Securing Solaris Servers Using Host-based Firewalls

ثبت نشده
چکیده

This paper will cover the addition of security to several Solaris servers through the use of host-based firewall software. The servers reside on an unsecured university network. I will attempt to detail the choices that were made in the selection of the firewall software as well as its installation and configuration. I will conclude with a comparison of the vulnerability assessments from before and after.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security considerations with Squid proxy server

Securing and controlling workstation access to the web has never been an easy task for security professionals. Firewalls and access control list on routers alone may not bring an acceptable level of security for your organization. Even if their primary role is to reduce network traffic and improve performance, HTTP proxy servers (also called cache servers) are likely to be installed as an addit...

متن کامل

BSM Security Auditing for Solaris Servers

Although Solaris servers might be inside the firewall and relatively secure, there are still chances for a hacker to break in, or chances for an ordinary user to attempt malicious activities. Therefore, security efforts have to be made to detect intruders and to prevent unauthorized actions. One of the security utilities for Solaris servers is called BSM (Basic Security Module), which is an aud...

متن کامل

Oracle Solaris and Oracle SPARC Servers— Integrated and Optimized for Mission Critical Computing

This document is intended for IT architects, system administrators, and developers that want to understand the details of how Oracle ® Solaris and SPARC ® servers can improve your application solution environment. This paper will provide technical information on how Oracle Solaris and the SPARC processor have been highly optimized for each other, improving throughput, security, and resiliency t...

متن کامل

Securing BGP Using External Security Monitors

Security modifications to legacy network protocols are expensive and disruptive. This paper outlines an approach, based on external security monitors, for securing legacy protocols by deploying additional hosts that locally monitor the inputs and outputs of each host executing the protocol, check the behavior of the host against a safety specification, and communicate using an overlay to alert ...

متن کامل

Magic Quadrant for Enterprise Network Firewalls

The enterprise network firewall market represented by this Magic Quadrant is composed primarily of purpose-built appliances for securing enterprise corporate networks. Products must be able to support single-enterprise firewall deployments and large and/or complex deployments, including branch offices, multitiered demilitarized zones (DMZs) and, increasingly, the option to include virtual versi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003