ALL >> Computers >> View Article
How Ipsec Is Used To Protect Data
IPSec can be used to protect communications between IIS and other servers A+ certificate(http://www.aplus-220-701.com)
that IIS must communicate with and between the administrative workstation and the IIS server. IPSec can also block communications that are not authorized. By requiring an IPSec-negotiated transport for data passed between computers, the confidentiality of the data is protected and the computers with which the IIS server will communicate are restricted. Blocking communications that are not authorized is important because doing so can eliminate attacks based on other protocols. IPSec blocking policy could be set, for example, to block all access except through port 80 (HTTP), port 443 (HTTPS) and, if required, 3389 terminal services. Access can also be controlled by blocking some types of access by specific server.
Two examples of using IPSec are shown in CompTIA A+ Practical Application(http://www.aplus-220-701.com)
. In the first figure, an administrative workstation on the internal network is used to administer an IIS server in the perimeter network. If the administrator workstation attempts ...
... a connection to the IIS server, an IPSec session is negotiated. IPSec policies on the IIS server and on the administrative workstation identify the IP addresses of each other and require certificates for authentication. In the second figure, data requested from the SQL server is returned. Both the request and response are encrypted. In the remote administration example, the data passes through the firewall because appropriate ports are configured.
Follow these guidelines when determining permissions to set for Web sites and virtual directories:
Remove the Read permissions if the entire site uses scripted content.
Do not set Write and Scripts Only permissions or Write and Scripts And
Executables permissions on the same directory.Doing so will allow visitors to add scripts or modify scripts and execute them.
Do not set Write and Script Source Access permissions or Read and Script Source Access permissions on the same directory.Allowing visitors to read
scripts might allow them to read free Microsoft certification exam papers(http://www.examshots.com/vendor/Microsoft-1.html)
sensitive data such as passwords. Allowing visitors to write scripts might allow them to do harm to the data or Web server.
Add Comment
Computers Articles
1. Spark Matrix™: Multi-carrier Parcel Management SolutionsAuthor: Umangp
2. Best Odoo Erp Software Company In Dubai For Business Growth
Author: Mayur Meheshwari
3. Top Challenges Faced By Equipment Rental Companies In The Uae — And How Erp Solves Them
Author: Al murooj solutions
4. Spark Matrix™: Intelligent Virtual Assistants (iva)
Author: Umangp
5. Pos Software Designed For Retail Operations
Author: EPOS Direct
6. Erp System That Reduces Stress And Improves Productivity
Author: Shalijah
7. Spark Matrix™: Global Service Parts Planning Application
Author: Umangp
8. Spark Matrix™: Enterprise Information Archiving
Author: Umangp
9. Textideo: Transforming Text Into Engaging Ai-powered Videos For Modern Creators
Author: Ethan Walker
10. Spark Matrix™: Enterprise Ai Search
Author: Umangp
11. What Identity Governance Really Means In Modern Enterprises
Author: Mansoor Alam
12. Strategies For Successful Site Selection In Clinical Trials
Author: Giselle Bates
13. Simplifying Business Purchases With Smart, Reliable Procurement Solutions
Author: suma
14. How Businesses In Dubai Are Scaling Faster With Modern Erp Software
Author: Al murooj solutions
15. How To Choose The Right Weapon Tracking System: 7 Must-have Features
Author: 3PL Insights






