Configuring Firewall

Read about configuring firewall, The latest news, videos, and discussion topics about configuring firewall from alibabacloud.com

NTP security and configuring Windows NTP clients

You should know how NTP is affected by your network security policy. Here are some areas of common concern. Firewalls and NTP servers use UDP's 123 destination port traffic. Unlike most UDP protocols, the source port is not a high end (over 1023). You must allow UDP source/destination port 123 on your server and straum1/217853.html "> Communication between class servers. NTP authentication is possible in situations where you not only want to limit NTP synchronization to a specified network, but also to ...

FortiOS 5.2 Expert Recipe: SLBC Active-Passive with four FortiController-5103Bs and two chassis

This article shows how to setup an active-passive session-aware load balancing cluster (SLBC) consisting of two FortiGate-5000 chassis, four FortiController-5103Bs two in each chassis, and six FortiGate-5001Bs acting as workers, three in each chassis.

FortiOS 5.2 Expert Recipe: Redundant architecture

This article shows some useful instructions for customers with multi-site architecture and redundant firewalls.

Properly configuring firewalls greatly increases your system security

Redhatlinux provides firewall protection for increased system security. Firewalls exist between your computer and your network to determine which remote users on your network have access to the resources on your computer.   A properly configured firewall can greatly increase your system security.   Choose the appropriate level of security for your system. Advanced if you choose Advanced, your system will not accept connections that are not specifically specified by you (except for the default settings). Only the following connections are allowed by default: DNS response ...

FortiOS 5.2 Expert Recipe: Hub-and-spoke VPN using quick mode selectors

This article describes how to set up a large number of spoke VPNs by using quick mode selector source definitions on the spoke FortiGates and the dialup VPN configurations on the hub FortiGates.

FortiOS 5.2 WIFI Issue: Social WiFi Captive Portal with FortiAuthenticator (Form-based)

This article depicits how to provide access control with WiFi authentication using a forms-based portal.

Wireless security: Making OpenSSH a secure Web server

In some ways, securing your computer is a full-time job. The problem is even more complicated when you think about wireless security. For those traveling outside the wireless network, whether they use a wireless access point in a café, an airport, or a hotel where they spend the night, one important concern is that they never know the security of the network they use unless they know it is not. For example, for a network of coffee shops, this is true: because they are open to everyone, you can't finish ...

A summary of Wingate Proxy Server usage Skills

For small and medium-sized enterprises or the company's internal network as well as the Internet, through the Wingate agent to achieve access to the Internet, is an economic and practical program. Wingate's current popular version is WinGate5.0.1, which is divided into simple and professional editions (its free trial version can be downloaded from Internet sites: http://www.wingate.com.cn, etc.). This article will use the most extensive WinGate5.0.1 Professional edition, talk about its configuration and the use of some of the skills in the process. WinGate ...

On the configuration security of Web server under UNIX system

The intermediary transaction SEO diagnoses Taobao guest Cloud host technology Hall Internet is becoming more and more popular today, PC security not only requires the prevention of computer viruses, but also to improve the system to resist the hacker's ability to attack the illegal intrusion, and to improve the confidentiality of remote data transmission, to avoid illegal theft in transit.  In this paper, we simply analyze some situations that may occur when constructing Web server, hoping to arouse attention. &nb ...

Some considerations about cloud migration

In some people's mind, the steps to move from a virtual data center to a private cloud are simple, requiring only a little bit of management software and some automation to accomplish. It's not that simple. When IT managers embark on the path to building a private cloud, in some cases, the defined data center infrastructure may not be suitable for cloud computing implementations. So they may have to face the test of past assumptions and practices. And vendors are openly claiming that the automation and management of cloud computing cannot be trusted anymore. In the Enterprise data Center, private cloud provides control over IT resources. It let the work ...

Total Pages: 3 1 2 3 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.