Eicon Networks S92 Bedienungsanleitung Seite 158

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 209
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 157
YuChakTinMichael‘sGIACGCFWProjectAssignment
Page 158
192.168.16.99
192.168.20.0
NetBrute Nil Yes
192.168.16.99
Norton3_IDS
Share
Scanner
Nil Yes
192.168.16.99
192.168.20.0
Share
Scanner
Nil Yes
192.168.16.99
Norton3_IDS
Sub_Net Nil Yes
192.168.16.99
192.168.20.0
Sub_Net Nil Yes
Rulebaseassessment
InInternal_Admin,createasharethatallowseveryoneaccess.From
Internal_Clients,attempttoaccesssuchshare.
Attemptfailed.Thisisthedesirableresult.
InInternal_Dev,createasharethatallowseveryoneaccess.From
Internal_Clients,attempttoaccesssuchshare.
Attemptfailed.Thisisthedesirableresult.
Otherassessmentmethods
Fromaprotectedhost,connecttoaninternetsitethatoffersJavaandActiveX
codes,andtrytohavethemdownloaded.
Downloadsblockedandlogged.
Remarks
ItseemsliketheNortonFirewallsareprovidingexcellentprotection.Infact,itis
theIntruderAutoBlockfunctionthatallowsthefirewalltorejectallsubsequent
connectionattemptscomingfromtheblockedintruders.
Thisfeaturemaynotworkwellwhenattacksare
initiatedwithrandomsourceIPaddresses.Therefore,
furthertestingusingatoolcapableofrandom
spoofingisrecommended.
Seitenansicht 157
1 2 ... 153 154 155 156 157 158 159 160 161 162 163 ... 208 209

Kommentare zu diesen Handbüchern

Keine Kommentare