Eicon Networks S92 Bedienungsanleitung Seite 130

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 209
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 129
YuChakTinMichael‘sGIACGCFWProjectAssignment
Page 130
WithEiconcardConnectionsforWindows2000,allpacketsareforwardedfora
connectionforwhichnoIPpacketfiltersiscreated.However,buildingtoomany
filterscanbecostlyasmoreprocessinghastobedoneforeverypackethandled.We
definitelydonotwantRouter_Eiconcardtobecomethenetworkbottleneck.
RulesandOrders
Sinceallinternalsegmentsareprotectedbymultiplelayersoffirewall,screening
activitiesatRouter_Eiconcardshouldberestrictedtoonlydroppingincominginternet
trafficthathassourceaddressesbelongingtoGIAC’sinternalIPsubnets(wedothis
toprotectthenetworkagainstspoofingattack). Thiswaydelaycanbeminimizedat
thischokingpointofthenetwork.
Accordingtowebopedia.com,spoofingis:
“atechniqueusedtogainunauthorizedaccesstocomputers,wherebytheintruder
sendsmessagestoacomputerwithanIP addressindicatingthatthemessageis
comingfromatrustedhost.ToengageinIPspoofing,ahackermustfirstusea variety
oftechniquestofindanIPaddressofatrustedhostand thenmodifythepacket
Seitenansicht 129
1 2 ... 125 126 127 128 129 130 131 132 133 134 135 ... 208 209

Kommentare zu diesen Handbüchern

Keine Kommentare