Enterprise Considerations for Ports and Protocols
نویسندگان
چکیده
The need to control information flow to a restricted set of accepted protocols arises from the vulnerabilities that may come from any protocol. Reducing the acceptable protocols to a small set of well-tested standard protocols will reduce the attack surface and provide high confidence in selected communications. These protocols are restricted to specific ports or addresses in the receiving web service. HTTPS is familiarly restricted to port 443. In the standard nomenclature, this traffic may be configured as either Transmission Control Protocol (TCP) or User Datagram Protocol (UDP). The standard ports are defined by Internet Assigned Numbers Authority (IANA). The IANA is responsible for maintaining the official assignments of port numbers for specific uses. However, many unofficial uses of both well-known and registered port numbers occur in practice. Screening of acceptable ports and protocols has been done, in the past, by network appliances known as firewalls. Communications on the approved list were permitted, others blocked. However, many appliances now have such functionality and the server or service may have a host-based security system that can apply this functionality. This paper covers enterprise considerations for screening of ports and protocols. Index Terms — Appliance, Firewall, IT Security, Traffic
منابع مشابه
Issues and trends in router design
outers knit together the constituent networks of the global Internet, creating the illusion of a unified whole. While their primary role is to transfer packets from a set of input links to a set of output links, they must also deal with heterogeneous link technologies, provide scheduling support for differential service, and participate in complex distributed algorithms to generate globally coh...
متن کاملComparison of bauxite resources – geo-economical considerations
In order to meet the significantly increased metal demand of the world market, it has been decided to expand the capacity of the existing alumina refineries and to set up new plants (more than 2 Mt/a each). The selection among the bauxite sources is based on previous exploration data, such as: tonnage, grade, mineralogy, etc., the geographical position of the deposit, existing natural and const...
متن کاملA new multi-objective model for berth allocation and quay crane assignment problem with speed optimization and air emission considerations (A case study of Rajaee Port in Iran)
Over the past two decades, maritime transportation and container traffic worldwide has experienced rapid and continuous growth. With the increase in maritime transportation volume, the issue of greenhouse gas (GHG) emission has become one of the new concerns for port managers. Port managers and government agencies for sustainable development of maritime transportation considered "green ports" t...
متن کاملمروری بر پروتکل های بارگذاری فوری و زود هنگام در ایمپلنت های دندانی
Introduction: The concept of treating edentulous patients by osseointegrated implants was first proposed in 1960s. To minimize the failure rate of implants, it has been recommended to keep the implants free of load during the healing period .Recent studies have been directed to achieve faster integration and shorter healing periods prior to implant restoration. Loading protocols (immediate load...
متن کاملResearch and Implementation of dynamic DNS-based Enterprise Instant Messaging System
Instant messaging (IM) has infiltrated the enterprise in a big way. It is a fast and inexpensive way to communicate with people who are located elsewhere in the enterprise. There are two dominant standards (SIP/SIMPLE and Jabber/XMPP) and various proprietary IM solutions (MSN, Yahoo, AOL, etc). In this paper the existing standards and peripheral protocols are introduced and studied, and then sp...
متن کامل