亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? ch16.htm

?? this explains the working of intranets.
?? HTM
字號:
<HTML><HEAD><TITLE>Chapter  16 --  How Bastion Hosts Work</TITLE><META></HEAD><BODY TEXT="#000000" BGCOLOR="#FFFFFF" LINK="#0000EE" VLINK="#551A8B" ALINK="#CE2910"><H1><FONT SIZE=6 COLOR=#FF0000>Chapter&nbsp;16</FONT></H1><H1><FONT SIZE=6 COLOR=#FF0000>How Bastion Hosts Work</FONT></H1><HR><P><CENTER><B><FONT SIZE=5><A NAME="CONTENTS">CONTENTS</A></FONT></B></CENTER><UL><LI><A HREF="#HowBastionHostsWork">How Bastion Hosts Work</A></UL><HR><P>One of the best ways to protect an intranet from attack is toput a heavily fortified <I>bastion host</I> or <I>bastion server</I>in a firewall. Having a bastion host means that all access toan intranet from the Internet will be required to come throughthe bastion host. By concentrating all access in a single server,or a small group of servers, it's much easier to protect the entireintranet.<P>The bastion host does not provide intranet services itself. Whenit receives a request from the Internet for an intranet service,the host passes the request to the appropriate server. Subsequently,it takes the response and passes it back to the Internet.<P>Proxy server programs can also run on bastion hosts. That is,when someone on the intranet wants to get at an Internet resource,they first contact the proxy server on the bastion host, and thebastion host then relays the request to the Internet server. TheInternet server sends the information to the proxy server on thebastion host, which in turn passes the information back to theuser on the intranet.<P>Several means are taken to ensure that the bastion host is assecure as possible-and also to make sure that if the host is hackedinto, intranet security won't be compromised.<P>To make the bastion host secure, it is stripped of all but themost basic services. A typical network server provides login,file, print, and other services, including access to additionalservers. On a bastion host, those services have been prohibited.Since there are no user accounts, it's difficult for someone tobreak in using passwords. Since it has few services available,even if someone did break in, there wouldn't be much they coulddo with it.<P>For even more security, bastion hosts can be put on a privatesubnet (often referred to as a <I>perimeter network</I>), furtherisolating the host so that if someone breaks into it, they canonly get access to that subnet, not to the rest of the intranet.A filtering router reviews packets coming from the private subnet,making sure that only authorized incoming requests pass throughto the intranet.<P>Even more security measures can protect the server and intranet,sending alerts to intranet administrators if someone is tryingto break in. The bastion host can log all access to it, and keepa secure backup of that log on a physically separate machine connectedby the serial port so no one can gain access to the log remotely.System administrators can examine the log for signs of break-ins.Even more powerful are monitoring programs that watch the logand sound an alarm if it detects someone has been trying to breakinto the server. Auditing software can also constantly check theserver software to see if it has been altered in any way-a possiblesign that an intruder has successfully attacked it and taken controlof its resources.<H2><A NAME="HowBastionHostsWork"><FONT SIZE=5 COLOR=#FF0000>How Bastion Hosts Work</FONT></A></H2><P>A bastion host (also called a bastion server) is one of the maindefenses in an intranet firewall. It's a heavily fortified serverthat sits inside the firewall, and it is the main point of contactbetween the intranet and the Internet. By having an isolated,heavily defended server as the main point of contact, the restof the intranet resources can be shielded from attacks startingon the Internet.<UL><LI>Bastion hosts are built so that every network service possibleis disabled on them-the only thing the server does is allow forspecified Internet access. So, for example, there should be nouser accounts on a bastion server, so that no one can log intoit and take control of it and then gain access to the intranet.Even the Network File System (NFS), which allows a system to accessfiles across a network on a remote system, should be disabled,so that intruders can't gain access to the bastion server andthen get at files on the intranet. The safest way to use bastionhosts is to put them on their own subnet as part of an intranetfirewall. By putting them on their own network, if they are brokeninto, no other intranet resources are compromised.<LI>Bastion servers log all activity so that intranet administratorscan tell if the intranet has been attacked. They often keep twocopies of system logs for security reasons: In case one log isdestroyed or tampered with, the other log is always availableas a backup. One way to keep a secure copy of the log is to connectthe bastion server via a serial port to a dedicated computer,whose only purpose is to keep track of the secure backup log.<LI>Automated monitors are even more sophisticated programs thanauditing software. Automated monitors regularly check the bastionserver's system logs, and send an alarm if it finds a suspiciouspattern. For example, an alarm might be sent if someone attemptedmore than three unsuccessful logins.<LI>There can be more than one bastion host in a firewall. Eachbastion host can handle one or more Internet services for theintranet. Sometimes, a bastion host can be used as a victim machine.This is a server that is stripped bare of almost all servicesexcept one specific Internet service. Victim machines can be usedto provide Internet services that are hard to handle using proxyingor a filtering router, or whose security concerns are not yetknown. The services are put on the victim machine instead of abastion host with other services. That way, if the server is brokeninto, other bastion hosts won't be affected.<LI>Placing a filtering router between the bastion host and theintranet provides additional security. The filtering router checksall packets between the Internet and the intranet, dropping unauthorizedtraffic.<LI>When a bastion server receives a request for a service, suchas sending a Web page or delivering e-mail, the server doesn'thandle the request itself. Instead, it sends the request alongto the appropriate intranet server. The intranet server handlesthe request, and then sends the information back to the bastionserver. The bastion server now sends the requested informationto the requester on the Internet.<LI>Some bastion servers include auditing programs, which activelycheck to see whether an attack has been launched against them.There are a variety of ways to do auditing. One way to audit isto use a checksum program, which checks to see whether any softwareon the bastion server has been changed by an unauthorized person.A checksum program calculates a number based on the size of anexecutable program on the server. It then regularly calculatesthe checksum to see if it has changed. If it has changed, someonehas altered the software, which could signal an attack.</UL><HR><CENTER><P><A HREF="ch15.htm"><IMG SRC="PC.GIF" BORDER=0 HEIGHT=88 WIDTH=140></A><A HREF="#CONTENTS"><IMG SRC="CC.GIF" BORDER=0 HEIGHT=88 WIDTH=140></A><A HREF="contents.htm"><IMG SRC="HB.GIF" BORDER=0 HEIGHT=88 WIDTH=140></A><A HREF="ch17.htm"><IMG SRC="NC.GIF" BORDER=0 HEIGHT=88 WIDTH=140></A><HR WIDTH="100%"></P></CENTER></BODY></HTML>

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
综合色天天鬼久久鬼色| 日韩一级黄色大片| 亚洲精品久久嫩草网站秘色| av午夜一区麻豆| 成人免费在线播放视频| 在线区一区二视频| 日韩电影免费在线看| 欧美大片顶级少妇| 国产精品一区二区在线观看不卡| 国产精品少妇自拍| 在线观看网站黄不卡| 五月激情综合婷婷| 久久久久久久久久久黄色| 不卡av在线免费观看| 一级女性全黄久久生活片免费| 91麻豆精品国产综合久久久久久| 美女网站色91| 综合色中文字幕| 欧美一区二区视频在线观看| 国产精品羞羞答答xxdd| 亚洲欧美韩国综合色| 4438x亚洲最大成人网| 国产乱国产乱300精品| 一二三区精品视频| 精品国产精品网麻豆系列| av电影在线观看完整版一区二区| 亚洲一区二区高清| 久久久亚洲欧洲日产国码αv| caoporn国产精品| 日本伊人精品一区二区三区观看方式| 国产精品久久久久9999吃药| 欧美日韩国产a| 成人黄色电影在线 | 国产成a人亚洲| 一区二区在线观看视频| 久久久亚洲综合| 88在线观看91蜜桃国自产| 国产不卡高清在线观看视频| 婷婷丁香激情综合| 综合激情成人伊人| 久久蜜桃av一区精品变态类天堂 | 国产精品成人在线观看| 欧美一区二区免费| 91成人在线精品| 成人午夜看片网址| 精品一区二区免费| 五月天视频一区| 亚洲精品乱码久久久久| 国产精品午夜在线观看| 日韩一级大片在线观看| 欧美亚洲动漫另类| va亚洲va日韩不卡在线观看| 紧缚奴在线一区二区三区| 天天操天天干天天综合网| 亚洲精品成人在线| 综合av第一页| 日韩美女视频一区二区| 国产日韩欧美激情| 亚洲精品一区二区在线观看| 日韩一卡二卡三卡| 欧美电影一区二区| 欧美日韩一区二区在线观看 | 日韩一区二区三区电影在线观看| 在线亚洲欧美专区二区| thepron国产精品| 成人网页在线观看| 成人中文字幕合集| 成人综合婷婷国产精品久久| 国产suv精品一区二区三区| 国产精品综合二区| 国产成人啪免费观看软件| 国产精品一区免费视频| 国产成人免费视频一区| 国产精品一二三在| 国产盗摄视频一区二区三区| 国产精品主播直播| 成人听书哪个软件好| 国产成人免费网站| av午夜一区麻豆| 91在线观看污| 色偷偷一区二区三区| 色屁屁一区二区| 欧美色老头old∨ideo| 欧美日韩中文另类| 在线播放91灌醉迷j高跟美女 | 综合色天天鬼久久鬼色| 亚洲桃色在线一区| 亚洲综合一区在线| 性做久久久久久免费观看欧美| 亚洲一区二区三区美女| 天堂成人国产精品一区| 青青草视频一区| 国产自产高清不卡| 暴力调教一区二区三区| 在线视频亚洲一区| 日韩一级成人av| 国产三级精品视频| 亚洲精品一二三| 天堂va蜜桃一区二区三区 | 日韩欧美一二三区| 日本一区二区在线不卡| 亚洲精品久久久久久国产精华液 | 老司机免费视频一区二区三区| 激情综合色播激情啊| av欧美精品.com| 欧美精品在线一区二区三区| 久久午夜羞羞影院免费观看| 中文字幕在线不卡一区二区三区| 亚洲高清不卡在线| 久久成人免费电影| 91尤物视频在线观看| 日韩三级免费观看| 国产精品免费丝袜| 日韩黄色在线观看| 成人精品国产福利| 宅男噜噜噜66一区二区66| 国产欧美精品一区二区三区四区| 亚洲午夜一区二区三区| 国产精品主播直播| 一本大道久久精品懂色aⅴ| 欧美一区二区精品| 中文字幕制服丝袜成人av | 婷婷夜色潮精品综合在线| 国产一区二区福利| 91福利精品视频| 欧美激情一区二区三区不卡| 性久久久久久久久久久久| 国产福利精品导航| 欧美一区二区三区成人| 日韩毛片视频在线看| 国产精品一线二线三线精华| 欧美老肥妇做.爰bbww| 中文字幕在线观看一区二区| 久久国产精品99精品国产 | 日本美女一区二区三区视频| 成人av资源网站| 久久精品一区二区三区av| 丝袜美腿亚洲色图| 91日韩精品一区| 中文字幕精品在线不卡| 激情综合色综合久久综合| 欧美色精品天天在线观看视频| 中文字幕第一区综合| 国产一区不卡视频| 欧美一区二区视频观看视频 | 欧美成人精品1314www| 亚洲国产色一区| 91在线你懂得| 国产精品久久久久aaaa樱花| 国产精品影视网| 欧美精品一区在线观看| 日本成人在线一区| 欧美日韩午夜影院| 一区二区三区欧美视频| 99久久精品免费看国产免费软件| 欧美国产综合色视频| 国产激情一区二区三区四区| 精品成人一区二区三区四区| 青青草国产精品97视觉盛宴| 在线亚洲免费视频| 亚洲综合在线第一页| 欧洲激情一区二区| 亚洲精品成人a在线观看| 色国产综合视频| 亚洲一二三级电影| 欧美日韩免费高清一区色橹橹| 夜色激情一区二区| 色美美综合视频| 亚洲国产视频直播| 日韩一区二区电影| 国模娜娜一区二区三区| 久久久欧美精品sm网站| 高清国产一区二区三区| 中文欧美字幕免费| bt7086福利一区国产| 亚洲免费视频成人| 欧美日本乱大交xxxxx| 午夜欧美一区二区三区在线播放| 欧美高清视频不卡网| 日韩av中文字幕一区二区| 欧美xxxxxxxxx| 成人免费视频一区| 一区二区三区日韩在线观看| 欧美日韩www| 黄色小说综合网站| 国产精品理论片在线观看| 91一区二区在线| 五月综合激情日本mⅴ| 欧美www视频| 高清视频一区二区| 亚洲一二三级电影| 久久蜜桃av一区精品变态类天堂| 风间由美中文字幕在线看视频国产欧美| 国产精品久久久久久久久久久免费看| 在线免费不卡电影| 免费av成人在线| 国产精品免费丝袜| 91麻豆精品国产自产在线| 国产精品888| 亚洲午夜电影在线|