ALL >> Computers >> View Article
How Ipsec Is Used To Protect Data
IPSec can be used to protect communications between IIS and other servers A+ certificate(http://www.aplus-220-701.com)
that IIS must communicate with and between the administrative workstation and the IIS server. IPSec can also block communications that are not authorized. By requiring an IPSec-negotiated transport for data passed between computers, the confidentiality of the data is protected and the computers with which the IIS server will communicate are restricted. Blocking communications that are not authorized is important because doing so can eliminate attacks based on other protocols. IPSec blocking policy could be set, for example, to block all access except through port 80 (HTTP), port 443 (HTTPS) and, if required, 3389 terminal services. Access can also be controlled by blocking some types of access by specific server.
Two examples of using IPSec are shown in CompTIA A+ Practical Application(http://www.aplus-220-701.com)
. In the first figure, an administrative workstation on the internal network is used to administer an IIS server in the perimeter network. If the administrator workstation attempts ...
... a connection to the IIS server, an IPSec session is negotiated. IPSec policies on the IIS server and on the administrative workstation identify the IP addresses of each other and require certificates for authentication. In the second figure, data requested from the SQL server is returned. Both the request and response are encrypted. In the remote administration example, the data passes through the firewall because appropriate ports are configured.
Follow these guidelines when determining permissions to set for Web sites and virtual directories:
Remove the Read permissions if the entire site uses scripted content.
Do not set Write and Scripts Only permissions or Write and Scripts And
Executables permissions on the same directory.Doing so will allow visitors to add scripts or modify scripts and execute them.
Do not set Write and Script Source Access permissions or Read and Script Source Access permissions on the same directory.Allowing visitors to read
scripts might allow them to read free Microsoft certification exam papers(http://www.examshots.com/vendor/Microsoft-1.html)
sensitive data such as passwords. Allowing visitors to write scripts might allow them to do harm to the data or Web server.
Add Comment
Computers Articles
1. Web Scraping Top Grocery Chains In MichiganAuthor: FoodDataScrape
2. How Refurbished Laptops Help Students Save Money And Study Smarter In 2025
Author: usedstore
3. Why The Ls3002 Barcode Scanner Is Perfect For Retail In 2025
Author: prime pos
4. Does Cleaning Temporary Files Really Improve Laptop Speed? (what To Expect)
Author: Neha Jain
5. Extract Supermarket Data From Walmart & Target In Usa
Author: FoodDataScrape
6. How Odoo Partners Drive Growth: From Implementation To Innovation
Author: Alex Forsyth
7. Leverage Web Scraping Cold Drinks Data On Swiggy Instamart
Author: FoodDataScrape
8. Empowering Universities Through Student Engagement Crm Solutions|e2s
Author: Brenda Joyce
9. Odoo Manufacturing And Lean Practices For Small And Medium Enterprises
Author: Alex Forsyth
10. How Posiflex Pos Machines Enhances Customer Service
Author: pbs
11. Scrape Keeta Food Delivery App Data In Saudi Arabia For Insights
Author: FoodDataScrape
12. Microsoft Office Professional Plus 2021 Vs. Microsoft Office Professional Plus 2024: Which One Should You Choose?
Author: davudobuya55
13. Microsoft Office Professional Plus 2019 Vs. Microsoft Office Professional Plus 2019 Dvd: Which Version Should You Choose?
Author: davudobuya55
14. Microsoft Office Professional 2024 Vs. Microsoft Office Professional Plus 2010: Which One Is Right For You?
Author: davudobuya55
15. Microsoft Office Home Business 2021 For Mac Vs Microsoft Office Home Student 2021 For Mac: Which Is Right For You?
Author: davudobuya55






