tailieunhanh - Microsoft introducing windows server 2008 Resource Kit phần 6

Quá trình này, trong thế giới của PKI, được gọi là kiểm tra danh sách thu hồi Giấy chứng nhận (CRL). Việc xác minh thu hồi thiết lập cấu hình cho một đối tác tài khoản trên một máy chủ liên bang được sử dụng bởi các máy chủ liên bang để xác định làm thế nào xác minh thu hồi sẽ được thực hiện cho các thẻ được gửi cho đối tác tài khoản. | 234 Introducing Windows Server 2008 through TS Gateway it simply blocks them from accessing your internal terminal servers. In addition device redirection is blocked for remote clients connecting via TS Gateway though best practice is actually to block such redirection on your terminal servers and not on your TS Gateway . An alternative to placing your TS Gateway on the perimeter network is to put it on your corp-net that is behind your internal firewall. Then place an SSL terminator in your perimeter network to forward incoming RDP traffic securely to your TS Gateway. Either way you implement this however one advantage of this new feature is that you don t need to worry about using an SSL VPN any longer and all the headaches associated with getting this working properly. This integration with Network Access Protection NAP is an important aspect of TS Gateway because many mid- and large-sized organizations that will deploy Windows Server 2008 will probably do so because of NAP and also of course because of the many enhancements in Terminal Services on the new platform . We ll be covering NAP in Chapter 10 Implementing Network Access Protection. Before we go any further let s hear from one more of our experts From the Experts Better Together TS Gateway ISA Server and NAP Terminal Services-based remote access has long been used as a simpler lower-risk alternative to classical layer 2 VPN technologies. Whereas the layer 2 VPN has often provided all ports all protocols access to an organization s internal network the Terminal Services approach restricts connectivity to a single well-defined port and protocol. However as more and more capability has ascended the stack into RDP such as copy paste and drive redirection the potential attack vectors have risen as well. For example a remote drive made available over RDP can present the same kinds of security risks as one mapped over native CIFS SMB transports. With the advent of TS Gateway allowing workers to be productive .

TỪ KHÓA LIÊN QUAN
crossorigin="anonymous">
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.