Eicon Networks S92 Instrukcja Użytkownika Strona 12

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 209
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 11
YuChakTinMichael‘sGIACGCFWProjectAssignment
Page 12
à InternalstaffsasVPNclientsaccessingexternalpartners’securesitesvia
PPTP
RAS:
Companystaffsareaccessingtheinhouseserverresourcesfromhomeorfrom
businesstripsviaRASdialin.RAStrafficdoesnotpassthroughtherouter.
ArchitectureOverview
A firewallisasystemdesignedtopreventunauthorizedaccesstoorfromaprivate
network. Itcanbeimplementedinbothhardwareandsoftware,oracombinationof
both.Sinceallmessagesenteringorleavingtheinternalnetworkmustpassthrough
thefirewallforsecurity examination,thefirewallitselfisapotentialbottleneck.Also,
regardlessofhowafirewallisimplemented,agoodfirewallproductcostsalargesum
ofmoney.
OurgoalforthesecurityarchitectureofGIACEnterpriseistosecureitsnetworkand
atthesametimeachieveabalancebetweensecurity,performanceandcost. To
achievesuchbalance,atthefrontlineweusehigherendsecurityproducts,whileat
thedepartmentallevelweusemoreeconomicalsolutions.
DesignPrincipleandTr adeoff
Theexhibitbelowshowsthatmultiplefirewallandroutingdevicesaredeployedin
thearchitecture.
Przeglądanie stron 11
1 2 ... 7 8 9 10 11 12 13 14 15 16 17 ... 208 209

Komentarze do niniejszej Instrukcji

Brak uwag