john3859
Dołączył: 25 Sty 2011
Posty: 1639
Przeczytał: 0 tematów
Ostrzeżeń: 0/5 Skąd: England
|
Wysłany: Sob 11:37, 02 Kwi 2011 Temat postu: What is an Executive Profiledde |
|
|
yilai:
[link widoczny dla zalogowanych]
a little before time for the visiting hour
raffic from the internet would be routed directly to your DMZ.Therefore if any hacker where to compromise a machine within the DMZ, then the only network they would have access to would be the DMZ. The hacker would have little or no access to the LAN. It would also be the case that any virus infection or other security compromise within the LAN would not be able to migrate to the DMZ.In order for the DMZ to be effective [link widoczny dla zalogowanych], you will have to keep the traffic between the LAN and the DMZ to a minimum. In the majority of cases, the only traffic required between the LAN and the DMZ is [link widoczny dla zalogowanych] If you do not have physical access to the servers, you will also need some sort of remote management protocol such as terminal services or VNC.Database serversIf your web servers require access to a database server [link widoczny dla zalogowanych], then you will need to consider where to place your database. The most secure place to locate a database server is to create yet another physically separate network called the secure zone [link widoczny dla zalogowanych], and to place the database server there.The Secure zone is also a physically separate network connected directly to the firewall. The Secure zone is by definition the most secure place on the network. The only access to or from the secure zone would be the database connec
Post został pochwalony 0 razy
|
|