![](images/graphics/blank.gif)
Fire wall fundamentals
-
Written security policies exist to provide a high-level roadmap of what needs to be done to ensure that the organization has a well-defined and thought-out security strategy
11p
chutieuchuathieulam
23-07-2010
99
10
Download
-
The ICF, now dubbed Windows Firewall, is a simple stateful firewall that is part of the Windows XP operating system. In essence
12p
chutieuchuathieulam
23-07-2010
175
19
Download
-
Personal and desktop firewalls are frequently overlooked as security devices that should be implemented on a network.
2p
chutieuchuathieulam
23-07-2010
77
6
Download
-
The closer you come to the resource that needs to be protected, the more intelligent and specific you can get in filtering traffic directed at that resource.
1p
chutieuchuathieulam
23-07-2010
73
6
Download
-
One of my favorite quotes is from Sun Tzu's The Art of War: If you know the enemy and know yourself, you need not fear the result of a hundred battles.
8p
chutieuchuathieulam
23-07-2010
57
6
Download
-
There is no shortage of motives behind the threats that attackers come up with. Perhaps the most dangerous motive is the conscious decision to break the law, typically in an effort to gain some financial or monetary gain.
2p
chutieuchuathieulam
23-07-2010
87
8
Download
-
Virtual private networks (VPNs) are another feature that firewalls have quickly adopted. Firewalls, by the very nature of their placement in the network design, represent a natural device to provide termination for LAN-to-LAN and in some cases remote-access VPNs.
5p
chutieuchuathieulam
23-07-2010
146
15
Download
-
Using Firewalls to Segment Internal Resources Perhaps the most overlooked implementation of a firewall is on the internal network.
4p
chutieuchuathieulam
23-07-2010
75
6
Download
-
User Datagram Protocol (UDP) UDP is the polar opposite of TCP. Whereas TCP is connection oriented, reliable, and relatively complex, UDP is a connectionless, unreliable
3p
chutieuchuathieulam
23-07-2010
177
54
Download
-
This through a simple example of troubleshooting a firewall configuration. Troubleshooting starts with the basic connectivity troubleshooting and escalates upward to more complex issues until the specific problem is identified
6p
chutieuchuathieulam
23-07-2010
79
7
Download
-
One of many third-party antivirus/Internet security suites, Trend Micro's PC-cillin includes a personal firewall that you can use to protect the system
11p
chutieuchuathieulam
23-07-2010
111
7
Download
-
Transmission Control Protocol (TCP) TCP is a connection-oriented transport mechanism that resides at Layer 4 of the OSI model.
5p
chutieuchuathieulam
23-07-2010
136
12
Download
-
To paraphrase Shrek, the network perimeter is like an onion; it has lots of layers.
4p
chutieuchuathieulam
23-07-2010
90
10
Download
-
There are two predominant firewall architectures, the single-firewall and dual-firewall architectures.
3p
chutieuchuathieulam
23-07-2010
92
11
Download
-
No discussion of firewall and security tools is complete without a brief discussion regarding security-testing tools.
8p
chutieuchuathieulam
23-07-2010
99
14
Download
-
Consequently, a firewall is only as effective as the firewall security policy (as opposed to the enterprise security policy) that dictates how the firewall will be used
3p
chutieuchuathieulam
23-07-2010
98
11
Download
-
Act as an intermediary between hosts Cache data to reduce the time and external bandwidth required to service requests
2p
chutieuchuathieulam
23-07-2010
114
11
Download
-
Protocols, Services, and Applications As mentioned, TCP/IP provides a mechanism to allow systems to communicate with each other across a network.
10p
chutieuchuathieulam
23-07-2010
78
9
Download
-
As with configuring any firewall, administrators should develop a checklist that they can use during the installation and implementation of the PIX/ASA firewall in the network
2p
chutieuchuathieulam
23-07-2010
81
12
Download
-
The PIX/ASA is a powerful stateful packet-inspection firewall with some basic application-inspection capabilities.
2p
chutieuchuathieulam
23-07-2010
95
11
Download
CHỦ ĐỀ BẠN MUỐN TÌM
![](images/graphics/blank.gif)