Course content

Firewalls and other methods

Firewalls and other methods

The exact details of the security methods used cannot be divulged in this document, but an overview will be provided here in very high level:


Privately accessible

Publicly accessible

Description


Port 80

Port 443

Database instance

Y



Front-end instance


N

Y

Communication instance


N

Y


The setup is done in such a way, that only what may be accessed from public, can be accessed, and only via the ports that we allow.


Views
23 Total Views
2 Members Views
21 Public Views
Actions
0 Likes
0 Dislikes
0 Comments
Share on Social Networks
Share Link
Use permanent link to share in social media
Share by mail

Please login to share this webpage by email.