DispersedNet
SiteMap
Active Directory
DHCP - TCPIP
Disaster Recovery
Install Windows
Proxy Server
Terminal Services
Secure Proxy Server
«Prev
Next»
Internet Proxy Server
Network Address Translation
NAT Protocol
Non-NAT Protocols
Functional Design Decisions
Nat-with-services
Selecting NAT Server
NAT Conclusion
Securing NAT Solution
Restricting Internet Traffic
Access Address Pools
Enhancing NAT Security
NAT Design Performance
Securing NAT Designs
Microsoft Proxy Server
Proxy Server Features
Design Decisions Solution (L3)
Integrate Networking Services
Private Public Works
Functional ProxyServer Solution(L5)
Placing within Network
Integrate Proxy Server(L7)
Determine Client Requirements
Proxy Server Conclusion
Securing Proxy Server
Restrict Internet Access
Screened Subnet
Packet Filtering Firewall
Restricting Outbound Traffic
ProxyServer Domain Filter
Proxy Server Access
Secure Proxyserver Conclusion
Proxy Server Design
Enhancing Outbound Availability
Create Proxy Server - Exercise
Securing Proxy Server Solution
Objective:
Provide Proxy Server recommendations for preventing security breaches.
Scoring
This exercise provides you an opportunity to practice what you learned in the previous lesson. You will be presented with a troubleshooting scenario, but unlike Problem Solver exercises work offline in Notepad or Microsoft Word®. When you have completed your solution, click the
Submit
button to compare your results.
Scenario
View the image below to get information that applies to the following question:
proxystrat
The following scenario describes the requirements for enhancing the Proxy Server design of a legal firm.
Exercise
Six months after the initial installation, the legal firm has completed the conversion of the Edmonton branch office to a TCP/IP-based network. The Edmonton branch is connected to the Montreal central office through the Calgary branch office. You have been hired to evaluate the current network for the legal firm. After your evaluation, you reach the conclusion that the connections between locations are saturated
Question
Since the initial deployment, the legal firm has experienced several security breaches from Internet-based users. What recommendations would you make for preventing future security breaches?