Solved

IPSEC

Posted on 2011-02-22
6
263 Views
Last Modified: 2012-05-11
The network consists of an internal network and a perimeter network. The
internal network is protected by a firewall. The perimeter network is exposed to
the Internet.
You are deploying 10 Windows Server 2003 computers as Web servers. The servers
will be located in the perimeter network. The servers will host only publicly
available Web pages.
You want to reduce the possibility that users can gain unauthorized access to the
servers. You are concerned that a user will probe the Web servers and find ports
or services to attack.?

/////////////////////////

I agree with the d because others can cause performance issue.
0
Comment
Question by:kunalclk
  • 3
  • 2
6 Comments
 
LVL 18

Accepted Solution

by:
jmeggers earned 250 total points
ID: 34957131
Is there really a question here?  At the very least, the servers should go in a DMZ off the firewall so they are protected to some degree.  For web servers, you should also (or perhaps instead) use a web application firewall to look for specific HTTP attacks.
0
 
LVL 39

Expert Comment

by:Krzysztof Pytko
ID: 34958481
Yes, answers for this question would be helpful ;)

My opinion (if you're interested :) ) It doesn't matter which access method you will use because when user will be connected to the server it can always run port,services discovery. I don't know if there is anything related with File and Printer sharing? That could disallow port/services discovery

Regards,
Krzysztof
0
 
LVL 2

Author Comment

by:kunalclk
ID: 34963631
A. Disable File and Printer Sharing on the servers
B. Disable the IIS Admin service on the servers
C. Enable Server Message Block (SMB) signing on the servers
D. Assign the Secure Server (Require Security) IPSec policy to the servers
0
PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

 
LVL 39

Assisted Solution

by:Krzysztof Pytko
Krzysztof Pytko earned 250 total points
ID: 34963724
Definitively A answer :]

Krzysztof
0
 
LVL 2

Author Closing Comment

by:kunalclk
ID: 34964078
tnx
0
 
LVL 39

Expert Comment

by:Krzysztof Pytko
ID: 34964094
Some article about that (maybe not strictly about reason but explains some issues)
http://support.microsoft.com/kb/199346

Krzysztof
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article runs through the process of deploying a single EXE application selectively to a group of user.
This article explains how to install and use the NTBackup utility that comes with Windows Server.
This tutorial will walk an individual through the steps necessary to install and configure the Windows Server Backup Utility. Directly connect an external storage device such as a USB drive, or CD\DVD burner: If the device is a USB drive, ensure i…
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles from a Windows Server 2008 domain controller to a Windows Server 2012 domain controlle…

820 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question