Problématique et concepts de base


Avoid to put in the same area entities which have very different security requirements



Yüklə 446 b.
səhifə33/43
tarix02.01.2022
ölçüsü446 b.
#32251
1   ...   29   30   31   32   33   34   35   36   ...   43

Avoid to put in the same area entities which have very different security requirements



Using proxies (I)

  • Proxies can be used to « hide » the real servers/the real network

  • Exterior => Interior traffic

    • Gives the external user the illusion that she/he accesses to the interior server
    • But intercepts the traffic to the server, analyzes the packets (checks the compliance with the protocol, searches for keywords, etc.), logs the requests
  • Interior => Exterior traffic

    • Give the internal user the illusion that she/he accesses to the exterior server
    • But intercepts the traffic to the server, analyzes the packets (checks the compliance with the protocol, searches for keywords, etc.), logs the requests


Using proxies (II)

  • Advantage

    • knowledge of the service/protocol => efficiency and « intelligent » filtering
    • Ex : session tracking, stateful connection

  • Yüklə 446 b.

    Dostları ilə paylaş:
1   ...   29   30   31   32   33   34   35   36   ...   43




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©www.muhaz.org 2025
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin