更新时间:2021-04-09 22:33:51
封面
版权页
Credits
About the Authors
About the Reviewers
Support files eBooks discount offers and more
Preface
What you need for this book
Conventions
Reader feedback
Chapter 1. Planning Your Deployment
How UAG works
Software requirements
Hardware requirements
Considerations for placing the server
Planning the networking infrastructure
Domain membership
Planning remote connectivity
Load balancing and high availability
Choosing clients
From test to production
Tips for a successful deployment
Summary
Chapter 2. Installing UAG
Preparing your server
Installation
Post installation issues
Chapter 3. UAG Building Blocks
Types of trunks
Types of applications
What is URL signing and how does it work?
Designing your trunks applications and nesting
Some common applications and the appropriate templates
DNS name resolution
Preparing for an HTTPS trunk
Creating an HTTPS trunk
Publishing an HTTP trunk
What happens when you add a trunk?
Chapter 4. Publishing Web Applications
Application specific hostname applications versus Portal hostname applications
The Add Application Wizard
Application order
Considerations for Exchange publishing
Considerations for SharePoint publishing
Sharepoint and IE security enhancements
What is the Active Directory Federation Services 2.0 application?
Certificate validation for published web servers
Did you remember to activate?
Chapter 5. Advanced Applications and Services
Remote connectivity
Configuring browser embedded applications
Configuring client/server applications
Local Drive Mapping
Remote Network Access
SSL Network Tunneling (Network Connector)
SSTP
Remote Desktop applications
Remote Desktop RDG templates
Remote Desktop considerations
File Access
Chapter 6. Authenticating and Controlling Access
Trunk level authentication settings
Authentication servers
Application level authentication settings
Application authorization settings
AD FS 2.0
Chapter 7. Configuring UAG Clients
Supported platforms
Installing and uninstalling the client components
Preemptive installation of the components
Checking the client components version
The trusted sites list
Don't need the Client components?
Chapter 8. Endpoint Policies
Endpoint policies access type
Platform specific policies
Assigning endpoint policies
Built-in policies
Choosing or designing the appropriate policies for your organization
Creating policies using the policy editor
Editing policies in script mode
Configuring upload and download settings
Configuring restricted zone settings
Certified Endpoints
Integration with Network Access Protection
How does NAP work?
Configuring UAG to use NAP
Chapter 9. Server Maintenance and Upkeep
The UAG activation monitor
The UAG Web Monitor
Configuring UAG event logging
UAG services
UAG and the System Event Log