11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

484 Part IV: Securing Your Network, Host, <strong>and</strong> <strong>Application</strong>If your deployment architecture includes a remote application tier, transactions arenormally initiated there within the Enterprise Services application <strong>and</strong> arepropagated to the database server. In the absence of an application server, theEnterprise Services application on the <strong>Web</strong> server initiates the transaction <strong>and</strong>propagates it to the SQL Server resource manager.For information about configuring firewalls to support DTC traffic, see:●●●“DTC <strong>Security</strong> Considerations” in the COM+ platform SDK athttp://msdn.microsoft.com/library/default.asp?url=/library/en-us/cossdk/htm/pgdtc_admin_9dkj.aspMicrosoft Knowledge Base article 250367, “INFO: Configuring MicrosoftDistributed Transaction Coordinator (DTC) to Work Through a Firewall.”Microsoft Knowledge Base article 306843, “How To: Troubleshoot MS DTCFirewall Issues.”.NET RemotingIf you use the HTTP channel <strong>and</strong> host your remote components in ASP.NET, onlyopen port 80 on the internal firewall to allow HTTP traffic. If your application alsouses SSL, open port 443.If you use the TCP channel <strong>and</strong> host in a Windows service, open the specific TCP portor ports that your Remoting application has been configured to use. The applicationmight need an additional port to support callbacks.Figure 17.4 shows a typical .NET Remoting firewall port configuration. Note that theport numbers shown for the TCP channel scenario (5555 <strong>and</strong> 5557) are illustrations.The actual port numbers are specified in web.config configuration files on the client<strong>and</strong> server machines. For more information, see Chapter 13, “Building SecureRemoted Components.”

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!