Server Management WEB Servers  Win2K TCP/IP Environment  WWW : IIS 5 / Lotus Domino  SSL : Secure Socket Layer  Apache HTTP Server National Taiwan.

Slides:



Advertisements
Similar presentations
Network Security.
Advertisements

Spring 2012: CS419 Computer Security Vinod Ganapathy SSL, etc.
VOYAGER: Yet Another Secure Web Browser to Demonstrate Secure Socket Layer Working and Implementation By : Shrinivas G. Deshpande Advisor: Dr. Chung E.
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
Module 5: Configuring Access to Internal Resources.
Module 5: Configuring Access for Remote Clients and Networks.
Web Server Administration TEC 236 Securing the Web Environment.
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
A+ Guide to Software, 4e Chapter 9 Windows on the Internet.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 13: Administering Web Resources.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Using Internet Information Server And Microsoft ® Internet Explorer To Implement Security On The Intranet HTTP.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
Internet Protocol Security (IPSec)
TOPIC 1 – SERVER SIDE APPLICATIONS IFS 234 – SERVER SIDE APPLICATION DEVELOPMENT.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 23 Virtual Private Networks (VPNs)
1 ISA Server 2004 Installation & Configuration Overview By Nicholas Quinn.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
Module 9: Planning Network Access. Overview Introducing Network Access Selecting Network Access Connection Methods Selecting a Remote Access Policy Strategy.
Web Server Administration Chapter 10 Securing the Web Environment.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
Ladd Van Tol Senior Software Engineer Security on the Web Part One - Vulnerabilities.
Secure Socket Layer (SSL)
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
1 Chapter 6: Proxy Server in Internet and Intranet Designs Designs That Include Proxy Server Essential Proxy Server Design Concepts Data Protection in.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 13: Administering Web Resources.
Copyright 2000 eMation SECURITY - Controlling Data Access with
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
IT:Network:Apps.  Microsoft Web Server ◦ Used by ~ 50% of Fortune 500 companies  Comes with Server OS  Expandable  Easy to use.
TNQ How To Implement Secure, Web-Based Business Solutions Based On Windows ® 2000 Server And Internet Information Server 5.0 Name Title Microsoft.
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
Module 11: Remote Access Fundamentals
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications ◦The client requested data.
Module 5: Configuring Access for Remote Clients and Networks.
1 實驗九:建置網路安全閘道器 教師: 助教:. 2 Outline  Background  Proxy – Squid  Firewall – IPTables  VPN – OpenVPN  Experiment  Internet gateway  Firewall  VPN.
Module 9: Fundamentals of Securing Network Communication.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
Grid Chemistry System Architecture Overview Akylbek Zhumabayev.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
Building Security into Your System Bill Major Gregory Ponto.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Application Services COM211 Communications and Networks CDA College Theodoros Christophides
Hands-On Microsoft Windows Server Implementing Microsoft Internet Information Services Microsoft Internet Information Services (IIS) –Software included.
Integrating and Troubleshooting Citrix Access Gateway.
TCP/IP (Transmission Control Protocol / Internet Protocol)
Network Infrastructure Microsoft Windows 2003 Network Infrastructure MCSE Study Guide for Exam
CITA 310 Section 9 Securing the Web Environment (Textbook Chapter 10)
Pertemuan #10 Secure HTTP (HTTPS) Kuliah Pengaman Jaringan.
1 Chapter Overview Creating Web Sites and FTP Sites Creating Virtual Directories Managing Site Security Troubleshooting IIS.
Client Access – Published applications Control through TEMPLATE.ICA Use SSL Authentication level –Remove: EncRc5-0 EncRc5-40 EncRc5-56.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
 authenticated transmission  secure tunnel over insecure public channel  host to host transmission is typical  service independent WHAT IS NEEDED?
Free Powerpoint Templates Page 1 Free Powerpoint Templates Chapter 4- Server Configuration.
IS 4506 Windows NTFS and IIS Security Features.  Overview Windows NTFS Server security Internet Information Server security features Securing communication.
Virtual Private Network (VPN)
Module 3: Enabling Access to Internet Resources
Enabling Secure Internet Access with TMG
Securing the Network Perimeter with ISA 2004
Jim Fawcett CSE686 – Internet Programming Summer 2005
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 13: Administering Web Resources.
Implementing TMG Server Publishing
الخطوات المطلوب القيام بها قبل انشاء الموقع
Goals Introduce the Windows Server 2003 family of operating systems
Security Protocols in the Internet
IS 4506 Server Configuration (HTTP Server)
Advanced Computer Networks
Designing IIS Security (IIS – Internet Information Service)
IS 4506 Configuring the FTP Service
Presentation transcript:

Server Management WEB Servers  Win2K TCP/IP Environment  WWW : IIS 5 / Lotus Domino  SSL : Secure Socket Layer  Apache HTTP Server National Taiwan Univ. of Science & Technology /AC2Net2K Server Management (Part-II) 88 學年度 : 企業網路及應用整合 國立台灣科技大學 / 詹朝基副教授

Network :General Concepts 88 學年度 : 企業網路及應用整合 國立台灣科技大學 / 詹朝基副教授

3 TCP/IP Protocol Stack IP-TCP /UDP- (Service: Port#) Security: Kerberos, SSL, S/MIME

4

5

6 TCP/IP Detail

7 Ping / Trace Route (NeoTrace)

8 Windows Networking

9 Network & Ethernet Card

10 Ethernet Adapter: Detail Setting

11 Header : Data Encapsulation

12 3-Way Handshaking

13 DoS Attack DDoS : Distributed Denial of Service ACK SYN, ACK/SYN, ACK

14 C/S Interaction  Socket()  Bind()  Listen()  Accept()  Connect()  Read/Write  Close()

15 Socket Programming Connection-Oriented vs. Connectionless

16 HOSTS / LMHosts

HTTP Server Overview  What is New in Win2K Server  Web Server : IIS4 / IIS5 88 學年度 : 企業網路及應用整合 國立台灣科技大學 / 詹朝基副教授

18 Win2K: What is New for Connection Wizard VPN –Private Network

19 Proxy Server for HTTP / Socks Services

20 Proxy Server  Packet Filter  Firewall  Proxy( 代理 ):  Web  WinSock  SOCKS

21 Win2K -- Network Setting: TCP/IP

22 Windows 2000 :New Features \NTDS (ADS 資料庫 )

23

24 Active Directory: 目錄伺服器 ADS Server DNS-Style Domain Name DNS-Style Domain Name

25

26 NT4/IIS 4  Anonymous  Secure  SSL  NT Accounts  IP/Domain Restriction

27 IIS --- Security Gates for Accessing Website Resources  Four-Level  IP Address  Login Control  身份鑑別  驗證  Authentication  Object/ Access Right  ACL (Resource)  OS / Permission

28 Microsoft Web Site : Improve your Knowledge about IIS 4

29 IP 位址 – 安全領域

30

31 IIS 5 : What is New ?

Apache HTTP Server  Server Configuration  Administration 88 學年度 : 企業網路及應用整合 國立台灣科技大學 / 詹朝基副教授

33 IBM / Apache HTTP

34 80 HTTP / 8008 Admin HTTP.CONF (Apache Server Configuration)

35 HTTP Configuration  Authenticate  Group  Person  Mapping  Alias  Redirect  User Dir  Security/Log

36 Virtual Directory / Alias

37 IBM SSL Security Module SSL Support: keyfile (Server Certificate)

38 SSL : HTTPS HTTPS: //host/dir

39 X.509 Certificate

Internet Information Server  IIS 4 : HTTP 1.1 Support  IIS 5: Next Generation  ASP Support  Database Connection 88 學年度 : 企業網路及應用整合 國立台灣科技大學 / 詹朝基副教授

41

42 SSL

43 Secure Options

44 Security SSL v3 Tunnel

45 IIS – Firewall can Save it ?

46 Microsoft Proxy Server 2

IIS Server (slide show )  IIS 4  IIS 5  IE 5 (Browser)

Client : Personal Certificate IE 4 / Netscape 4.x 88 學年度 : 企業網路及應用整合 國立台灣科技大學 / 詹朝基副教授

49 Example: Alice vs. Bob

50 Guess What It is ?

51 RSA : Public/Private key Pair

52 IE – Secure Mail

53 Digital ID from VeriSign Corp.

54 Mail vs.Certificate

55 How to Use Digital ID

56

Apache Server (slide show )

58 Virtual Directory : Alias

59 Demo is Worked !

60 Certificate :SHA1 / MD5

Lotus /Domino Server (slide show )

Q&A Thanks ! 88 學年度 : 企業網路及應用整合 國立台灣科技大學 / 詹朝基副教授