Beyond- Security课件.pptVIP

  • 4
  • 0
  • 约4.83千字
  • 约 24页
  • 2019-05-17 发布于湖北
  • 举报
Introduction 4/4 These manipulations are mediated by a port knock daemon, running on the server, which monitors the firewall log file for connection attempts which can be translated into authentic knock sequences Once the desired ports are opened, the remote host can establish a connection and begin a session. Another knock sequence may used to trigger the closing of the port What is it good for? Port knocking is best for hosts that provide services to authorized users who require continual access to services and data from any location Port knocking is not suitable for hosts running public ser

您可能关注的文档

文档评论(0)

1亿VIP精品文档

相关文档