zoukankan      html  css  js  c++  java
  • Cyber Security

    Security policies:

    • Enforcing network traffic by configuring rules of what is allowed or denied to communicate between logical network segments (zones)
    • Traffic can be policed with the following parameters:
      • IP Address (source and/or destination)
      • Users
      • Services(ports)
      • Applications

     (From Packt)

    • Enforcement hierarchy:
      • Is essential to understand the security policy order of enforcement to avoid policy overruling
      • "A clean policy table limits the possibility of policy overruling"

    Task 1 

    Please block the student wireless network from reaching the server subnet.

    Source Zone         Source Address
    
    Student Wireless:   10.10.0.0/22
    
    Server Subnet:      10.30.0.0/23
    
    Destination Zone    Destination Address

     Configure the firewall policy.

     

     

     

     

     

     

     

     Task 2

    We are getting complaints of employees watching Netflix during work hours and it's causing our internet connection to crawl.

    - Please block the employee subnet 10.25.0.0/23 from accessing Netflix.

    Configure the firewall policy.

     

     

     

     

     

     

     

    相信未来 - 该面对的绝不逃避,该执著的永不怨悔,该舍弃的不再留念,该珍惜的好好把握。
  • 相关阅读:
    20165312 我期望的师生关系
    zookeeper04---ZAB协议
    zookeeper03-集群搭建
    zookeeper02
    Zookeeper01
    防止重复提交
    手动抛出异常事务回滚问题
    redis-07主从复制
    redis06-事务
    Redis-05持久化
  • 原文地址:https://www.cnblogs.com/keepmoving1113/p/12496683.html
Copyright © 2011-2022 走看看