i have not tested a pix501, but i hope, it's still the same like on 506 and
higher.
you can do a
global (outside) 1 interface
nat (inside) 1 0 0
and at the same time (depending on your internal network) for example
static (inside,outside) tcp interface 10.0.0.1 22
if you are
Below is the call for papers for the 5th annual Recent Advances in
Intrusion Detection (RAID) symposium which will be held in Zurich
Switzerland. I have found this symposium to contain some of the best
research presentations for advancing the field of intrusion detection and I
encourage paper
On Thu, Dec 27, 2001 at 05:18:57PM -0700, Trevor Osatchuk wrote:
I am a newbie and I have a Sonicwall-Pro. I have been doing a little
research on Diffie-Hellman and I wanted to know what the shared secret used
for vpn's in the Sonicwall does. Does it have anything to do with IKE? Is
it a
Hi all.
Can anyone point me some security auditors for auditing a ebanking
solution.
These sould be Europe Based and I'm talking about Network Systems
Architecture, Aplication Design and Code Review.
It was nice to get some end user feedback, apart from the usual we have
white hacking
hmm funny - have a look at
http://www.ticm.com/info/insider/members/fwsecfaq/index.html
if you've got additions I'll be happy to add with with accreditation.
Cheers,
Bret
At 10:11 AM 26/12/01 -0400, you wrote:
I Everybody:
I'm making some research to make a kind of Security checklist for
I have Checkpoint FireWall-1 running on a Nokia platform and am trying to
restrict telnet and http access to the platform itself rather than traffic
through it. I would like to use either Radius or TACACS+ for user
authentication. Is this possible? I have tried setting it up but all I
get
On Thu, 3 Jan 2002, Jonas M Luster wrote:
You might very well be the first person in the security field to even
read marketing blarb. I prefer the lab method, saves me some headaches
and contact to sales personnel and websites I can not read with lynx.
When you're evaluating solutions, you
Sorry for the off topic post, but thought you all might have encountered
this...
A travel related web site is receiving a tremendous amount of unexpected
requests for brochures (form page) from people in eastern block countries
even though the company's marketing has and is solely focused on the
Hi all,
We've seen this Diffie-Hellman Group 1, 2, 3.
What is inside this group and the difference.
Is it a difference combination of encryption and
authentication ?
Also, what's the difference between the different modes ,
aggresive, quick and main ?
Rgds,
Simon
On Fri, 28 Dec 2001
Hi,
Can you share the document with me also for L2TP with IPsec.
But the answer to question that whether built in win2k client will
support PPTP/IPsec with PIX or not is still not clear??? It failed for
me as well when i tried
regards
Madhur
-Original Message-
From: Enno Rey
The Morris worm to Nimda
how little we've learned or gained
by: Ron DuFresne
(c) 2001
2001 was a tumultuous year. Prior to the September 11
The Morris Worm and the coming Storm
by: [EMAIL PROTECTED]
2001 brought with it a stark reality check. There is nothing
that can be said that really makes any difference to what occured.
Now that the dust is beginning to settle literally it is time to
move on.
Since the Morris
Hmm... I don't think I want to spend the money for a Firebox, that's a
totally different beast that I don't think I'd be getting my money out of
it.
The NetScreen 5XP looks like it should do the trick and at 960 sessions a
second that should be plenty overkill.
-Original Message-
Hi,
how do I use snnifer in a switch in a way that permits to capture all
traffic ? (3com 3300)
Thank's in advance,
Daniel
___
Firewalls mailing list
[EMAIL PROTECTED]
http://lists.gnac.net/mailman/listinfo/firewalls
Fredy,
You may want to invest in the book Hacking Exposed by Stuart McClure, Joel
Scambray, and George Kurtz. I have the 2nd edition, but looks like they
have a third edition out. It's got some insightful info on securing
Checkpoint and Cisco routers and firewalls. It has some practical
Daniel,
Most switches will allow one or more ports to be combined or cross connected
for this very purpose. If this isn't possible then the best you can do is
put the sniffer on the backbone segment attached to the switch. You
wouldn't be able to see the traffic between individual switch nodes
Hi,
how do I use snnifer in a switch in a way that permits to capture all
traffic ? (3com 3300)
Thank's in advance,
Daniel
___
Firewalls mailing list
[EMAIL PROTECTED]
http://lists.gnac.net/mailman/listinfo/firewalls
Hi Daniel,
I don´t know how the 3COM 3000 switch works but I'm using a CISCO 4006 and
it has a port span feature that replies all traffic in a specific vlan (or
in all vlans) to a specified port (the one with the machine running the
sniffer). Look for something like this on your documentation.
daniel,
you will have to mirror a port or the uplink
craig
- Original Message -
From: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Friday, January 04, 2002 2:14 PM
Subject: (no subject)
Hi,
how do I use snnifer in a switch in a way that permits to capture all
traffic ? (3com
Title: RE: (no subject)
On a 3Com SuperStack 3300 this is referred to as roving analysis.
See http://support.3com.com/infodeli/tools/switches/ss3/management/ug/dua1695-0baa05.pdf, search for roving analysis (page 86).
It does not appear to support monitoring multiple source ports (monitor
See if your switch has a management port or the ability to set a single
port as a SPAN port which will echo all traffic to that port.
...
Dean M. Dorman
Systems Administrator
Putnam Company /
With the 3com 3300, in order to monitor the network traffic that is
traversing the 3com 3300 switch, one must configure what is called a
monitor port or analysis port (under the Roving Analysis Setup) using the
3com Switch Management Software. One has to define an Analysis port (the
port
Hello all.
I currently have a PIX520 firewall with cisco secure PIX O/S version 5.1(2),
256MB RAM and 16MB FLASH;
and Firewall-1 sp4.1 on Nokia IP650
I want know the perfomance di thoughput and of connections
Possibly, but need more info...
A happy new year to all list members,
I am looking for a free Host Based IDS for Linux. The only thing I have found is Snare. What do you think of it and what else would you recommend?
Jason
passmeJason YuanSecurity ConsultantNiles AssociatesDo You Yahoo!?
Send FREE video emails in Yahoo! Mail.
On 04/01/02 17:53 -0800, Jason Yuan wrote:
I am looking for a free Host Based IDS for Linux. The only thing I have
found is Snare. What do you think of it and what else would you recommend?
Tripwire, LIDS, snort (to grab the network traffic local to the host,
plus, this can be made to
25 matches
Mail list logo