MS Proxy

1999-01-17 Thread netcomm
Hi All I am facing a problem in providing ftp access to ftp sites like ftp.microsoft.com etc to the clients accessing these sites via chained MS proxy serversThe message that pops up is that data connection failed unable to find host where as initial ftp commands are executed...sometimes

Re: Development vs. Production Subnets?

1999-01-17 Thread Pete Goodridge
Stick another NIC in the firewall and have two protected nets behind the firewall. One for development, and one for production. THX, Pete __ Reply Separator _ Subject: Development vs. Production Subnets?

SSH

1999-01-17 Thread Lee, Gary
Does anyone have any experience using Data Fellows' F-Secure SSH TunnelTerminal or VPN+ products in a Windows 95/98/NT environment? My company will be selling a commercial service in which multiple clients will be transmitting, via the Internet, large confidential print files to a Windows NT

RE: ipchains letting NetBIOS through?

1999-01-17 Thread Mullen, Patrick
My firewall is connected to a cablemodem, and it hit me that the cable co. must be doing some filtering on UDP 137-139 (probably due to all the complaints about Windows Network File Shares being easy to access/browse), and they must be dropping those packets so my firewall never sees it

Pix Bug???

1999-01-17 Thread matias . christensen
Yesterday I was tunning a Pix at a customer and suddenly, when I tried to escape from seeing the configuration with the Q(uit) the telnet halted, I tried another telnet and do the same, and halted too, after that, i could not enter anymore by telnet to the pix, so I connect to the console port

Re: anybody know what port 370 is?

1999-01-17 Thread Jesus Alejandro Juarez Robles
do you use lsoft?? This tool can help you to detect what process is relational to this port. Have a nice weekend.. Alex -- e-mail: [EMAIL PROTECTED] Tel:[52](961)51322 Fax:[52](961)54937 ICQ:48337064 On Thu, 18 Nov 1999, Gary Flynn wrote: *-codaauth2370/tcpcodaauth2

Some DMZ construction Questions

1999-01-17 Thread Magowan, Richard M. (ITS)
I am installing a new ISP service via UUNET and their managed Checkpoint FW. I am trained in the use of FW1 (Unix) so I sort of understand how the thing works. My question has to do with the options available to construct my DMZ. Option 1. I want a three legged FW, IF1 to the ISP Router, IF2 to

After hours VPN client support needed, slightly off topic.

1999-01-17 Thread Pete Goodridge
My company is starting to give employees VPN client software so they can access the company network from home. Since they will be trying to install and use this software at home after our helpdesk has closed for the day we need to find a company that can do helpdesk

Browser Question

1999-01-17 Thread Vince R Grande
I have Firewall-1 installed on a WindowsNT server with 3 nic cards and a DMZ zone. The DMZ zone contains our web server in a Workgroup instead of the Domain. The Firewall is also setup this way(in the same WorkGroup). The problem I'm having is the WorkGroup does not show in the Network

Re: ipchains letting NetBIOS through?

1999-01-17 Thread Ron DuFresne
Have you tried recompiling the kernel and removing all the modules and tidbits you do not really need, compacting it down to a nice little thing, as kernels go, and then tested? Do your tests show the packets on the wire and or hitting a boxen behind the testfirewall? But, if you have not,

Re: Some DMZ construction Questions

1999-01-17 Thread Art Coble
Maybe I am tired, but I don't see any reason to go for option 2. In my experience option 1 is a best practice. Your Internet accessible servers are clearly segregated from your internal network. You have a secured DMZ subnet. You can do a many to one NAT for your internal networks using an