Port 8954

1999-12-01 Thread Steve Cody
When I came in this morning, I noticed a log full of these. The source port ranged from 1237 to 1534. The source IP address traces back to a dialup account so I am assuming someone was doing some sort of hack attempt. I am wondering what this was for, and what could have been gained by

RE: Firewall appliances

1999-12-01 Thread David Thompson
Network Computing recently published an article listing differences between types and brands of firewalls. You may consider visiting http://www.networkcomputing.com/1023/1023f1.html to see their review. Thanks, -Dave -- From: [EMAIL PROTECTED][SMTP:[EMAIL PROTECTED]] Sent:

Re: ipfilter

1999-12-01 Thread drthirsty
At 11:40 01.12.99 +0800, Zheng Bokui wrote: Dear gurus, Is Darren Reed's IPFILTER a good tool comparing with commerical firewalls like Checkpoint FIREWALL-1 or CISCO PIX? Of course commerical ones provide more features. What I'm most concerned is security: Can I build a secure firewall with

NAT w/ ipchains

1999-12-01 Thread Ameet Chaubal
Hi all How do I do NAT with ipchains. I have ipchains and ipmasqadm (for portforwarding ) working already. I know that port forwarding on the firewall can be done to a particular machine. Now how do I configure the firewall (address b) to say that any request for address c should actually go to

TCP Wrappers

1999-12-01 Thread Mike Dee
Can anyone point me in the right direction... I need information in regard to the use and configuration of TCP Wrappers. We are evaluating the security of several linux and unix based firewalls and I dont know much about them and would like to understand their use better. Any help is

Making POP3 Service Available

1999-12-01 Thread Watson, Peter
Currently we have SMTP service only allowed between our exchange server and the ISP mail server. This firewall rule is working fine and we have had no security incidents with this arrangement. Due to the usual political masters which are this company they wish to enable POP3 service on our

Re: RADIUS/NIS

1999-12-01 Thread Ryan Russell
I've been given a project to integrate our RADIUS authentication database with our NIS setup. This strikes me as either a bad idea or an unworkable one. It's quite workable, if I need to stick to either PAP or CHAP, not something like tokens or Kerberos, etc. Tokens are not mutally

RE: Making POP3 Service Available

1999-12-01 Thread Mullen, Patrick
I know that this bad security practice to allow the POP3 service to come in, but I need additional internet white papers, concrete evidence, best practices info on why we should not allow this. Anything wrong with running POP if you have an SSL wrapper in place for the transmission of

Intrusion Detection Webcast

1999-12-01 Thread pcafarchio
(for those interested in intrusion detection) ICSA.net invites you to attend our free web broadcast, "An Overview of Intrusion Detection Technologies" to air on Thursday December 9th at 2pm EST. This one-hour seminar will give an overview of Intrusion Detection and Vulnerability Assessment

Adaptive Firewall Queries

1999-12-01 Thread Mike Hanafin
Hi all, I've started looking at adaptive firewalls and while I get the basic idea I'd be interested in hearing opinions on some questions I have: * What is the state of this technology at the moment? Looking around the web, I've seen a few commercial offerings but little mention in mailing