TAILIEUCHUNG - MCSE ISA Server 2000- P8

MCSE ISA Server 2000- P8: These books include a large amount and different kinds of information. The many different elements are designed to help you identify information by its purpose and importance to the exam and also to provide you with varied ways to learn the material. | Chapter 6 ISA SERVER HOSTING ROLES 183 Introduction I can remember when Web servers were not placed behind the corporate firewall. The rationale was that to do so would compromise the security of the internal network. Companies risked site attacks and possible downtime rather than create potential chinks in their firewall armor. The Internet was a simpler beast then and few were fielding Business to Business B2B or Business to Consumer B2C sites. Things have changed. Now no Web master worth her salt would dream of leaving her baby bare and exposed. The challenge then becomes how do I protect the Web site or other exposed servers allow access to it and yet not allow hackers entrance into my internal network There are four potential answers First a Web server sits on the internal network behind the firewall. The firewall is configured to host the Web site or act as the decontamination chamber so to speak for all communications between the Web server and the rest of the world. Second a separate arrangement where the Web server sits behind a firewall but is not connected to anyone s private network. The hosting methodology explained in this chapter will be as useful in this scenario as it is in the first. Third while the Web server sits on the internal network behind the firewall instead of hosting appropriate ports are opened on the firewall to allow traffic to flow to the Web site. Finally a separate perimeter or demilitarized zone DMZ is created to act as the network for all Internet accessible hosts. A three-pronged approach the firewall has three NIC cards or a separate internal firewall is used to protect the internal network. This approach and the one mentioned previously are covered in more detail in Chapter 10 Firewall Configuration. 184 Part II CONFIGURING AND TROUBLESHOOTING ISA SERVER SERVICES The best approach in many cases this will be to host the server using ISA Hosting services. To learn how to do see the following sections of this chapter Configuring

TỪ KHÓA LIÊN QUAN
TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.