Eicon Networks S92 Uživatelský manuál Strana 23

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 209
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 22
YuChakTinMichael‘sGIACGCFWProjectAssignment
Page 23
VisNetic_1:
n FirewallprotectionforInternal_Servers,RAS_NetandCritical_Resources
n Platform:x86basedWindows2000ServerrunningDeerfieldVisNeticFirewall
n Hardware:SinglePentium3800MHZ,256MBRAM,20GBDiskMirror,four
100BaseTNICs.
ISA_Cache:
n Proxycachingandfirewallprotectionforoutgoinginternettrafficfrom
Internal_Clients,Internal_AdminandInternal_Dev.
n Platform:x86basedWindows2000ServerrunningMicrosoftISAServer
StandardEdition
n Hardware:SinglePentium41GHZ,256MBRAM,50GBDiskMirror,two
100BaseTNICs.
W2K_VPN:
n VPNGatewayservicinginboundVPNconnectionrequestsfromtheexternal
partnersandsuppliers
Whydowedividetheentireuserbaseintothreedifferentgroupswitheach
ofthemunder theprotectionofdifferentfirewalls?
Theans wertothisquestionis:weneedtoachieveseparationofbusiness
functions:
q Theadministratorspossessall themightyprivilegesand toolsfor
manipulatingtheentirenetwork.Itwillbeadisasteriftheirsystemsare
compromisedeitherbydisgruntledemployeesorbyexternalhackers.
q Thedeveloperspossessallthecodesandtechnologysecretsf or the
ecommerceapplications.Itwillbeadisasterifthisinformationis
compromised. Again,disgruntledemployeesandexternalhackersarethe
potentialsourcesofsuchthreat.
q Theclientsusuallymakeunintentional(andproperly intentionalyet
amateur)troubles.Thesetroublesarebettertobecontainedwithintheir
ownsegment.
Zobrazit stránku 22
1 2 ... 18 19 20 21 22 23 24 25 26 27 28 ... 208 209

Komentáře k této Příručce

Žádné komentáře