Eicon Networks S92 Manuale Utente Pagina 23

  • Scaricare
  • Aggiungi ai miei manuali
  • Stampa
  • Pagina
    / 209
  • Indice
  • SEGNALIBRI
  • Valutato. / 5. Basato su recensioni clienti
Vedere la pagina 22
YuChakTinMichael‘sGIACGCFWProjectAssignment
Page 23
VisNetic_1:
n FirewallprotectionforInternal_Servers,RAS_NetandCritical_Resources
n Platform:x86basedWindows2000ServerrunningDeerfieldVisNeticFirewall
n Hardware:SinglePentium3800MHZ,256MBRAM,20GBDiskMirror,four
100BaseTNICs.
ISA_Cache:
n Proxycachingandfirewallprotectionforoutgoinginternettrafficfrom
Internal_Clients,Internal_AdminandInternal_Dev.
n Platform:x86basedWindows2000ServerrunningMicrosoftISAServer
StandardEdition
n Hardware:SinglePentium41GHZ,256MBRAM,50GBDiskMirror,two
100BaseTNICs.
W2K_VPN:
n VPNGatewayservicinginboundVPNconnectionrequestsfromtheexternal
partnersandsuppliers
Whydowedividetheentireuserbaseintothreedifferentgroupswitheach
ofthemunder theprotectionofdifferentfirewalls?
Theans wertothisquestionis:weneedtoachieveseparationofbusiness
functions:
q Theadministratorspossessall themightyprivilegesand toolsfor
manipulatingtheentirenetwork.Itwillbeadisasteriftheirsystemsare
compromisedeitherbydisgruntledemployeesorbyexternalhackers.
q Thedeveloperspossessallthecodesandtechnologysecretsf or the
ecommerceapplications.Itwillbeadisasterifthisinformationis
compromised. Again,disgruntledemployeesandexternalhackersarethe
potentialsourcesofsuchthreat.
q Theclientsusuallymakeunintentional(andproperly intentionalyet
amateur)troubles.Thesetroublesarebettertobecontainedwithintheir
ownsegment.
Vedere la pagina 22
1 2 ... 18 19 20 21 22 23 24 25 26 27 28 ... 208 209

Commenti su questo manuale

Nessun commento