Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

IPSEC

Posted on 2011-02-22
6
Medium Priority
?
274 Views
Last Modified: 2012-05-11
The network consists of an internal network and a perimeter network. The
internal network is protected by a firewall. The perimeter network is exposed to
the Internet.
You are deploying 10 Windows Server 2003 computers as Web servers. The servers
will be located in the perimeter network. The servers will host only publicly
available Web pages.
You want to reduce the possibility that users can gain unauthorized access to the
servers. You are concerned that a user will probe the Web servers and find ports
or services to attack.?

/////////////////////////

I agree with the d because others can cause performance issue.
0
Comment
Question by:kunalclk
  • 3
  • 2
6 Comments
 
LVL 18

Accepted Solution

by:
jmeggers earned 1000 total points
ID: 34957131
Is there really a question here?  At the very least, the servers should go in a DMZ off the firewall so they are protected to some degree.  For web servers, you should also (or perhaps instead) use a web application firewall to look for specific HTTP attacks.
0
 
LVL 39

Expert Comment

by:Krzysztof Pytko
ID: 34958481
Yes, answers for this question would be helpful ;)

My opinion (if you're interested :) ) It doesn't matter which access method you will use because when user will be connected to the server it can always run port,services discovery. I don't know if there is anything related with File and Printer sharing? That could disallow port/services discovery

Regards,
Krzysztof
0
 
LVL 2

Author Comment

by:kunalclk
ID: 34963631
A. Disable File and Printer Sharing on the servers
B. Disable the IIS Admin service on the servers
C. Enable Server Message Block (SMB) signing on the servers
D. Assign the Secure Server (Require Security) IPSec policy to the servers
0
Free learning courses: Active Directory Deep Dive

Get a firm grasp on your IT environment when you learn Active Directory best practices with Veeam! Watch all, or choose any amount, of this three-part webinar series to improve your skills. From the basics to virtualization and backup, we got you covered.

 
LVL 39

Assisted Solution

by:Krzysztof Pytko
Krzysztof Pytko earned 1000 total points
ID: 34963724
Definitively A answer :]

Krzysztof
0
 
LVL 2

Author Closing Comment

by:kunalclk
ID: 34964078
tnx
0
 
LVL 39

Expert Comment

by:Krzysztof Pytko
ID: 34964094
Some article about that (maybe not strictly about reason but explains some issues)
http://support.microsoft.com/kb/199346

Krzysztof
0

Featured Post

Nothing ever in the clear!

This technical paper will help you implement VMware’s VM encryption as well as implement Veeam encryption which together will achieve the nothing ever in the clear goal. If a bad guy steals VMs, backups or traffic they get nothing.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Microsoft Office 365 is a subscriptions based service which includes services like Exchange Online and Skype for business Online. These services integrate with Microsoft's online version of Active Directory called Azure Active Directory.
It’s time for spooky stories and consuming way too much sugar, including the many treats we’ve whipped for you in the world of tech. Check it out!
This tutorial will walk an individual through setting the global and backup job media overwrite and protection periods in Backup Exec 2012. Log onto the Backup Exec Central Administration Server. Examine the services. If all or most of them are stop…
This Micro Tutorial hows how you can integrate  Mac OSX to a Windows Active Directory Domain. Apple has made it easy to allow users to bind their macs to a windows domain with relative ease. The following video show how to bind OSX Mavericks to …

886 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question