Course content

Firewalls and other methods

Firewalls and other methods

The exact details of the security methods used cannot be divulged in this document, but an overview will be provided here in very high level:


Privately accessible

Publicly accessible

Description


Port 80

Port 443

Database instance

Y



Front-end instance


N

Y

Communication instance


N

Y


The setup is done in such a way, that only what may be accessed from public, can be accessed, and only via the ports that we allow.


Views
254 Total Views
3 Members Views
268 Public Views
Actions
0 Likes
0 Dislikes
0 Comments
Share on Social Networks
Share Link
Share by mail

Please login to share this webpage by email.