Eicon Networks S92 Bedienungsanleitung Seite 23

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 209
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 22
YuChakTinMichael‘sGIACGCFWProjectAssignment
Page 23
VisNetic_1:
n FirewallprotectionforInternal_Servers,RAS_NetandCritical_Resources
n Platform:x86basedWindows2000ServerrunningDeerfieldVisNeticFirewall
n Hardware:SinglePentium3800MHZ,256MBRAM,20GBDiskMirror,four
100BaseTNICs.
ISA_Cache:
n Proxycachingandfirewallprotectionforoutgoinginternettrafficfrom
Internal_Clients,Internal_AdminandInternal_Dev.
n Platform:x86basedWindows2000ServerrunningMicrosoftISAServer
StandardEdition
n Hardware:SinglePentium41GHZ,256MBRAM,50GBDiskMirror,two
100BaseTNICs.
W2K_VPN:
n VPNGatewayservicinginboundVPNconnectionrequestsfromtheexternal
partnersandsuppliers
Whydowedividetheentireuserbaseintothreedifferentgroupswitheach
ofthemunder theprotectionofdifferentfirewalls?
Theans wertothisquestionis:weneedtoachieveseparationofbusiness
functions:
q Theadministratorspossessall themightyprivilegesand toolsfor
manipulatingtheentirenetwork.Itwillbeadisasteriftheirsystemsare
compromisedeitherbydisgruntledemployeesorbyexternalhackers.
q Thedeveloperspossessallthecodesandtechnologysecretsf or the
ecommerceapplications.Itwillbeadisasterifthisinformationis
compromised. Again,disgruntledemployeesandexternalhackersarethe
potentialsourcesofsuchthreat.
q Theclientsusuallymakeunintentional(andproperly intentionalyet
amateur)troubles.Thesetroublesarebettertobecontainedwithintheir
ownsegment.
Seitenansicht 22
1 2 ... 18 19 20 21 22 23 24 25 26 27 28 ... 208 209

Kommentare zu diesen Handbüchern

Keine Kommentare