Securing Solaris Servers Using Host-based Firewalls
ثبت نشده
چکیده
This paper will cover the addition of security to several Solaris servers through the use of host-based firewall software. The servers reside on an unsecured university network. I will attempt to detail the choices that were made in the selection of the firewall software as well as its installation and configuration. I will conclude with a comparison of the vulnerability assessments from before and after.
منابع مشابه
Security considerations with Squid proxy server
Securing and controlling workstation access to the web has never been an easy task for security professionals. Firewalls and access control list on routers alone may not bring an acceptable level of security for your organization. Even if their primary role is to reduce network traffic and improve performance, HTTP proxy servers (also called cache servers) are likely to be installed as an addit...
متن کاملBSM Security Auditing for Solaris Servers
Although Solaris servers might be inside the firewall and relatively secure, there are still chances for a hacker to break in, or chances for an ordinary user to attempt malicious activities. Therefore, security efforts have to be made to detect intruders and to prevent unauthorized actions. One of the security utilities for Solaris servers is called BSM (Basic Security Module), which is an aud...
متن کاملOracle Solaris and Oracle SPARC Servers— Integrated and Optimized for Mission Critical Computing
This document is intended for IT architects, system administrators, and developers that want to understand the details of how Oracle ® Solaris and SPARC ® servers can improve your application solution environment. This paper will provide technical information on how Oracle Solaris and the SPARC processor have been highly optimized for each other, improving throughput, security, and resiliency t...
متن کاملSecuring BGP Using External Security Monitors
Security modifications to legacy network protocols are expensive and disruptive. This paper outlines an approach, based on external security monitors, for securing legacy protocols by deploying additional hosts that locally monitor the inputs and outputs of each host executing the protocol, check the behavior of the host against a safety specification, and communicate using an overlay to alert ...
متن کاملMagic Quadrant for Enterprise Network Firewalls
The enterprise network firewall market represented by this Magic Quadrant is composed primarily of purpose-built appliances for securing enterprise corporate networks. Products must be able to support single-enterprise firewall deployments and large and/or complex deployments, including branch offices, multitiered demilitarized zones (DMZs) and, increasingly, the option to include virtual versi...
متن کامل