From: ext Dave Crocker [mailto:[EMAIL PROTECTED]]
Too late. Things are already confused, namely about the technical
distinction between bridge and router.
Not really, You think that Sonicwall is a router and I know that it's
not.
However I made a mistake by stating that it is bridge, I
There are some additional benefits of Transparent Bridge comparing to
routing firewall:
1. Firewall can be completely transparent. Only way to know that device
even exists is to have devices on both sides of the firewall and port
scanning through firewall (or by physically checking this fact)
2.
Hello all,
I know this doesn't concern not
the firewall neither the netfilter news group but I don't know what to do at
all.
Someone fakes his own E-Mail
address with my own and use it to send spam letter to a bunch of E-Mail adresses
all over the world. It send from someone called
On 11 Jan 2002 at 10:26, Boryan Yotov wrote:
I know this doesn't concern not the firewall neither the netfilter
news group but I don't know what to do at all.
I've had exactly the same - over the past few days about 10 bounces for
spam that has used my address, plus I've had colleagues in
Hi folks,
Gauntlet 6.0 is released and supports HP-UX 11. Have a look at
http://www.pgp.com/products/gauntlet/default.asp
Frank
[EMAIL PROTECTED] wrote:
That was the second part of my question. Not sure either, but it looks
like most of the current FW software offerings only
Hi Ben,
All the users that are going to use IPSec are notebook users
that occationally travel abroad. The rest of the time they are
connected to the network via the WAN. The main reason for using IPSEC
is to synchronise their outlook with the exchange server via a dialup
connection to the
On Fri, 11 Jan 2002, Lim Seow Keang wrote:
Hi!
I totally zero about security. I have no idea how secure is my NT4 server.
Just wonder how people hack port 139.
Can someone tell where can I get the tools to hack in my NT4 .. ?
You don't need hacking tools to secure a server. In the case
On Fri, 11 Jan 2002, Abdul Basit wrote:
hey
i wonder how can you implement rule of this type
'if more than 4 connections from same IP connects
to port 80(or any port) of some dest. IP then block it ? '
It's probably possible with a few tools, but it's also probably a really
bad idea for
HI there,
When an internal machine attempts to connect to a webserver thru a firewall
(linux iptables) what is the exact mechanisim?
Is there a good explaination on the net?
Please correct me if I'm wrong, my understanding is the internal machine's
browser tries to connect to www.redhat.com
Are you sure you want to use manual keying? Especially with 3DES, which
is one of the most secure IPSec choices if used correctly?
I may be falling victim to some Netscreen terminology blunder, but
Manual Keying normally means that the actual keys used by the ESP and
AH encryption algorithms
Laura, Richard, Et. Al.,
I've been working with Laura offlist on this some. I found that a lynx
client using the URL http://205.229.56.205 from sites about the globe
reaches the refresher URL and hangs there until one selects that refresher
at which point it goes to the pages in question.
Hi everyone,
We've been researching the MTU issue but our firewall can send and receive fragmented
packets just fine, so there are no blackhole routers out there. Curiously, we cannot
ping that address from our firewall ip, but we can ping from every other ip. It's
possible, despite their
Ron,
This is work. It keeps your skills sharp while exposing you to difficult
troubleshooting scenarios thus increasing your knowledge base and
expertise, ultimately making you more valuable to your employer or
client!
Glenn
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL
Rick,
There are a couple of ways this can be done and it depends on how the NAT device works. NAT, itself, is just the rewriting of the source IP address. If your NAT device is an application layer gateway then you would have two seperate connections. One would be between your internal
Hy, try it:
http://netfilter.samba.org/documentation/HOWTO//NAT-HOWTO.html
- Original Message -
From:
[EMAIL PROTECTED]
To: Rick Lim
Cc: [EMAIL PROTECTED]
Sent: Friday, January 11, 2002 3:05
PM
Subject: Re: how does outgoing nat work
exactly?
Rick,
On Thu, 10 Jan 2002 [EMAIL PROTECTED] wrote:
:Since NAI and CHKP is no longer supporting this platform. Can anyone
:recommend firewall software for the HP UX running 11.0
while i haven't used this version, HP does provide ipfilter:
can you remove me plese from the mailing
list , i don't want to receive anything anymore
_
Chat with friends online, try MSN Messenger: http://messenger.msn.com
[EMAIL PROTECTED] wrote:
...[text about how an ALG proxy works similarly to NAT and also changes the source
port
... since the ALG proxy opens up a new connection from a new socket]
...
If you have some sort of IP filter, router, or loadbalancer doing NAT then the only
thing
that will
just a test - delete me
___
Firewalls mailing list
[EMAIL PROTECTED]
http://lists.gnac.net/mailman/listinfo/firewalls
You failed.
Thanks,
Ron DuFresne
On Fri, 11 Jan 2002, Magic Phibo wrote:
just a test - delete me
___
Firewalls mailing list
[EMAIL PROTECTED]
http://lists.gnac.net/mailman/listinfo/firewalls
~~
Cutting the
Good Afternoon,
Do I need to make a sucking chest wound of my firewall to allow the use of
frontpage from outside my LAN?
I have been ordered, despite my best efforts to discourage, to allow a
remote (home) office employee to publish and update webs via
frontpage.what ports am I going to need
I believe what the NetScreens do is, by this definition, pre-shared
keying.
The extra wrinkle here is that NetScreen allows you to enter the
key in hexadecimal, or enter a password from which it will generate
the necessary key. (It is easier to transmit such a password over
the phone, or
The From: address is easily faked, and the spammer doesn't care
whether it's real or not, as long as (a) it looks plausible, and (b)
*he* doesn't get the bounces.
Both messages came from a machine calling itself mx.port.ru --
but at different IP addresses. You could hunt down the ISPs
It's not merely a matter of ports, there are a number of frontpage cgi's
and helpers that need to be put in place, the frontpage info files would
be your best source of reference. Now, there have been fixes relased a
few times for those tools due to exploits they have been subject to from
time
Scott,
If your using the POSTINFO method the updates are done with a standard HTTP
post command and shouldn't require any additional ports for the posting
portion although there may be some additional ports required for setup or
authentication.
-- Bill Stackpole, CISSP
POSTINFO.EG
Posting
Scott,
Just a thought...
I take it that you want people who are working from home to be able to
update web pages on servers INTERNAL to your networks. Hence the inbound
problems.
If that is the case, why not put an authenticated VPN server up for them?
That way, you know who they are and you are
26 matches
Mail list logo