Eicon Networks S92 Manual de usuario Pagina 130

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 209
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 129
YuChakTinMichael‘sGIACGCFWProjectAssignment
Page 130
WithEiconcardConnectionsforWindows2000,allpacketsareforwardedfora
connectionforwhichnoIPpacketfiltersiscreated.However,buildingtoomany
filterscanbecostlyasmoreprocessinghastobedoneforeverypackethandled.We
definitelydonotwantRouter_Eiconcardtobecomethenetworkbottleneck.
RulesandOrders
Sinceallinternalsegmentsareprotectedbymultiplelayersoffirewall,screening
activitiesatRouter_Eiconcardshouldberestrictedtoonlydroppingincominginternet
trafficthathassourceaddressesbelongingtoGIAC’sinternalIPsubnets(wedothis
toprotectthenetworkagainstspoofingattack). Thiswaydelaycanbeminimizedat
thischokingpointofthenetwork.
Accordingtowebopedia.com,spoofingis:
“atechniqueusedtogainunauthorizedaccesstocomputers,wherebytheintruder
sendsmessagestoacomputerwithanIP addressindicatingthatthemessageis
comingfromatrustedhost.ToengageinIPspoofing,ahackermustfirstusea variety
oftechniquestofindanIPaddressofatrustedhostand thenmodifythepacket
Vista de pagina 129
1 2 ... 125 126 127 128 129 130 131 132 133 134 135 ... 208 209

Comentarios a estos manuales

Sin comentarios