Home > Articles > Home & Office Computing > The Web/Virtual Worlds/Social Networking

  • Print
  • + Share This
This chapter is from the book

This chapter is from the book

Summary

The growth of Microsoft's Internet Security and Acceleration Server has corresponded with the increase in the types and quantities of threats faced by organizations on the Internet today. Fortunately for these organizations, the capabilities of ISA Server 2006 are many, and it has found a place in their security topology as a firewall, caching server, VPN device, reverse-proxy machine, RPC filter, and more.

ISA Server 2006's simple and eloquent design sits on top of a complex and capable security platform, capable of advanced Application-layer packet inspection, complex firewall rules, and multiple network support. Before deploying ISA, it is important to understand the specifics of what it can do and how to configure it. Consequently, the subsequent chapters of this book present detailed descriptions of ISA's capabilities, as well as step-by-step deployment scenarios, best practices, and tips to help organizations make the most out of an ISA Server investment.

  • + Share This
  • 🔖 Save To Your Account