YuChakTinMichael‘sGIACGCFWProjectAssignment
Page 130
WithEiconcardConnectionsforWindows2000,allpacketsareforwardedfora
connectionforwhichnoIPpacketfiltersiscreated.However,buildingtoomany
filterscanbecostlyasmoreprocessinghastobedoneforeverypackethandled.We
definitelydonotwantRouter_Eiconcardtobecomethenetworkbottleneck.
RulesandOrders
Sinceallinternalsegmentsareprotectedbymultiplelayersoffirewall,screening
activitiesatRouter_Eiconcardshouldberestrictedtoonlydroppingincominginternet
trafficthathassourceaddressesbelongingtoGIAC’sinternalIPsubnets(wedothis
toprotectthenetworkagainstspoofingattack). Thiswaydelaycanbeminimizedat
thischokingpointofthenetwork.
Accordingtowebopedia.com,spoofingis:
“atechniqueusedtogainunauthorizedaccesstocomputers,wherebytheintruder
sendsmessagestoacomputerwithanIP addressindicatingthatthemessageis
comingfromatrustedhost.ToengageinIPspoofing,ahackermustfirstusea variety
oftechniquestofindanIPaddressofatrustedhostand thenmodifythepacket
Commentaires sur ces manuels