14、 Traffic Flow,29,ISA Server Microsofts FirewallIncoming FW Traffic Flow,30,ISA Server Microsofts FirewallISA Server 缺省情况,No incoming or outgoing traffic unless specifically allowed除了以下情况: ISA Server 可以执行 DNS lookupsPinging from ISA Server,31,ISA Server Microsofts Firewall为 Outgoing Requests制定规则,Prot
15、ocol Rules谁可以使用什么样的协议在什么时间访问什么?Default: No accessSite and Content Rules谁可以在什么时间访问什么站点和内容?Default: All access对互联网访问时这两个规则都是必要的,32,ISA Server Microsofts Firewall为Incoming Requests制定规则,Server Publishing RulesRedirect traffic for an external address / port to an internal addressWeb Publishing RulesRedir
16、ect Web requests onlyCan redirect to multiple internal Web sitesCan choose port for redirectionCan perform SSL bridging,33,ISA Server Microsofts FirewallFirewall Planning,Assess needs for outgoing traffic“Deny all” or “Allow all”Research user requirementsDesign required rules and policy elementsPlan
17、 for authentication (if required)Assess needs for incoming traffic Inventory resources that need to be accessed from the Internet.Design the required rules and policy elements,34,ISA Server Microsofts FirewallFirewall Planning (continued),ScalingArraysNetwork Load Balancing (NLB)DNS round robinPerim
18、eter Network Requirements,35,Firewall Design No External Access Required,36,Firewall Design Screened Host,Internet,Internal Network,Firewall,Screened Host,37,Firewall Design Three-Homed PerimeterNetwork Design,Firewall,Internet,Internal Network,Perimeter Network,38,Firewall Design Back-to-Back Perim
19、eterNetwork Design,39,Using Publishing And RoutingMethods for Passing Network Traffic,Web Proxy ServiceFirewall Service (proxy)IP Routing (secured by packet filters),40,Using Publishing And RoutingComparing Publishing and Routing,Publishing Rules publish internal sites to the external networkLocal A
20、ddress Table (LAT) defines what is internal Perimeter Network in three-homed design is treated as external networkNeed to configure routing between two external networksRouting is secured by packet filters,41,Using Publishing And RoutingServer Publishing,Reverse Network Address Translation (NAT)Exte
21、rnal network to internal networkSends packets received on external network interface to identical port on internal serverMapping: each port on each external address can be mapped separatelyNormally used for non-Web servers,42,Using Publishing And RoutingWeb Publishing,Redirects requests for URLs rec
22、eived on external interfaceCan redirect to multiple Web sitesCan redirect to internal or external sites,43,Using Publishing And RoutingSecure Web Publishing,Client connection terminates at ISA Server computerISA Server can perform authenticationISA Server needs Web server certificateWhat about conne
23、ction between ISA Server and internal Web server?SSL bridgingChoice of HTTP-S, HTTP, or FTP,44,Using Publishing And RoutingRouting,Required for all protocols other than TCP or UDPRequired to access three-homed perimeter network (external to external)ISA enforces packet filtering with routingNote: pa
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 安全 速度 完美 结合 课件

链接地址:https://www.31ppt.com/p-1574391.html