freepeople性欧美熟妇, 色戒完整版无删减158分钟hd, 无码精品国产vα在线观看DVD, 丰满少妇伦精品无码专区在线观看,艾栗栗与纹身男宾馆3p50分钟,国产AV片在线观看,黑人与美女高潮,18岁女RAPPERDISSSUBS,国产手机在机看影片

正文內(nèi)容

計算機網(wǎng)絡(luò)管理第四章網(wǎng)絡(luò)測量和監(jiān)控-資料下載頁

2025-09-26 01:18本頁面
  

【正文】 mple: accesslist 101 deny tcp host eq accesslist 101 deny udp any eq snmp accesslist 101 permit tcp any eq tel accesslist 101 permit tcp any eq smtp accesslist 101 deny tcp host gt 1024 log accesslist 101 permit ospf any any accesslist 101 deny any any this is an implicit rule and is not shown! 83 Basic router filtering Prevent spoofing Inter ? drop packets that have source address different from the assigned range accesslist 150 permit any 84 Basic router filtering Guard against IP address trust exploits ? drop packets with your work’s source address ing from inter accesslist 160 deny any 85 Basic router filtering Don’t help flooders ? prevent your work being used as a DoS amplifier no ip directed broadcast 86 Filtering traffic (1) public private web server server DNS server internal web server server NetBIOS shared disks and printers 87 Filtering traffic (2) public private web server server DNS server internal web server server NetBIOS shared disks and printers permit tcp/80 permit tcp/25 permit udp/53 88 Filtering traffic (3) public private web server server DNS server internal web server server NetBIOS shared disks and printers permit tcp established 89 Filtering traffic (4) public private web server server DNS server internal web server server NetBIOS shared disks and printers permit any 90 Filtering traffic (5) public private web server server DNS server internal web server server NetBIOS shared disks and printers permit tcp/25 permit udp/53 permit tcp established 91 Implement a firewall Inter your work public private firewall still allows transmission of information from private area into the Inter! 92 Stay informed ? subscribe to mailing lists (CERT/CC advisories, BugTraq, NTBugTraq, Microsoft security advisories, …) ? check for new exploits 93 Apply patches ? advisories often offer links to vendor patches ? if those are absent, consider a temporary service restriction sites still report various wellknown attacks, although patches have been available for several years 94 Monitor system activity and integrity ? store logs in a safe place ? check logs for suspicious entries ? pare checksums on essential binaries and configuration files (Tripwire) ? monitor ining connections (Argus, ip filters) ? test systems with scanners (nmap, nessus) 95 96 Use encryption ? encrypt your remote sessions (SSH Secure Shell) ? encourage use of encryption (PGP Pretty Good Privacy) ? encrypt sensitive data on servers 97 Prevention traps ? there is no perfect protection, not even with firewalls ? outofthebox solutions and ―zero administration‖ don’t exist 98 Reactive measures ? collect the evidence。 if necessary, do a full backup of promised hosts ? decide on followup actions block further attempts from intruders and sanitise promised hosts monitor intruder’s activities。 preferably setup a restricted fake environment ? report the incident 99 100 101 102 103 期末考試 ? 網(wǎng)絡(luò)拓撲設(shè)計 ? 傳輸方案設(shè)計 ? IP網(wǎng)絡(luò)設(shè)計 ? 設(shè)備選型 ? 路由設(shè)計 ? IP分配和網(wǎng)絡(luò)劃分 ? 配置管理方案 ? 故障監(jiān)控方案 ? 性能監(jiān)控方案 ? 安全監(jiān)控方案 ? 計費方案 ? 組織和管理流程設(shè)計
點擊復(fù)制文檔內(nèi)容
醫(yī)療健康相關(guān)推薦
文庫吧 www.dybbs8.com
備案圖鄂ICP備17016276號-1