Eicon Networks S92 Uživatelský manuál Strana 185

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 209
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 184
YuChakTinMichael‘sGIACGCFWProjectAssignment
Page 185
AuditReport
AuditoftheGIACnetworksecurityarchitecturewasperformedfrom4
th
Aprilto8
th
April,2002.Duringthisaudit,thefollowingareaswereassessedandreviewed:
à Existingsecuritypoliciesandprocedures
à Logicalandphysicalsecuritymeasures
à Securitydevicesconfigurations
à Rulebaseimplementationsandpoliciescompliance
à Administrativeandchangecontrolprocedures
WeconcludethattheGIACsecurityarchitectureissuccessfulinsecuringthe
network:
n Thefirewallsystemsareworkingasexpectedwithoutmajorproblems.Ontopof
this,thelayereddefensearchitecturemakesitpossibletomitigateanyserious
threat.
n Documentation,changecontrolandotheradministrativeproceduresareinplace
andareproperly followed.
n Duringthetechnicalassessmentphrases,mostvulnerabilitiesfoundareminor
andarerelatedtothenonfirewalldevices,includingtheWindows2000based
borderrouter,theVPNserverandtheRASserver.
n Intermsofperformance,faulttoleranceandremoteaccesssecurity,roomfor
furtherimprovementdoesexist.
Belowisalistofrecommendations:
Recommendatio nOne
AlthoughtherearetwoseparatelinksforusebyGIAC,theB2Bstreamissharing
bandwidthwiththeINETstreamwithoutanybandwidthcoordinationmechanismin
place.AQoSsolutionsuchastheCheckPointFloodGate1softwareshouldbe
consideredatRouter_Eiconcard:
“FloodGate1®isa policybased,QualityofService(QoS)solutionforVPNs,private
WANsandInternetlinks.Itoptimizesnetworkperformancebyassigningpriorityto
Zobrazit stránku 184
1 2 ... 180 181 182 183 184 185 186 187 188 189 190 ... 208 209

Komentáře k této Příručce

Žádné komentáře