CompTIA Security Understanding Loopback Processing of the Microsoft Certificate Status
Here are a couple of key points about using SSTP: No TCP ports need to be opened on a firewall. Using SSTP, no TCP ports need to be opened on a ?rewall because of the design of the technology. You must use HTTPS. Part of the design of SSTP is a requirement to use HTTPS. Ultimately, the point to keep in mind with mcitp enterprise administrator is that there almost always is a way to solve the problem of creating a secure and viable connection to even the most complicated networks. It really just depends on the type of security you want to implement and how tight you?d like that security to be. Designing a public key infrastructure is one of the ?nal and most important steps in com- pleting an enterprise implementation. Part of this process includes creating a CA model that can be multiple tiers in its implementation; using various CAs in different roles, including the root role, policy role, and issuing role; and choosing whether to implement CAs as stand-alone or enterprise implementations. The goal of any well-designed PKI is to provide an easy form of enrollment that allows for as little user involvement as possible while maintaining the highest level of security. This can be accomplished through automatic enrollment or manual enrollment through forms such as the Web, the Certi?cates MMC, or the command line. With Windows Server implementations can include the features of the Microsoft Online Certi?cate Status Provider that can aid in the alleviation of network traffic caused by requests for certi?cate status that are located in a standard certi?cate revocation lists (CRLs), which contain the information regarding certi?cates that have been revoked for various reasons in the enterprise. It’s important to remember as you review this chapter and begin to implement mcitp server administrator on your own that there is no such thing as a completely secure infrastructure. No matter how much work you do, there will always be holes. However, best practices prove that creating a strict security policy, maintaining vigilance, and accounting for all circumstances can produce incredible results and ultimately stable networks.