TAILIEUCHUNG - Chapter-22-Firewalls-IPaliasing and proxies

The Internet was developed by a relatively small community of computer scientists, who were for the most part responsible people who often did not take security issues very seriously. Since the Internet has been opened to the general public, three problems have become evident: | 10 April 2003 06 13 07 The Complete FreeBSD page 385 In this chapter Security and firewalls IP aliasing Proxy servers Installing squid Browser proxy configuration Firewalls IP aliasing and proxies The Internet was developed by a relatively small community of computer scientists who were for the most part responsible people who often did not take security issues very seriously. Since the Internet has been opened to the general public three problems have become evident A large number of people have sought to abuse its relatively lax security. The address space is no longer adequate for the number of machines connecting to the network. Much bandwidth is used by people downloading the same web pages multiple times. What do these problems have to do with each other Nothing much but the solutions are related so we ll look at them together. More specifically we ll consider How to set up an Internet firewall to keep intruders out of your network. Security tools that ensure that nobody can steal your password from a node through which it passes. Tools for IP aliasing which translate IP addresses to make them appear to come from the gateway machine. The way this is done makes it impossible to set up connections from outside so they also represent a kind of security device. Caching proxy servers which both address the multiple download issues and provide some additional security. v 2003 04 09 20 40 28 385 10 April 2003 06 13 07 The Complete FreeBSD . tools page 386 386 Chapter 22 Firewalls IP aliasing and proxies Security and firewalls Recall from Chapter 16 that incoming packets need to connect to an IP port and that some process on the machine must accept them. By default this process is inetd. You can limit the vulnerability of your machine by limiting the number of services it supports. Do you need to supply telnet and rlogin services If not don t enable the service. By default etc no longer enables any services so this .

TỪ KHÓA LIÊN QUAN
TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.