tailieunhanh - essential computer security phần 10

máy tính của bạn chứa chấp các thông tin nhạy cảm hoặc bí mật rằng một kẻ tấn công có khả năng có thể được truy cập là cam kết để xuất bản cuốn sách có chất lượng cao cho các chuyên gia CNTT và cung cấp những cuốn sách trong các phương tiện | 248 Appendix B Case Study SOHO Five Computers Printer Servers etc. Note The firewall separates the internal network from the other networks keeping the interior of the network the most secure. If the wireless network is compromised the servers on the internal network are not accessible. He browses to the default IP address for this particular appliance . He accepts all the defaults allowing the wireless router to give the firewall a DHCP address and let the firewall give his internal systems their own IP addresses. Note The default username and password for the firewall is admin and password. Change this soon after the basic configuration. Tom checks the Basic Settings. He can safely accept this basic configuration from the initial setup. He then checks logging and checks the All Websites and news groups visited All incoming TCP UDP ICMP traffic All Outgoing TCP UDP ICMP traffic Other IP traffic and Connections to the Web based interface of this Router as he wants to get as much information as possible about what is happening in his internal network. Later after he feels comfortable with what is normal behavior on his systems he might turn off some of the logging so it is not as comprehensive. Tom doesn t worry about the syslog server configuration as he does not have a logging infrastructure. For now Tom isn t going to e-mail the logs to himself instead he chooses to look at them and clear them manually. The logging is now comprehensive. The highlighted portion of the log in Figure shows Tom s access to the Administrator Interface. On the Rules tab Tom sees that he can configure specific rules to allow and disallow services and actions from happening. Tom plans to watch his log for a few days and determine what if anything he needs to tune. Tom invested in a solution that would give him VPN functionality. This allows him to connect his laptop remotely to the internal system so he can print or access records from his porch or anywhere in his house.

TỪ KHÓA LIÊN QUAN