![Phân tích tư tưởng của nhân dân qua đoạn thơ: Những người vợ nhớ chồng… Những cuộc đời đã hóa sông núi ta trong Đất nước của Nguyễn Khoa Điềm](https://timtailieu.net/upload/document/136415/phan-tich-tu-tuong-cua-nhan-dan-qua-doan-tho-039-039-nhung-nguoi-vo-nho-chong-nhung-cuoc-doi-da-hoa-song-nui-ta-039-039-trong-dat-nuoc-cua-nguyen-khoa-136415.jpg)
Firewall Management Interface
Số trang: 7
Loại file: pdf
Dung lượng: 26.64 KB
Lượt xem: 19
Lượt tải: 0
Xem trước 2 trang đầu tiên của tài liệu này:
Thông tin tài liệu:
This section provides an overview and some examples of these interfaces. Managing Firewalls with a CLI A CLI enables you to use a specific instruction set to configure the firewall
Nội dung trích xuất từ tài liệu:
Firewall Management InterfaceFirewall Management InterfaceModern firewalls come with two administrative interfaces: • The CLI • The GUI (typically, but not necessarily, web based)This section provides an overview and some examples of these interfaces.Managing Firewalls with a CLIA CLI enables you to use a specific instruction set to configure the firewall. Mostfirewalls require the end user to do the initial configuration of the firewall (inputting inthe basic network information such as IP address, net mask, default gateway, andpossibly an administrative password) via CLI before the end user can switch over to theGUI. Linuxs NetFilter is, for the most part, configured through a CLI, although there doexist several products that allow for configuration of NetFilter-based firewalls through aGUI.CLIs require knowledge of the command set in the firewall product. For example, toconfigure NetFilter, use the IPTables CLI to allow inbound Secure Shell (SSH), e-mail,and web traffic (using TCP ports 22, 25, and 80, respectively) and deny all other trafficrequires the configuration in Example 11-1.Example 11-1. Configuring NetFilter with IPTables[View full width]# iptables -P INPUT DENY# iptables -P OUTPUT ACCEPT# iptables -P FORWARD ACCEPT# iptables -A INPUT -i lo -j ACCEPT# iptables -A INPUT -p tcp -s 0.0.0.0/0 -d 10.16.17.202 --dport 22 -m state --state NEW - j ACCEPT# iptables -A INPUT -p tcp -s 0.0.0.0/0 -d 10.16.17.202 --dport 25 -m state --state NEW -j ACCEPT# iptables -A INPUT -p tcp -s 0.0.0.0/0 -d 10.16.17.202 --dport 80 -m state --state NEW -j ACCEPT# iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT# iptables -A INPUT --reject-with icmp-host-prohibited -j REJECTExample 11-2 provides a similar configuration with the PIX command set.Example 11-2. Configuring a PIXgandalf(config)# access-list acl_test permit tcp any host 10.16.17.202 eq sshgandalf(config)# access-list acl_test permit tcp any host 10.16.17.202 eq smtpgandalf(config)# access-list acl_test permit tcp any host 10.16.17.202 eq 80gandalf(config)# access-list acl_test permit icmp any anygandalf(config)# access-list acl_test deny ip any anygandalf(config)# show access-list acl_testaccess-list acl_test; 5 elementsaccess-list acl_test line 1 permit tcp any host 10.16.17.202 eq ssh (hitcnt=0)access-list acl_test line 2 permit tcp any host 10.16.17.202 eq smtp (hitcnt=0)access-list acl_test line 3 permit tcp any host 10.16.17.202 eq www (hitcnt=0)access-list acl_test line 4 permit icmp any any (hitcnt=0)access-list acl_test line 5 deny ip any any (hitcnt=0)Knowledge of the command set is critical to effectively configure a firewall through aCLI. Many vendors (and third parties) have worked hard to reduce the configuration of afirewall to a more simplistic method. When the initial configuration is done (supplyingthe firewall software with an IP address and net mask), the end user can immediatelyswitch to a more graphical method of configuring the firewall.Managing Firewalls with a GUIA GUI provides a more-user-friendly interface to configure the firewall. Some firewallsare configured through a direct interface on the host, such as Symantec Norton InternetSecurity shown in Figure 11-1 and Figure 11-2, before the firewall is active. Some comewith a preconfigured IP address and an administrative password to be used for access bythe end user during initial configuration (such as Linksys or the PIX 501 and 506E seriessystems). Figure 11-1. Symantec Internet Security Configuration [View full size image]Figure 11-2. Symantec Firewall Configuration [View full size image]The PIX Device Manager (for PIX operating systems up to versions 6.3(5)), known as theCisco Adaptive Security Device Manager in PIX version 7.0, is a Java applet that isdownloaded from the PIX or ASA device and runs locally through the client browser.Figure 11-3 shows the PIX Device Manager screen. Figure 11-3. Cisco PIX Device Manager [View full size image]The information is presented in a more natural fashion to the end user in the form ofgraphics and graphs for performance.Not to be outdone, there are GUIs for Linuxs IPTables firewall software. Some are webbased (such as Webmin), and some are applications running on the Linux system itself(such as Firestarter or FW-Builder). Firestarter provides a simple, easy-to-use interfacefor IPTables, as shown in Figure 11-4. Figure 11-4. Firestarter for IPTables [View full size image]Webmin provides a method by which the firewall can be managed through a web browserinterface, which is more convenient than an application that can only be viewed on an XWindows-enabled server. Figure 11-5 shows this interface. ...
Nội dung trích xuất từ tài liệu:
Firewall Management InterfaceFirewall Management InterfaceModern firewalls come with two administrative interfaces: • The CLI • The GUI (typically, but not necessarily, web based)This section provides an overview and some examples of these interfaces.Managing Firewalls with a CLIA CLI enables you to use a specific instruction set to configure the firewall. Mostfirewalls require the end user to do the initial configuration of the firewall (inputting inthe basic network information such as IP address, net mask, default gateway, andpossibly an administrative password) via CLI before the end user can switch over to theGUI. Linuxs NetFilter is, for the most part, configured through a CLI, although there doexist several products that allow for configuration of NetFilter-based firewalls through aGUI.CLIs require knowledge of the command set in the firewall product. For example, toconfigure NetFilter, use the IPTables CLI to allow inbound Secure Shell (SSH), e-mail,and web traffic (using TCP ports 22, 25, and 80, respectively) and deny all other trafficrequires the configuration in Example 11-1.Example 11-1. Configuring NetFilter with IPTables[View full width]# iptables -P INPUT DENY# iptables -P OUTPUT ACCEPT# iptables -P FORWARD ACCEPT# iptables -A INPUT -i lo -j ACCEPT# iptables -A INPUT -p tcp -s 0.0.0.0/0 -d 10.16.17.202 --dport 22 -m state --state NEW - j ACCEPT# iptables -A INPUT -p tcp -s 0.0.0.0/0 -d 10.16.17.202 --dport 25 -m state --state NEW -j ACCEPT# iptables -A INPUT -p tcp -s 0.0.0.0/0 -d 10.16.17.202 --dport 80 -m state --state NEW -j ACCEPT# iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT# iptables -A INPUT --reject-with icmp-host-prohibited -j REJECTExample 11-2 provides a similar configuration with the PIX command set.Example 11-2. Configuring a PIXgandalf(config)# access-list acl_test permit tcp any host 10.16.17.202 eq sshgandalf(config)# access-list acl_test permit tcp any host 10.16.17.202 eq smtpgandalf(config)# access-list acl_test permit tcp any host 10.16.17.202 eq 80gandalf(config)# access-list acl_test permit icmp any anygandalf(config)# access-list acl_test deny ip any anygandalf(config)# show access-list acl_testaccess-list acl_test; 5 elementsaccess-list acl_test line 1 permit tcp any host 10.16.17.202 eq ssh (hitcnt=0)access-list acl_test line 2 permit tcp any host 10.16.17.202 eq smtp (hitcnt=0)access-list acl_test line 3 permit tcp any host 10.16.17.202 eq www (hitcnt=0)access-list acl_test line 4 permit icmp any any (hitcnt=0)access-list acl_test line 5 deny ip any any (hitcnt=0)Knowledge of the command set is critical to effectively configure a firewall through aCLI. Many vendors (and third parties) have worked hard to reduce the configuration of afirewall to a more simplistic method. When the initial configuration is done (supplyingthe firewall software with an IP address and net mask), the end user can immediatelyswitch to a more graphical method of configuring the firewall.Managing Firewalls with a GUIA GUI provides a more-user-friendly interface to configure the firewall. Some firewallsare configured through a direct interface on the host, such as Symantec Norton InternetSecurity shown in Figure 11-1 and Figure 11-2, before the firewall is active. Some comewith a preconfigured IP address and an administrative password to be used for access bythe end user during initial configuration (such as Linksys or the PIX 501 and 506E seriessystems). Figure 11-1. Symantec Internet Security Configuration [View full size image]Figure 11-2. Symantec Firewall Configuration [View full size image]The PIX Device Manager (for PIX operating systems up to versions 6.3(5)), known as theCisco Adaptive Security Device Manager in PIX version 7.0, is a Java applet that isdownloaded from the PIX or ASA device and runs locally through the client browser.Figure 11-3 shows the PIX Device Manager screen. Figure 11-3. Cisco PIX Device Manager [View full size image]The information is presented in a more natural fashion to the end user in the form ofgraphics and graphs for performance.Not to be outdone, there are GUIs for Linuxs IPTables firewall software. Some are webbased (such as Webmin), and some are applications running on the Linux system itself(such as Firestarter or FW-Builder). Firestarter provides a simple, easy-to-use interfacefor IPTables, as shown in Figure 11-4. Figure 11-4. Firestarter for IPTables [View full size image]Webmin provides a method by which the firewall can be managed through a web browserinterface, which is more convenient than an application that can only be viewed on an XWindows-enabled server. Figure 11-5 shows this interface. ...
Tìm kiếm theo từ khóa liên quan:
công nghệ thông tin an ninh bảo mật fire wall tường lửa Fire wall fundamentals Firewall Management InterfaceTài liệu liên quan:
-
52 trang 442 1 0
-
Top 10 mẹo 'đơn giản nhưng hữu ích' trong nhiếp ảnh
11 trang 332 0 0 -
74 trang 310 0 0
-
96 trang 307 0 0
-
Báo cáo thực tập thực tế: Nghiên cứu và xây dựng website bằng Wordpress
24 trang 300 0 0 -
Đồ án tốt nghiệp: Xây dựng ứng dụng di động android quản lý khách hàng cắt tóc
81 trang 293 0 0 -
Tài liệu dạy học môn Tin học trong chương trình đào tạo trình độ cao đẳng
348 trang 291 1 0 -
EBay - Internet và câu chuyện thần kỳ: Phần 1
143 trang 280 0 0 -
Tài liệu hướng dẫn sử dụng thư điện tử tài nguyên và môi trường
72 trang 275 0 0 -
64 trang 272 0 0