tailieunhanh - mcts training kit 70 - 648 transitioning your mcsa mcse to window server 2008 phần 3

Định tuyến và truy cập từ xa hiển thị các bảng định tuyến tĩnh (không bao gồm bất kỳ các tuyến đường năng động được thêm vào từ RIP). Bạn cài đặt Network Policy Cấu hình định tuyến tĩnh với định tuyến và truy cập từ xa Nếu quá trình phục hồi không thành công, bạn phải khởi động lại AD CS bằng tay. | Before You Begin To complete the lessons in this chapter you must have done the following Installed and configured the evaluation edition of Windows Server 2008 Enterprise Edition in accordance with the instructions listed in the Introduction. REAL WORLD Orin Thomas One of the biggest shifts in thinking that has gone on since I became an IT professional is the shift in thinking about the LAN as a protected network environment. When I started out firewalls were placed only at the border between a protected network environment and the Internet. Today s thinking is different in that it recognizes that the LAN is also potentially hostile to the health of systems. This shift of thinking is evident in the features shipped with Windows Vista and Windows Server 2008 namely the improved firewall and technologies such as Network Access Protection NAP . Despite our best intentions not every host that connects to the network we are responsible for managing is entirely under our control. Nothing is stopping a member of the sales team who has been overseas at trade shows for the past three months from connecting his or her laptop computer to the company network upon return. This is not problematic if the member of the sales team has ensured that antivirus protection antispyware and Windows Updates have been applied to that computer while he or she was away from the network. But what if when the laptop computer was away from an environment in which harmful Web content is automatically filtered by Microsoft Internet Security and Acceleration ISA Server 2006 that laptop became infected Without the technologies in Windows Server 2008 the act of connecting that computer to the LAN might activate a virulent worm. As IT professionals we always need to be able to shift our thinking. Today if we want to remain secure we must consider the local area network as potentially hostile as we consider the Internet. 166 CHAPTER 4 Network Access Security Lesson 1 Wireless Access In the past decade

TỪ KHÓA LIÊN QUAN