11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

How To:Use IPSec for Filtering Ports<strong>and</strong> AuthenticationApplies ToThis information applies to server computers that run the following:●Microsoft ® Windows ® 2000 Server or Windows Server 2003 operating system● SQL Server 2000SummaryInternet Protocol security (IPSec) is a protocol, not a service, that provides encryption,integrity, <strong>and</strong> authentication services for IP-based network traffic. Because IPSecprovides server-to-server protection, you can use IPSec to counter internal threatsto the network, including eavesdropping, tampering, man in the middle attacks,IP spoofing, <strong>and</strong> other password-based attacks. IPSec is completely transparentto applications because encryption, integrity, <strong>and</strong> authentication services areimplemented at the transport level. <strong>Application</strong>s continue to communicatenormally with one another using TCP <strong>and</strong> UDP ports.ContentsThis How To contains the following sections:●●●●●What you must knowRestricting <strong>Web</strong> server communicationRestricting database server communicationRestricting server-to-server communicationUsing IPSec tools

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!