- 1
- 0
- 约1.38万字
- 约 36页
- 2025-09-01 发布于北京
- 举报
Objectives
Aftercompletingthisson,youshouldbeabletodothe
following:
•Describehowfirewallsareusedtorestrictnetwork
access
•Descriheguidelinesforpositioningserverswithin
firewalls
•ConfigureOracleConnectionManagertoacceptor
rejectconnectionrequests
•ConfigureOracleConnectionManagertolog
connectionevents
•ReadconnectioneventsfromtheOracleConnection
Managerlog
OverviewofFirewalls
•Filternetworktraffic
•Denyorallowaccesstosubnetsorintranets
•Preventunauthorizedaccess
Database
server
ClientplicationFirewall
Webserver
NetworkArchitectureRegions
Database
server
ClientteriorApplicationInterior
ewallWebserverfirewall
InternetDMZIntranet
GuidelinesforPositioningServers
WithinFirewalls
•Useafirewalltorestrictdatabaseaccess.
•Useastatefulexteriorfirewall.
•AllowexterioraccesstoonlyspecificIPandport
addresses.
•AllowonlymessagesfromtheDMZthroughtheinterior
firewall.
•SendoutgoingmessagesthroughDMZproxies.
•Disallowallothertraffictypes.
•DonotstoresensitiveinformationintheDMZ.
UsingaFirewalltoRestrict
Datab
•Keepyourserversbehi
•Limithothroughthe
Database
原创力文档

文档评论(0)