11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

How To: Harden the TCP/IP Stack 763Use the values summarized in Table 5 for maximum protectionTable 5 Recommended ValuesValue NameValue (REG_DWORD)DisableIPSourceRouting 1EnableFragmentChecking 1EnableMulticastForwarding 0IPEnableRouter 0EnableAddrMaskReply 0PitfallsWhen testing the changes of these values, test against the network volumes youexpect in production. These settings modify the thresholds of what is considerednormal <strong>and</strong> are deviating from the tested defaults. Some may be too narrow tosupport clients reliably if the connection speed from clients varies greatly.Additional ResourcesFor additional reading about TCP/IP, refer to the following resources:● For more information on hardening the TCP/IP stack, see Microsoft KnowledgeBase article, 315669, “How To: Harden the TCP/IP Stack Against Denial of ServiceAttacks in Windows 2000.”● For more details on the Windows 2000 TCP/IP implementation, see the MicrosoftPress book, “Windows 2000 TCP/IP Protocols <strong>and</strong> Services,” by Lee Davies.● For more information about the Windows 2000 TCP/IP implementation,see “Microsoft Windows 2000 TCP/IP Implementation Details,”at http://www.microsoft.com/technet/treeview/default.asp?url=/technet/itsolutions/network/deploy/depovg/tcpip2k.asp, on the TechNet <strong>Web</strong> site.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!