Eicon Networks S92 Manuel d'utilisateur Page 23

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 209
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 22
YuChakTinMichael‘sGIACGCFWProjectAssignment
Page 23
VisNetic_1:
n FirewallprotectionforInternal_Servers,RAS_NetandCritical_Resources
n Platform:x86basedWindows2000ServerrunningDeerfieldVisNeticFirewall
n Hardware:SinglePentium3800MHZ,256MBRAM,20GBDiskMirror,four
100BaseTNICs.
ISA_Cache:
n Proxycachingandfirewallprotectionforoutgoinginternettrafficfrom
Internal_Clients,Internal_AdminandInternal_Dev.
n Platform:x86basedWindows2000ServerrunningMicrosoftISAServer
StandardEdition
n Hardware:SinglePentium41GHZ,256MBRAM,50GBDiskMirror,two
100BaseTNICs.
W2K_VPN:
n VPNGatewayservicinginboundVPNconnectionrequestsfromtheexternal
partnersandsuppliers
Whydowedividetheentireuserbaseintothreedifferentgroupswitheach
ofthemunder theprotectionofdifferentfirewalls?
Theans wertothisquestionis:weneedtoachieveseparationofbusiness
functions:
q Theadministratorspossessall themightyprivilegesand toolsfor
manipulatingtheentirenetwork.Itwillbeadisasteriftheirsystemsare
compromisedeitherbydisgruntledemployeesorbyexternalhackers.
q Thedeveloperspossessallthecodesandtechnologysecretsf or the
ecommerceapplications.Itwillbeadisasterifthisinformationis
compromised. Again,disgruntledemployeesandexternalhackersarethe
potentialsourcesofsuchthreat.
q Theclientsusuallymakeunintentional(andproperly intentionalyet
amateur)troubles.Thesetroublesarebettertobecontainedwithintheir
ownsegment.
Vue de la page 22
1 2 ... 18 19 20 21 22 23 24 25 26 27 28 ... 208 209

Commentaires sur ces manuels

Pas de commentaire