Eicon Networks S92 Manuale Utente Pagina 130

  • Scaricare
  • Aggiungi ai miei manuali
  • Stampa
  • Pagina
    / 209
  • Indice
  • SEGNALIBRI
  • Valutato. / 5. Basato su recensioni clienti
Vedere la pagina 129
YuChakTinMichael‘sGIACGCFWProjectAssignment
Page 130
WithEiconcardConnectionsforWindows2000,allpacketsareforwardedfora
connectionforwhichnoIPpacketfiltersiscreated.However,buildingtoomany
filterscanbecostlyasmoreprocessinghastobedoneforeverypackethandled.We
definitelydonotwantRouter_Eiconcardtobecomethenetworkbottleneck.
RulesandOrders
Sinceallinternalsegmentsareprotectedbymultiplelayersoffirewall,screening
activitiesatRouter_Eiconcardshouldberestrictedtoonlydroppingincominginternet
trafficthathassourceaddressesbelongingtoGIAC’sinternalIPsubnets(wedothis
toprotectthenetworkagainstspoofingattack). Thiswaydelaycanbeminimizedat
thischokingpointofthenetwork.
Accordingtowebopedia.com,spoofingis:
“atechniqueusedtogainunauthorizedaccesstocomputers,wherebytheintruder
sendsmessagestoacomputerwithanIP addressindicatingthatthemessageis
comingfromatrustedhost.ToengageinIPspoofing,ahackermustfirstusea variety
oftechniquestofindanIPaddressofatrustedhostand thenmodifythepacket
Vedere la pagina 129
1 2 ... 125 126 127 128 129 130 131 132 133 134 135 ... 208 209

Commenti su questo manuale

Nessun commento