Course content

Firewalls and other methods

Firewalls and other methods

The exact details of the security methods used cannot be divulged in this document, but an overview will be provided here in very high level:


Privately accessible

Publicly accessible

Description


Port 80

Port 443

Database instance

Y



Front-end instance


N

Y

Communication instance


N

Y


The setup is done in such a way, that only what may be accessed from public, can be accessed, and only via the ports that we allow.


Rating
0 0

There are no comments for now.

to be the first to leave a comment.