List of Tables
Chapter 1: Evolution of a Firewall: From Proxy 1.0 to ISA 2004Table 1.1: The SD3 Security FrameworkTable 1.2: Whats New in ISA Server 2004Chapter 3: Stalking the Competition: How ISA 2004 Stacks Up
Table 3.1: PIX Model-by-Model Feature ComparisonTable 3.2: NetScreen Model-by-Model Feature ComparisonTable 3.3: SonicWall Model-by-Model Feature ComparisonTable 3.4: WatchGuard Model-by-Model Feature ComparisonTable 3.5: WatchGuard Model-by-Model VPN Support ComparisonTable 3.6: Symantec Firewall/VPN Product CategoriesTable 3.7: Symantec Small/Remote Office Firewall/VPN Model-by-Model ComparisonTable 3.8: Symantec Enterprise Gateway Appliance Model-by-Model ComparisonTable 3.9: Blue Coat SG Model-by-Model ComparisonTable 3.10: : ISA 2004 vs. Competing Firewall ProductsChapter 4: ISA 2004 Network Concepts and Preparing the Network Infrastructure
Table 4.1: Defense Rings Protecting Bank AssetsTable 4.2: Hardware Firewall Vendors Reasons for Why Software Firewalls are InsecureTable 4.3: Lab Network DetailsTable 4.4: Lab Network DetailsTable 4.5: New and Improved Features in the ISA Firewalls Networking ModelTable 4.6: Firewall Policies available with the Edge Firewall TemplateTable 4.7: Firewall Policies Available for the Trihomed (3-Leg) Network TemplateTable 4.8: Firewall Policies Available for the Trihomed (3-Leg) Network TemplateTable 4.9: Firewall Policies Available for the Back Firewall TemplateChapter 5: ISA 2004 Client Types and Automating Client Provisioning
Table 5.1: Overview of ISA 2004 Client TypesTable 5.2: Disadvantages of the SecureNAT Client ConfigurationTable 5.3: Advantages of the SecureNAT Client ConfigurationTable 5.4: DNS Considerations for SecureNAT ClientsTable 5.5: Advantages of the Firewall Client ConfigurationTable 5.6: Firewall Client Configuration File SettingsTable 5.7: Advantages of the Web Proxy Client ConfigurationTable 5.8: Disadvantages of the Web Proxy Client ConfigurationTable 5.9: Application Behavior on Multiple Client Configuration MachinesTable 5.10: Grading Security, Functionality, Ease and Compatibility of ISA 2004 Client Types, from Highest to LowestTable 5.11: Choosing the Appropriate ISA 2004 Client TypeTable 5.12: DNS and DHCP Support for Web Proxy and Firewall Client AutodiscoveryChapter 6: Installing and Configuring the ISA Firewall Software
Table 6.1: Basic Processor, Memory, Disk Space and Network Adapter Requirements Based on Link SpeedTable 6.2: Established Corporate Network Name-Resolution InfrastructureTable 6.3: No Established Corporate Network Name-Resolution InfrastructureTable 6.4: Entries and Values in the msisaund.ini FileTable 6.5: Post-Installation ISA Firewall SettingsTable 6.6: Default Post-installation System PolicyTable 6.7: Default Port-installation ISA Firewall System ConfigurationTable 6.8: DHCP Request to ServerTable 6.9: DHCP Reply from ServerTable 6.10: Internal DNS Server to ForwarderTable 6.11: Internal Network to DNS ServerTable 6.12: All OpenTable 6.13: Services on which the ISA Firewall Software DependsTable 6.14: Services Required for Common Tasks Performed on the ISA FirewallTable 6.15: Service Requirements Based on the ISA Firewalls Client RolesTable 6.16: ISA Firewall Administrative RolesTable 6.17: ISA Firewall Tasks Assigned to ISA Firewall Administrative RolesChapter 7: Creating and Using ISA 2004 Firewall Access Policy
Table 7.1: Default IIS MIME Types for common file extensionsTable 7.2: All Open Rule with MSN Messenger 6.2 HTTP Security Filter signatureTable 7.3: Access Rule that denies the MSN Messenger protocolTable 7.4: Settings for a MSN Messenger Web Proxy Access ruleTable 7.5: Remote Access to DMZ Server using Private v. Public Addresses, NAT v. Route, Access Rules, and Publishing RulesTable 7.6: Protocols Required for Intradomain CommunicationsChapter 8: Publishing Network Services with ISA 2004 Firewalls
Table 8.1: Web Listener Authentication MethodsTable 8.2: Server Publishing Protocol DefinitionsChapter 9: Creating Remote Access and Site-to-Site VPNs with ISA Firewalls
Table 9.1: System Policy Rules Enabling the ISA Firewall to be a DHCP ClientTable 9.2: IP Addressing and Network Information for the ISA Firewall VPN GatewaysChapter 10: ISA 2004 Stateful Inspection and Application Layer Filtering
Table 10.1: SMTP Service Log FieldsTable 10.2: Example HTTP Security Filter for Generic Web SitesTable 10.3: HTTP Security Filter Settings for OWA Web Publishing RulesTable 10.4: HTTP Security Filter Policy Settings for RPC-over-HTTP Web Publishing RuleTable 10.5: Sample Signatures for Blocking Commonly Encountered Dangerous ApplicationsTable 10.6: HTTP Headers Used to Bock Dangerous Applications