Sonicwall Soho2

2002-01-09 Thread Frederic Lemoine
Hello, One of our small subsidiary needs to install a firewall. We use to work with Checkpoint products but this subsidiary has been contacted by a local Sonicwall distributor. They try to sell them a Sonicwall Soho2. We have no knowledge of this product, and I am wondering how it compares to

RE: Sonicwall Soho2

2002-01-09 Thread ext-Harri . Kotakoski
Well, first thing to understand is that Sonicwall is transparent bridge not a router. This means that you will have to think differently with Sonicwall when you are making your routing considerations. Sonicwall is capable of generating ICMP redirect messages which is somehow called routing but

FireWall-1 versus Cisco

2002-01-09 Thread gilles . lami
Hello everybody ! I am newbie on this mailing list and I am looking for some kind of documents which compare CheckPoint FireWall-1 and Cisco PIX / IOS, I mean good points and bad points of both products to help me making a choice in my architecture. Thanks by advance and happy new year. Gilles

PIX Access list

2002-01-09 Thread Edson Yamada
Hello, Cisco routers access lists allow the administrator define if the list must be applied to the INcoming or OUTcoming traffic of a given interface. It seems that PIX access lists dont permit that. So, my question is: if I bind a list to a interface, this list is applied against the

Stateful inspection on PIX

2002-01-09 Thread Edson Yamada
Hello again, Sorry if this is a stupid question. I´ve been reading the PIX docs and it´s written that PIX is stateful. Let´s suppose that a host (behind the internal interface) queries a DNS server that is located behind a outside interface. By default, all traffic that comes from the inside

Smoothwall

2002-01-09 Thread Phil Labonte
Does anyone on this list use SmoothWall? _ Do You Yahoo!? Get your free @yahoo.com address at http://mail.yahoo.com ___ Firewalls mailing list [EMAIL PROTECTED]

FW-1 log viewer radiates

2002-01-09 Thread Jim Rosenberg
I'm not sure how much to make of this problem, but I know it makes me feel uneasy. Perhaps this has been discussed a lot, but I suspect the problem is not well known; it was certainly a surprise to the on- duty technician at the company that does our firewall support. Unless you tell the FW-1

RE: Stateful inspection on PIX

2002-01-09 Thread Bruno Fernandes
-Original Message- From: Edson Yamada [mailto:[EMAIL PROTECTED]] Sent: quarta-feira, 9 de Janeiro de 2002 12:32 To: lista fw Subject: Stateful inspection on PIX Hello again, Sorry if this is a stupid question. I´ve been reading the PIX docs and it´s written that PIX is stateful.

RE: PIX Access list

2002-01-09 Thread Bruno Fernandes
It's applied only to traffic entering in the interface Regards BF -Original Message- From: Edson Yamada [mailto:[EMAIL PROTECTED]] Sent: quarta-feira, 9 de Janeiro de 2002 12:28 To: lista fw Subject: PIX Access list Hello, Cisco routers access lists allow the administrator define if

forwarding in interfaces ethernet

2002-01-09 Thread Johnny Gonzalez
Hi. I have pix 525 with 4 ethernets. 1 ethernet= inside (10.10.10.1/24) 2 ethernet= real (IP internet z.x.w.q/24) 3 ethernet= outside (IP internet a.b.c.d/24) route default is a.b.c.x I have the next rules: conduit permit icmp any any nat (real) 0 z.x.w.r 255.255.255.255 the ethernet real

Re: Smoothwall

2002-01-09 Thread Fredde
I have been using it before i disovered astaro(home network) why? /F - Original Message - From: Phil Labonte [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Wednesday, January 09, 2002 2:50 PM Subject: Smoothwall Does anyone on this list use SmoothWall?

RE: Sonicwall Soho2

2002-01-09 Thread Dave Crocker
At 10:56 AM 1/9/2002 +0200, [EMAIL PROTECTED] wrote: Well, first thing to understand is that Sonicwall is transparent bridge not a router. The Sonicwall Soho (not 2) that I have had for a couple of years is a router. It also does NAT and a set of firewall filtering functions. The device is

RE: PIX Access list

2002-01-09 Thread Glenn Shiffer
Connections on the Pix are defined as either from lower to higher security level or higher to lower security level. Lower to higher security connections are controlled by the access-list and access-group commands. Higher to lower security connections are controlled by nat and global commands.

RE: FW-1 log viewer radiates

2002-01-09 Thread Dan McGinn-Combs
While in general I would agree with you - that the NETBIOS name is useless. The way to fix this, is of course, to run the firewall and/or management console on LINUX or SUN rather than on WinNT. :-) Dan -Original Message- From: Jim Rosenberg [mailto:[EMAIL PROTECTED]] In my opinion,

Ahhh, the perks of managing government networks

2002-01-09 Thread Network Operations
If you get fed up with SPAM and script kiddies just: access-list reject_all deny ip 210.0.0.0 255.0.0.0 any access-list reject_all deny ip 211.0.0.0 255.0.0.0 any hmm, who next, I think I remember some BO scans from poland last week... access-list reject_all deny ip 195.0.0.0 255.0.0.0 any

Re: FW-1 log viewer radiates

2002-01-09 Thread Achim Dreyer
On Wed, 9 Jan 2002, Jim Rosenberg wrote: 1. It looks in its list of Network Objects to see if you've given a name to this IP address. If it finds one, it will use this one, regardless of other methods of resolving the address. 2. It queries the IP address in question trying to resolve

Re: forwarding in interfaces ethernet

2002-01-09 Thread bob bobing
Well you left out some info. first off what are the security levels for ethernet2, and ethernet 3. Are you using syslog? what is the pix logging when you try the ping that fails? Also can you show all nat, global, and static rules for eth2, and eth3. --- Johnny Gonzalez [EMAIL PROTECTED] wrote:

Re: [Security for] Analysis port for 3com 3300 was Re: (no subject)

2002-01-09 Thread Ken Milder
Because this is a firewalls list, this thread can serve as a good segue into a question about switch security that has been on my mind for some time: Most switches support remote management features like web interfaces, SNMP, telnet, etc. If these switches hacked, someone can not only cause a

Cisco Security Advisory: Multiple Vulnerabilities in Cisco SN 5420 Storage Router

2002-01-09 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE- Cisco Security Advisory: Multiple Vulnerabilities in Cisco SN 5420 Storage Routers Revision 1.0 For Public Release 2002 January 09 08:00 (UTC -0800) Summary Three

Subject: PIX Access list

2002-01-09 Thread Chew, Freeland (Roanoke)
In the PIX configuration Access Lists are for outbound traffic. Use the Conduit command for inbound controls. Message: 3 Date: Wed, 9 Jan 2002 10:27:49 -0200 (BRST) From: Edson Yamada [EMAIL PROTECTED] To: lista fw [EMAIL PROTECTED] Subject: PIX Access list Hello, Cisco routers access lists

Stateful Pix

2002-01-09 Thread Chew, Freeland (Roanoke)
Yes the PIX will allow the answers to the DNS queries back in without any other configuration. Message: 4 Date: Wed, 9 Jan 2002 10:32:19 -0200 (BRST) From: Edson Yamada [EMAIL PROTECTED] To: lista fw [EMAIL PROTECTED] Subject: Stateful inspection on PIX Hello again, Sorry if this is a stupid

Re: Subject: PIX Access list

2002-01-09 Thread Network Operations
In newer PIX code (5.3x + I think) you can use access-lists both ways...you can do away with conduit commands all together if you wish.. cheers.. Chew, Freeland (Roanoke) [EMAIL PROTECTED] 01/09 12:34 PM In the PIX configuration Access Lists are for outbound traffic. Use the Conduit command

Re: [Security for] Analysis port for 3com 3300 was Re: (no subject)

2002-01-09 Thread Paul Robertson
On Wed, 9 Jan 2002, Ken Milder wrote: Because this is a firewalls list, this thread can serve as a good segue into a question about switch security that has been on my mind for some time: Most switches support remote management features like web interfaces, SNMP, telnet, etc. If these

Re: Subject: PIX Access list

2002-01-09 Thread Network Operations
Ok let me clarify something, I sense a bit of confusion here.. You need to free yourself from this INcomming/OUTgoing concept you are using, when referring to the PIX ok? Because you can only ever see ONE interface depending on which side of the device youre on (if your architecture is

Re: Stateful Pix

2002-01-09 Thread Network Operations
Not a stupid question at all, The default configuration will let DNS queries pass yes..However if you use the defualt config, you might as well put your PIX back in the box and return it, and get your 15k back. You need to create access lists to DENY EVERYTHING. first. Then add access-lists

Re: [Security for] Analysis port for 3com 3300 was Re: (no subject)

2002-01-09 Thread black
I don't understand what you are saying. Are you suggesting that you simply unpack your switches and plug them into the network right from the box? Please don't say it's so, you've posted a lot of good thoughts in the past, and I can't believe you'd actually suggest that now. Bear in mind that a

help

2002-01-09 Thread Hunt, Curtis
Please unsubscribe me from your list for the last time. Curtis Hunt -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] Sent: Wednesday, January 09, 2002 3:54 PM To: [EMAIL PROTECTED] Subject: Firewalls digest, Vol 1 #449 - 9 msgs Send Firewalls mailing list

Re: [Security for] Analysis port for 3com 3300 was Re: (no subject)

2002-01-09 Thread Ken Milder
Paul, Thanks for your comments. You must have a small network. We have several hundred subnets and thousands of nodes. Gathering traffic statistics, installing patches and software upgrades, trouble shooting, and other network management functions make remote management of our switches

Re: [Security for] Analysis port for 3com 3300 was Re: (no subject)

2002-01-09 Thread Paul Robertson
On Wed, 9 Jan 2002 [EMAIL PROTECTED] wrote: I don't understand what you are saying. Are you suggesting that you simply unpack your switches and plug them into the network right from the box? No, I'm saying that I've always tried to avoid plugging in a switch which was configured to talk IP on

Re: help

2002-01-09 Thread Stilgherrian
On Wed, Jan 09, 2002 at 05:12:25PM -0500, Hunt, Curtis wrote: Please unsubscribe me from your list for the last time. I think this URL, given in every mailing from the list, will help you: To subscribe or unsubscribe via the World Wide Web, visit

Re: Stateful Pix

2002-01-09 Thread Brian Ford
Actually DNS Guard in the PIX only allows one (the first) DNS response back. All others are dropped. At 01:53 PM 1/9/2002 -0800, Chew, Freeland (Roanoke) [EMAIL PROTECTED] wrote: Message: 4 From: Chew, Freeland (Roanoke) [EMAIL PROTECTED] To: '[EMAIL PROTECTED]' [EMAIL PROTECTED] Subject:

Re: [Security for] Analysis port for 3com 3300 was Re: (no subject)

2002-01-09 Thread Paul Robertson
On Wed, 9 Jan 2002, Ken Milder wrote: Paul, Thanks for your comments. You must have a small network. We have several I've built and run networks from the tens of devices to the tens of thousands. hundred subnets and thousands of nodes. Gathering traffic statistics, installing patches and

Re: forwarding in interfaces ethernet

2002-01-09 Thread Johnny Gonzalez
I no use syslog. I have this configuration in my pix: nameif ethernet0 outside security0 nameif ethernet1 inside security100 nameif ethernet2 real security10 interface ethernet0 auto interface ethernet1 auto interface ethernet2 auto ip address outside x.y.z.130 255.255.255.192 ip address inside

Re: Stateful Pix

2002-01-09 Thread Network Operations
Doesnt it make ya just wanna go hug it? Brian Ford [EMAIL PROTECTED] 01/09 2:29 PM Actually DNS Guard in the PIX only allows one (the first) DNS response back. All others are dropped. At 01:53 PM 1/9/2002 -0800, Chew, Freeland (Roanoke) [EMAIL PROTECTED] wrote: Message: 4 From: Chew,

RE: help

2002-01-09 Thread Scheidel, Greg (Contractor)
Curtis, You are sending your request to the wrong address. As you can see in the e-mail you included, you need to send subscribe/unsubscribe requests to '[EMAIL PROTECTED]'. You are sending your e-mail to the mailing list submissions address. Greg S.

RE: forwarding in interfaces ethernet

2002-01-09 Thread Glenn Shiffer
Get rid of: nat (real) 0 q.w.r.5 255.255.255.255 0 0 nat (real) 0 q.w.r.6 255.255.255.255 0 0 nat (real) 0 q.w.r.7 255.255.255.255 0 0 Instead use: nat (real) 0 access-list real access-list real permit ip 10.10.10.0 255.255.255.0 q.w.r.5 255.255.255.255 access-list real

RE: forwarding in interfaces ethernet

2002-01-09 Thread Johnny Gonzalez
Thanks, i resolve the problem with the next line. global (real) 1 q.w.r.4 And the users in inside see the user in the real. i use PAT the lines of nat in real is in use. On Wed, 2002-01-09 at 18:32, Glenn Shiffer wrote: Get rid of: nat (real) 0 q.w.r.5 255.255.255.255 0 0 nat (real) 0

RE: forwarding in interfaces ethernet (in a more readable form)

2002-01-09 Thread Glenn Shiffer
Get rid of: nat (real) 0 q.w.r.5 255.255.255.255 0 0 nat (real) 0 q.w.r.6 255.255.255.255 0 0 nat (real) 0 q.w.r.7 255.255.255.255 0 0 Instead use: nat (real) 0 access-list real access-list real permit ip 10.10.10.0 255.255.255.0 q.w.r.5 255.255.255.255 access-list

how does outgoing nat work exactly?

2002-01-09 Thread Rick Lim
HI there, When an internal machine attempts to connect to a webserver thru a firewall (linux iptables) what is the exact mechanisim? Is there a good explaination on the net? Please correct me if I'm wrong, my understanding is the internal machine's browser tries to connect to www.redhat.com

PIX-no nat config

2002-01-09 Thread Ileana Hechavarria
I'm seeking some help from a PIX expert. I have the following configuration ^ To Internet,head router (2) I I 215.x.x.1 (external PIX address) --- | PIX 515 | | V 6.1 | --- I 192.168.21.1 (internal IP Address) I I 192.168.21.2

Re: Is It possible to trace a hacker, and on Diffie-Hellman

2002-01-09 Thread Stilgherrian
Robert, to comment on the first half of your posting at least (the maths of cryptography is still something I haven't explored)... On Sun, Jan 06, 2002 at 06:30:16PM -0500, [EMAIL PROTECTED] wrote: Last summer my PC was attacked by a malicious hacker who used a Trojan Horse NetBus. My Norton

PIX 515 Freezing

2002-01-09 Thread Pat Hammond
I hope i am writing this to someone who can assist me. I am trying to find out why my cisco pix 515 firewall keeps freezing. the problem has been around for some time now and is getting worse as we are getting an increase in traffic. Some Cisco Pix 515, 515-DC and 506 Firewalls have suffered

Re: Is It possible to trace a hacker, and on Diffie-Hellman

2002-01-09 Thread Bill Hinton
Yes it is possible to track a hacker but unless you have proof and can trace it to someone in the US it's a moot point. If you want to trace an attacker you should have the following: 1. An active intrusion detection system (IDS) that can perform a trace back to the source regardless of

Re: forwarding in interfaces ethernet

2002-01-09 Thread Dirk Pfau
the idea of glenn is fine, but the interface real has a lower security level than inside. therefore you must replace nat (real) 0 access-list real by nat (inside) 0 access-list real your global entry for interface real is another way, depending on you, what ever you want. dirk Johnny

RE: PIX-no nat config

2002-01-09 Thread Dirk Pfau
first: welcome to past! what's about your date? or was the mail hanging some days at a mailserver? there are some mistakes inside the configuration. did you have tested a connection from network 10.10.10.x to the internet? you have mixed 3 types of nat. the priority is nat (...) 0 access-list