Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống
1
/ 44 trang
THÔNG TIN TÀI LIỆU
Thông tin cơ bản
Định dạng
Số trang
44
Dung lượng
569,21 KB
Nội dung
[...]... Me? .10 9 Are You Scared Yet? 11 0 Part II: Establishing Rules 11 1 Chapter 6: Developing Policies 11 3 Defining an Internet Acceptable Use Policy .11 4 Defining a Security Policy 11 8 Setting a Security policy 11 8 Chapter 7: Establishing Rules for Simple Protocols 12 1 For Starters, Some Default Rules .12 3 Allowing... attacks 10 0 How Hackers Get In .10 1 The key is under the mat: Insecure passwords .10 0 Default configurations .10 1 Bugs .10 2 Back doors 10 4 It’s a zoo: Viruses, worms, and Trojan horses .10 5 Who are you? Man-in-the-middle attacks .10 6 Impersonation 10 7 Eavesdropping 10 7 Inside jobs 10 8 Other techniques .10 8 Can... Access 12 3 Configuring inbound firewall rules 12 5 Configuring outbound firewall rules .12 6 xi xii Firewalls For Dummies, 2nd Edition Finding Internet Resources 12 6 Providing name resolution to Internet-based clients 12 7 Providing Internet name resolution to internal clients 12 8 File Transfer Protocol (FTP) 13 1 Messaging and Conferencing .13 3 America Online... 16 7 Setting the Clock: Filtering on Date/Time 16 8 Part III: Designing Network Configurations 16 9 Chapter 10 : Setting Up Firewalls for SOHO or Personal Use 17 1 No-Box Solution: ISP Firewall Service .17 1 Single-Box Solution: Dual-Homed Firewall .17 2 Screened Host 17 3 Bypassing the screened host 17 4 Table of Contents Deployment Scenario 17 5 Allowing... Deploying a tunnel solution using PPTP 18 6 Deploying a tunnel solution using L2TP 18 9 Deploying a Web server with a SQL back end .19 3 Building a Case for Multi-Pronged Firewalls 19 5 Chapter 12 : Designing Demilitarized Zones with Multiple Firewalls 19 7 When Two Firewalls Are Better than One 19 7 DMZs with Two Firewalls 200 Deploying a tunnel... IV: Deploying Solutions Using Firewall Products . 211 Chapter 13 : Using Windows as a Firewall 213 Firewall Functions in Windows 214 Windows 98 and Windows Me 216 File and printer sharing 216 PPTP client 217 Internet Connection Sharing: NAT for Dummies 218 Windows NT 4.0 2 21 Packet filtering 222 PPTP server ... Two Editions 3 01 Preparing for Installation 302 Table of Contents Installing ISA Server 305 Gathering information 305 Connecting by telephone 310 Examining the Three Clients 312 SecureNAT client . 312 Firewall Client 314 Web proxy client 315 The best client for you 316 Following the Rules: The Two Types 317 ... services .14 7 Allowing access to internal mail services 14 8 Knock, Knock: Who Goes There? 14 9 RADIUS functionality 15 0 Configuring inbound RADIUS firewall rules 15 1 IPSec Encryption 15 2 When does IPSec fail? .15 4 What will the future bring? .15 5 Configuring a firewall to pass IPSec data .15 7 Let Me In: Tunneling through the Internet .15 8 Selecting... 13 3 MSN Messenger and Windows Messenger .13 4 NetMeeting 13 5 Thin Client Solutions 13 7 Citrix Metaframe 13 7 Windows Terminal Services .13 8 Internet Control Message Protocol (ICMP) 13 9 Chapter 8: Designing Advanced Protocol Rules 14 3 Rain, Sleet, Snow, and Firewalls: Getting the E-Mail Through .14 4 Answering the right questions 14 6... access the Internet .17 5 Chapter 11 : Creating Demilitarized Zones with a Single Firewall 17 9 Looking at the Demilitarized Zone: No-Man’s Land 17 9 Examing Typical DMZ Configurations 18 0 Designing Three-Pronged Firewalls 18 2 Pros and cons 18 2 Addressing decisions 18 3 Deploying a Three-Pronged Firewall 18 6 Deploying a tunnel .