下载此文档

checkpoint学习笔记.doc


文档分类:外语学习 | 页数:约9页 举报非法文档有奖
1/9
下载提示
  • 1.该资料是网友上传的,本站提供全文预览,预览什么样,下载就什么样。
  • 2.下载该文档所得收入归上传者、原创者。
  • 3.下载的文档,不会出现我们的网址水印。
1/9 下载此文档
文档列表 文档介绍
IT Security
Preventative Detective Responsive
Creating a Security Policy
Guidelines
The implementation of any firewall technology should follow these basic rules:
The firewall should allow for filtering munication protocols based plex rule sets.
The firewall should provide extensive logging of traffic passed and blocked.
The firewall should be the only entry and exit point to the public from panyX LAN.
The firewall operating system should be sufficiently hardened to resist attack both internal and external.
The firewall should fail closed.
The firewall should not disclose the internal nature, names, or addressing of panyX LAN.
The firewall should only provide firewall services. No other service or application should be running on the firewall.
Standards
The implementation of any firewall must follow these basic rules:
It is the policy that only the identified firewall administrator is allowed to make changes to the configuration of the firewall.
It is the policy that all firewalls must follow the default rule:That whih is not expressly permitted is denied.
In addition, the following standards for works are as follows:
The deployment of public services and resources shall be positioned behind the firewall in a protected .
The firewall shall be configured to disallow traffic that originates in the to the general LAN.
Any application work resource residing out

checkpoint学习笔记 来自淘豆网m.daumloan.com转载请标明出处.

相关文档 更多>>
非法内容举报中心
文档信息
  • 页数9
  • 收藏数0 收藏
  • 顶次数0
  • 上传人86979448
  • 文件大小139 KB
  • 时间2018-01-20
最近更新