ALL >> Computers >> View Article
How Ipsec Is Used To Protect Data
IPSec can be used to protect communications between IIS and other servers A+ certificate(http://www.aplus-220-701.com)
that IIS must communicate with and between the administrative workstation and the IIS server. IPSec can also block communications that are not authorized. By requiring an IPSec-negotiated transport for data passed between computers, the confidentiality of the data is protected and the computers with which the IIS server will communicate are restricted. Blocking communications that are not authorized is important because doing so can eliminate attacks based on other protocols. IPSec blocking policy could be set, for example, to block all access except through port 80 (HTTP), port 443 (HTTPS) and, if required, 3389 terminal services. Access can also be controlled by blocking some types of access by specific server.
Two examples of using IPSec are shown in CompTIA A+ Practical Application(http://www.aplus-220-701.com)
. In the first figure, an administrative workstation on the internal network is used to administer an IIS server in the perimeter network. If the administrator workstation attempts ...
... a connection to the IIS server, an IPSec session is negotiated. IPSec policies on the IIS server and on the administrative workstation identify the IP addresses of each other and require certificates for authentication. In the second figure, data requested from the SQL server is returned. Both the request and response are encrypted. In the remote administration example, the data passes through the firewall because appropriate ports are configured.
Follow these guidelines when determining permissions to set for Web sites and virtual directories:
Remove the Read permissions if the entire site uses scripted content.
Do not set Write and Scripts Only permissions or Write and Scripts And
Executables permissions on the same directory.Doing so will allow visitors to add scripts or modify scripts and execute them.
Do not set Write and Script Source Access permissions or Read and Script Source Access permissions on the same directory.Allowing visitors to read
scripts might allow them to read free Microsoft certification exam papers(http://www.examshots.com/vendor/Microsoft-1.html)
sensitive data such as passwords. Allowing visitors to write scripts might allow them to do harm to the data or Web server.
Add Comment
Computers Articles
1. Access Review Fatigue Is Not A People Problem. It Is A Design ProblemAuthor: Tushar Pansare
2. Which Is The Best Data Recovery Service Provider In Delhi?
Author: Stellar Data Recovery India
3. Microsoft Access 2024 Vs. Microsoft Excel 2024: Which Tool Should You Use?
Author: davudobuya55
4. When Identity Governance Becomes An Audit Ritual
Author: Mansoor Alam
5. Power Virtual Agents To Microsoft Copilot studio
Author: brainbell10
6. Dream11 Clone App Guide For The Upcoming Ipl Season
Author: Jorden James
7. Computer Network Tutorial: Step-by-step Guide To Networking Fundamentals
Author: Tech Point
8. Ai Video Creation Services In Chandigarh | Growchip Ai Technologies
Author: AI Video Creation Services
9. Why Online Privacy Matters More Than Ever In 2026
Author: Faraz
10. Spark Matrix™: Data Integration Tools
Author: Umangp
11. D365 Consultant Business Success
Author: brainbell10
12. Medical High-end Touch Monitor From Fortec Integrated
Author: FORTEC Integrated GmbH
13. Why Rugtek Ls3002 Is Best For Retail Barcode Scanning
Author: prime pos
14. Spark Matrix™: Conversational Commerce
Author: Umangp
15. Multi-path Cellular Aggregation | Cellular Sd-wan India | Smoad
Author: SMOD






