Page 515 - StudyBook.pdf
P. 515

Infrastructure Security: System Hardening • Chapter 8  499

                    For example:

                      ■  To deny the use of ICMP on interface <eth0>, a line can be created in
                         the ACL that reads int <eth0> ICMP deny. This would deny ICMP on
                         interface <eth0>.
                      ■  To deny a specific communication protocol, an ACL entry can be created
                         that reads: int <eth0> IPX deny.This would block use of Internetwork
                         Package Exchange (IPX) on the interface.
                      ■  To deny all protocols on an interface, a line can be added to the ACL that
                         reads int <eth0> ANY deny.This would effectively eliminate the use of all
                         protocols on the interface.
                      ■  An ACL can become complex, and may need to be centrally stored to be
                         deployed to multiple devices.




                 EXAM WARNING
                      When working with ACLs, remember that you will be utilizing some of
                      the concepts discussed in Chapter 1. However, you will also use some
                      different procedures to accomplish access control. For example, you may
                      use static access control list (SACL) configurations to maintain the set-
                      tings on hardware devices in a network. Along with the SACL configura-
                      tion, you may use other technologies to centralize the deployment of
                      the rule sets defining the level of access. Additionally, as you will see
                      later in this chapter, you may use a Directory Enabled Network (DEN)
                      method system to manage overall ACL development and deployment.






                 Application Hardening

                 The Security+ exam covers a very large area of the concepts of application hard-
                 ening.This section looks at procedures and best practices in a couple of different
                 arenas to provide security.This section not only looks at end-user applications such
                 as browsers, office suites, and e-mail client software applications, but also evaluates
                 the problems that exist in applications provided through servers and services run-
                 ning on networks.These include Web servers, e-mail servers, FTP servers, DNS
                 servers, and DHCP servers.This section also looks at Network News Transfer




                                                                              www.syngress.com
   510   511   512   513   514   515   516   517   518   519   520