« Home « Chủ đề tường lửa

Chủ đề : tường lửa


Có 20+ tài liệu thuộc chủ đề "tường lửa"

Tìm hiểu bài toán web an toàn và đề xuất giải pháp Firewall cho các ứng dụng web

312553.pdf

dlib.hust.edu.vn

9 CHƯƠNG 2: ỨNG DỤNG WEB VÀ CÁC LỖ HỔNG BẢO MẬT PHỔ BIẾN TRONG ỨNG DỤNG WEB. Khái niệm ứng dụng web. Các lỗ hổng bảo mật phổ biến trong ứng dụng web. A9 – Sử dụng các thành phần có lỗ hổng đã biết – Using Components with Known Vulnerabilities. 18 CHƯƠNG 3: ĐỀ XUẤT GIẢI PHÁP TƯỜNG...

Tìm hiểu bài toán web an toàn và đề xuất giải pháp Firewall cho các ứng dụng web

312553-tt.pdf

dlib.hust.edu.vn

Trang 1 TÓM TẮT LUẬN VĂN THẠC SĨ Đề tài: Tìm hiểu bài toán Web an toàn và đề xuất giải pháp Firewall cho các ứng dụng Web. Thực tế với tình hình hiện nay, các ứng dụng web ngày một nhiều. Sự thay đổi chóng mặt của công nghệ đã giúp ứng dụng web được cải tiến nâng cao...

Addressing in IP Networks

tailieu.vn

IP traffic on the network is no different. Logical/IP addresses Physical Addresses. Physical addresses are used to identify the specific host that data is being transmitted to.. What this means is that the physical address can only be used to communicate between hosts that share a common subnet or network segment. To ensure that only the host that the data...

Advanced Firewall Troubleshooting

tailieu.vn

Advanced Firewall Troubleshooting. This chapter has focused primarily on the core tasks of a firewall to process traffic through the firewall and for the firewall to provide for connectivity and access to remote and protected hosts. However, firewalls continue to gain more advanced features and functions, and it is becoming necessary to troubleshoot those advanced features and functions.. Processes such...

Application Layer Filtering

tailieu.vn

Application Layer Filtering. Application proxy firewalls are the most intelligent firewall architecture. By intelligent, we mean that an application proxy firewall can perform the most detailed inspection on data before making a filtering decision. An application proxy firewall can decode and process at the application layer the data contained in packets. Consequently, application proxy firewalls can filter based on the...

Applications Using IP

tailieu.vn

Web browsers and web servers allow users to access graphical content using HTTP, which uses TCP port 80. In addition, if secure web browsing is required, the data can be secured using Secure Sockets Layer (SSL), commonly known as HTTPS, which uses TCP port 443.. SMTP uses TCP port 25 and serves to primarily transmit e-mail messages to the mail...

Basic Firewall Troubleshooting

tailieu.vn

Access to the firewall itself is not functioning correctly.. Traffic going through the firewall. Traffic going to the firewall.. Troubleshooting Connectivity Through the Firewall. No matter how well planned, tested, and implemented, sooner or later you will run into problems accessing resources through the firewall. There are any number of reasons for this, but the most common reasons involve problems...

Broadcast and Multicast

tailieu.vn

Most of this discussion of IP traffic has revolved around the process of unicast traffic, which is traffic that is addressed for a single host. However, IP traffic can also be broadcast or multicast traffic, providing for some flexibility in how traffic is delivered.. Broadcast traffic is traffic that is destined to all hosts on a given subnet or to...

Choosing Between the PIX and the ASA

tailieu.vn

Choosing Between the PIX and the ASA. The ASA is essentially the latest version of the Cisco firewall solution and is based largely on the PIX software. Versions of software prior to 7.0 are not supported on the ASA.. The major difference between the Cisco PIX Firewall and the ASA does not lie in the firewall functionality itself, but rather...

Cisco PIX Firewall and ASA Models

tailieu.vn

To implement a Cisco PIX or ASA in a given network, you need only purchase the PIX or ASA hardware and software from Cisco. In general, you can classify the PIX or ASA products into three solutions:. The PIX 501 is the model designed for the SOHO market and comes with a built-in four- port switch. The PIX 501 is...

Common Firewall Management Tasks

tailieu.vn

One of the first things to accomplish when deploying a new firewall, whether this is for an enterprise deployment or for a deployment in a small office or home office, is to configure some basic aspects of networking. Doing so includes changing the default administrative password, configuring the default gateway, configuring the IP addresses for the internal and external (and...

Common Troubleshooting Tools

tailieu.vn

Simply put, is the device up or is it down. To this end, the Packet Internet Groper (PING) utility was developed to provide a simple way to determine the reachability of a device.. When a source host attempts to determine whether a destination host is reachable, it generates an ICMP echo packet for the destination host. When the destination host...

Configuring Linksys Linksys

tailieu.vn

Refer to the user guide of your appropriate router for the relevant information, but typically the username/password combination of admin/admin is the default user account. You can change the password from the Management screen, which is discussed later in this chapter. In the case of the BEFSR41v4, the interface is separated into five main tabs:. As shown in Figure 5-3,...

Configuring NetFilter

tailieu.vn

The path a packet takes through the NetFilter process depends on whether it is destined for the firewall host itself or whether it is being forwarded to a second interface. As shown in Figure 7-4, the process of forwarding packets to the second interface. involves a routing decision by the firewall. If a packet is destined for the firewall itself,...

Configuring the Cisco PIX/ASA

tailieu.vn

Configuring the Cisco PIX/ASA. administrator access to the graphical user interface (GUI), the Adaptive Security Device Manager (ASDM) (previously known as the PIX Device Manager [PDM] for software versions previous to 7.0).. To initially configure a PIX out of the box, connect a serial connecter to the console port of the PIX (which is typically outlined with a light blue...

Content Filtering

tailieu.vn

Many enterprises are beginning to concern themselves with the use of the corporate Internet connection by their employees. One of the newer features being required of firewalls is the capability of filtering the content that passes through them. This filtering typically is defined as URL filtering, whereby the firewall is used either by itself or in conjunction with another appliance...

Default Passwords

tailieu.vn

Default Passwords. This is because the manufacturer must allow for initial access to the device for the end user to configure it.. Most recent documentation for any device admonishes the end user to immediately change the default password to something else. Table 11-1 shows common default passwords for some firewalls.. Manufacturer Product Default Administrative Account Default Password. NetScreen (All) netscreen...

Determining If You Need a Firewall

tailieu.vn

To help determine where you can implement a firewall, define what the cost of the data you are trying to protect is. One variable to consider is the cost of restoring or repairing the data. An additional variable is the cost of lost work and downtime as a result of the data being inaccessible to employees. Yet another variable is...

Developing a Troubleshooting Checklist phần 1

tailieu.vn

Developing a Troubleshooting Checklist. When the firewall is down is not the time to try to figure out what you should be looking at to resolve the problem.. The reason is simple: There will already be enough stress and confusion as a result of the failure. Obviously, you cannot plan for every failure that will occur, but you can put...

Developing a Troubleshooting Checklist phần 2

tailieu.vn

By just telnetting to TCP port 80 and typing GET / HTTP/1.0 and then pressing Enter a few times, I can retrieve the default web page for the server, which at least verifies that the target host is properly connected to and communicating with the network and at best will tell me exactly what web server software is being run...