Eicon Networks S92 Instrukcja Użytkownika Strona 2

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 209
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 1
YuChakTinMichael‘sGIACGCFWProjectAssignment
Page 2
TableofContents
Assignment1 ............................................................................................................ 8
Introduction....................................................................................................... 9
BusinessRequirement........................................................................................ 9
TechnicalRequirement ...................................................................................... 9
B2C: ........................................................................................................ 10
B2B: .........................................................................................................11
INET:........................................................................................................11
RAS:........................................................................................................ 12
ArchitectureOverview..................................................................................... 12
DesignPrincipleandTradeoff.......................................................................... 12
Subnets: ................................................................................................... 15
IPSettings:............................................................................................... 16
Overview: ................................................................................................ 17
LayersofProtection: ................................................................................ 18
Frontline/PrimaryFirewalls: .................................................................... 18
DepartmentalLevelFirewalls: ................................................................. 18
EquipmentGuidelines:............................................................................. 18
ListofEquipments:.................................................................................. 19
EquipmentsIPSettings: .......................................................................... 25
EquipmentFaultToleranceandRedundancy:........................................... 27
Assignment2 .......................................................................................................... 29
DesignPrinciple...................................................................................................... 30
LayeredArchitecture................................................................................ 30
OverallPolicyObjectives........................................................................................ 31
LocalPolicyEnforcement ....................................................................................... 35
ProductsPreparation................................................................................................ 39
EiconcardS92 ................................................................................................. 39
CheckPointFirewall1onhardenedWindowsNTServer ................................ 39
HardeningtheNTInstallation.......................................................................... 40
FineTuningtheNTConfiguration ................................................................... 41
Step1– Removeunusednetworkservices ............................................... 41
Step2 Disableunusedservices............................................................... 42
Step3– DisableNetBIOS........................................................................ 42
Step4 Removeunusedandpotentiallydangerouscomponents............... 43
Step5 Encryptthesystemaccountsdatabase. ........................................ 43
Step6 Strengthentheaccountandauditsettings. ................................... 44
Przeglądanie stron 1
1 2 3 4 5 6 7 ... 208 209

Komentarze do niniejszej Instrukcji

Brak uwag