firewall policies and vpn configurations 2006 phần 2

Để đăng ký cuốn sách của bạn, hãy truy cập / giải pháp. Sau khi đăng ký, bạn có thể truy cập các trang Web của chúng tôi. Ở đó bạn sẽ tìm thấy một loại giá trị gia tăng các tính năng như e-tập tài liệu liên quan đến chủ đề của cuốn sách này, các URL của những trang web liên quan, câu hỏi thường gặp từ các cuốn sách, chỉnh sửa, | 30 Chapter 1 Network Security Policy Perform baseline network mapping and performance monitoring Identify risk to resources and appropriate mitigation processes Identify potential security threats both external and internal Identify needed access points from external sources Public networks VPN access Extranets Remote access services Identify critical services Plan your DMZ Figure A Basic Network with a Single Firewall Figure shows the basic configuration that would be used in a simple network situation in which there was no need to provide external configuration would typically be used to begin to protect a small business or home network. It could also be used within an internal network to protect an inner network that had to be divided and isolated from the main network. This situation could include Payroll Finance or Development divisions that need to protect their information and keep it away from general network use and view. Figure details a protection design that would allow for the implementation and provision of services outside the protected network. In this design it would be Network Security Policy Chapter 1 31 imperative that rules be enacted to not allow the untrusted host to access the internal network. Security of the bastion host machine would be accomplished on the machine itself and only minimal and necessary services would be enabled or installed on that machine. In this design we might be providing a Web presence that did not involve e-commerce or the necessity to dynamically update content. This design would not be used for provision of virtual private network VPN connections FTP services or other services that required other content updates to be performed regularly. Figure Basic Network Single Firewall and Bastion Host Untrusted Host Figure shows a basic DMZ structure. In this design the bastion host is partially protected by the firewall. Rather than the full exposure that would result to the bastion host .

Không thể tạo bản xem trước, hãy bấm tải xuống
TỪ KHÓA LIÊN QUAN
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.