Path: Top / Member / creativepio@gmail.com
Securing SQL Server
Oleh : Denny Cherry
Dibuat : 2012-06-09, dengan 1 file
Keyword : Securing SQL
Typically the first line that you would see in your configuration of your firewall or ACL would be similar to âextended permit ip any any.â This would then grant all access from all networks, in this case the public Internet, to the 204.245.12.0 network no matter what TCP (Transmission Control Protocol) port was used. We would then want to follow this with a line similar to âpermit tcp 204.245.12.0 255.255.255.0 any.â This line then allows all computers within our public IP space access to every-thing on the public Internet on any TCP network port. You can see these firewall rules from a sample configuration file in the following sample code.
Beri Komentar ?#(0) | Bookmark
Properti | Nilai Properti |
---|---|
ID Publisher | |
Organisasi | |
Nama Kontak | |
Alamat | |
Kota | |
Daerah | |
Negara | |
Telepon | |
Fax | |
E-mail Administrator | |
E-mail CKO |
Print ...
Kontributor...
- , Editor: creativepio@gmail.com@#publisher#
Download...
Download hanya untuk member.
File : 2012 Securing SQL Server.pdf
(15391397 bytes)