Http/https Network Security Application Analysis

Source: Internet
Author: User

Web servers are the most common targets of attacks in enterprises. The design and deployment of web servers on the company's network is a topic worth exploring. Let's talk about it. First look at the figure

 

650) this. width = 650; "border = 0>

This is a simple 2-Layer web design. From the perspective of attacks, the master web server and the Application Data Server are in the same network segment. This means that the attacker must first attack the firewall or web server, in order to directly communicate with application data, that is, attackers can control the Application Data Server (in the same network segment) without any effort, even pvlan. We obviously lose the benefits of server segmentation. The best practice is to place the server on the Interface separated by the firewall, so that even if the web server is controlled, he also needs to return a firewall attack to the application data server, which is the design significance of this topology.

Inbound traffic of internal interfaces

Access-list 101 deny tcp any host 192.0.3.10 eq www
Access-list 101 permit tcp 192.168.100.0 0.0.255 any eq www
Access-list 101 permit tcp 192.168.100.0 0.0.255 any eq 443

Inbound direction of External Interfaces

Access-list 102 permit tcp any host 192.0.2.55 eq www
Access-list 102 permit tcp any host 192.0.2.55 eq 443
Access-list 102 deny tcp any host 192.0.3.10 eq www
Access-list 102 deny tcp any host 192.0.3.10 eq 443

Inbound direction of p1

Access-list 103 permit tcp host 192.0.2.55 host 192.0.3.10 eq www
Access-list 103 permit tcp host 192.0.2.55 host 192.0.3.10 eq 443
Access-list 103 deny tcp any
Access-list 103 deny tcp any eq www
Access-list 103 deny tcp any eq 443

 

 

P2 inbound

Access-list 104 permit tcp host 192.0.3.10 host 192.0.2.55 eq www
Access-list 104 deny tcp any eq www
Access-list 104 deny tcp any eq 443

Let's look at the three-layer web design case.

 

650) this. width = 650; "border = 0>

Design requirements: 1. Allow only external networks to access the web Server

2. allow web servers to access the Application Data Server

3. The application server only responds to requests from the web server.

4. Allow the application server to send requests to the Database Server

5. The database server only responds to the Application Server

6. The internal network can only access web services.

In direction of FW-1 external interface

Access-list 101 permit tcp any host 192.0.2.53 eq 80
Access-list 101 permit tcp any host 192.0.2.53 eq 443
Access-list 101 deny tcp any eq 80
Access-list 101 deny tcp any eq 443

In direction of FW-1 boundary interface
Access-list 102 permit tcp host 192.0.2.53 host 192.0.3.3 eq 80
Access-list 102 deny tcp any eq 80
Access-list 102 deny tcp any eq 443

In direction of the internal boundary interface of the FW-1

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.