Microsoft Press transitioning your mcsa mcse to windows server 2008 2009 phần 3

Sau khi cài đặt Network Policy và vai trò máy chủ truy cập dịch vụ, bạn có thể xem các bảng định tuyến IP phải cách nhấn vào Roles \ Network Policy và AccessServices \ Routing và Remote Access \ IPv4 \ Tuyến đường tĩnh và sau đó chọn IP Hiển thị bảng định tuyến. Định tuyến và truy cập từ xa hiển thị các bảng định tuyến tĩnh | Before You Begin To complete the lessons in this chapter you must have done the following Installed and configured the evaluation edition of Windows Server 2008 Enterprise Edition in accordance with the instructions listed in the Introduction. REAL WORLD Orin Thomas One of the biggest shifts in thinking that has gone on since I became an IT professional is the shift in thinking about the LAN as a protected network environment. When I started out firewalls were placed only at the border between a protected network environment and the Internet. Today s thinking is different in that it recognizes that the LAN is also potentially hostile to the health of systems. This shift of thinking is evident in the features shipped with Windows Vista and Windows Server 2008 namely the improved firewall and technologies such as Network Access Protection NAP . Despite our best intentions not every host that connects to the network we are responsible for managing is entirely under our control. Nothing is stopping a member of the sales team who has been overseas at trade shows for the past three months from connecting his or her laptop computer to the company network upon return. This is not problematic if the member of the sales team has ensured that antivirus protection antispyware and Windows Updates have been applied to that computer while he or she was away from the network. But what if when the laptop computer was away from an environment in which harmful Web content is automatically filtered by Microsoft Internet Security and Acceleration ISA Server 2006 that laptop became infected Without the technologies in Windows Server 2008 the act of connecting that computer to the LAN might activate a virulent worm. As IT professionals we always need to be able to shift our thinking. Today if we want to remain secure we must consider the local area network as potentially hostile as we consider the Internet. 166 CHAPTER 4 Network Access Security Lesson 1 Wireless Access In the past decade

Không thể tạo bản xem trước, hãy bấm tải xuống
TỪ KHÓA LIÊN QUAN
TÀI LIỆU MỚI ĐĂNG
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.