【正文】
mple: accesslist 101 deny tcp host eq accesslist 101 deny udp any eq snmp accesslist 101 permit tcp any eq tel accesslist 101 permit tcp any eq smtp accesslist 101 deny tcp host gt 1024 log accesslist 101 permit ospf any any accesslist 101 deny any any this is an implicit rule and is not shown! 83 Basic router filtering Prevent spoofing Inter ? drop packets that have source address different from the assigned range accesslist 150 permit any 84 Basic router filtering Guard against IP address trust exploits ? drop packets with your work’s source address ing from inter accesslist 160 deny any 85 Basic router filtering Don’t help flooders ? prevent your work being used as a DoS amplifier no ip directed broadcast 86 Filtering traffic (1) public private web server server DNS server internal web server server NetBIOS shared disks and printers 87 Filtering traffic (2) public private web server server DNS server internal web server server NetBIOS shared disks and printers permit tcp/80 permit tcp/25 permit udp/53 88 Filtering traffic (3) public private web server server DNS server internal web server server NetBIOS shared disks and printers permit tcp established 89 Filtering traffic (4) public private web server server DNS server internal web server server NetBIOS shared disks and printers permit any 90 Filtering traffic (5) public private web server server DNS server internal web server server NetBIOS shared disks and printers permit tcp/25 permit udp/53 permit tcp established 91 Implement a firewall Inter your work public private firewall still allows transmission of information from private area into the Inter! 92 Stay informed ? subscribe to mailing lists (CERT/CC advisories, BugTraq, NTBugTraq, Microsoft security advisories, …) ? check for new exploits 93 Apply patches ? advisories often offer links to vendor patches ? if those are absent, consider a temporary service restriction sites still report various wellknown attacks, although patches have been available for several years 94 Monitor system activity and integrity ? store logs in a safe place ? check logs for suspicious entries ? pare checksums on essential binaries and configuration files (Tripwire) ? monitor ining connections (Argus, ip filters) ? test systems with scanners (nmap, nessus) 95 96 Use encryption ? encrypt your remote sessions (SSH Secure Shell) ? encourage use of encryption (PGP Pretty Good Privacy) ? encrypt sensitive data on servers 97 Prevention traps ? there is no perfect protection, not even with firewalls ? outofthebox solutions and ―zero administration‖ don’t exist 98 Reactive measures ? collect the evidence。 if necessary, do a full backup of promised hosts ? decide on followup actions block further attempts from intruders and sanitise promised hosts monitor intruder’s activities。 preferably setup a restricted fake environment ? report the incident 99 100 101 102 103 期末考試 ? 網(wǎng)絡(luò)拓撲設(shè)計 ? 傳輸方案設(shè)計 ? IP網(wǎng)絡(luò)設(shè)計 ? 設(shè)備選型 ? 路由設(shè)計 ? IP分配和網(wǎng)絡(luò)劃分 ? 配置管理方案 ? 故障監(jiān)控方案 ? 性能監(jiān)控方案 ? 安全監(jiān)控方案 ? 計費方案 ? 組織和管理流程設(shè)計