
Chapter 454
You can also configure a firewall to provide additional protection against outside attacks. For
example, if the server is being flooded by a particular IP or range of IP addresses, you can
configure the firewall to ignore messages from those IP addresses.
The server allows you to strictly control which users can connect to it and where they can connect
from. You can also configure a firewall to control the ports users inside and outside your network
can connect to.
Log file precautions
A log file is a file that contains information about events that have occurred on the server. When
using log files (by specifying
true for the Vhost.xml file’s <recordAccessLog> tag and the
Application.xml file’s
<RecordAppLog> tag), you are vulnerable to denial-of-service attacks by
applications that can fill the hard disk—for example, by making high volumes of connection
requests. To prevent this problem, write an operating system script to delete or back up the
log regularly.
End user
Port 1935
FIREWALL
(Port-based security)
XML configuration files
(host-based security)
Port 1111
Server Administrator
Virtual Host Administrator
(name & password
authentication)
End user
Port 80
Server
Public Private (server zone)
Comentarios a estos manuales