123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

How Ipsec Is Used To Protect Data

Profile Picture
By Author: unknownmem
Total Articles: 128
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

IPSec can be used to protect communications between IIS and other servers A+ certificate(http://www.aplus-220-701.com)
that IIS must communicate with and between the administrative workstation and the IIS server. IPSec can also block communications that are not authorized. By requiring an IPSec-negotiated transport for data passed between computers, the confidentiality of the data is protected and the computers with which the IIS server will communicate are restricted. Blocking communications that are not authorized is important because doing so can eliminate attacks based on other protocols. IPSec blocking policy could be set, for example, to block all access except through port 80 (HTTP), port 443 (HTTPS) and, if required, 3389 terminal services. Access can also be controlled by blocking some types of access by specific server.
Two examples of using IPSec are shown in CompTIA A+ Practical Application(http://www.aplus-220-701.com)
. In the first figure, an administrative workstation on the internal network is used to administer an IIS server in the perimeter network. If the administrator workstation attempts ...
... a connection to the IIS server, an IPSec session is negotiated. IPSec policies on the IIS server and on the administrative workstation identify the IP addresses of each other and require certificates for authentication. In the second figure, data requested from the SQL server is returned. Both the request and response are encrypted. In the remote administration example, the data passes through the firewall because appropriate ports are configured.

Follow these guidelines when determining permissions to set for Web sites and virtual directories:
Remove the Read permissions if the entire site uses scripted content.
Do not set Write and Scripts Only permissions or Write and Scripts And
Executables permissions on the same directory.Doing so will allow visitors to add scripts or modify scripts and execute them.
Do not set Write and Script Source Access permissions or Read and Script Source Access permissions on the same directory.Allowing visitors to read
scripts might allow them to read free Microsoft certification exam papers(http://www.examshots.com/vendor/Microsoft-1.html)
sensitive data such as passwords. Allowing visitors to write scripts might allow them to do harm to the data or Web server.

Total Views: 318Word Count: 340See All articles From Author

Add Comment

Computers Articles

1. Martindale Law Firm Competitive Analysis Data For Legal Industry
Author: Den Rediant

2. The Impact Of Digital Transformation In Clinical Trials
Author: Giselle Bates

3. Blending Art, Technology, And Access: A Look At Pure Art Sketch Community And Digital Portals
Author: new aurthors

4. Full Stack Development Company Driving Mvp Success Fast
Author: Rob Stephen

5. You May Need It Consulting Services But You Are Not Aware Of It Yet
Author: Helen Johns

6. Top Pos Dealers Solutions In 2025 | Best Pos Dealers In Hyderabad
Author: pbs

7. Newegg Product Data Scraping For E-commerce Market Intelligence
Author: Den Rediant

8. Coles & Woolworths Pricing Data Scraping For Retail Strategy
Author: Den Rediant

9. Answering_services
Author: brainbell10

10. Api_security
Author: brainbell10

11. Appium
Author: brainbell10

12. Out-of-stock Prediction Using Web Scraping For Inventory Management
Author: Den Rediant

13. Restaurant Data Scraping Api To Monitor Competitors In Real Time
Author: Den Rediant

14. Adobe_xd
Author: brainbell

15. Amazon Sagemaker Services
Author: brainbell10

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: