> From: Dave Watts <[EMAIL PROTECTED]>
> >> > I have to say, I agree with Robert here, in that if you
> >> > want to control traffic at your server itself (host security),
> >> > rather than or in addition to controlling traffic at the
> >> > router and firewall, the OS provides all the tools you need.
> >> > Windows NT 4 and higher allow you to block incoming traffic
> >> > on all ports except those you explicitly list, using the
> >> > TCP/IP Filtering dialog, and Windows 2000 gives you even
> >> > greater control using IP security policies. In some respects,
> >> > this is better than using something like BlackICE, in my
> >> > opinion, because it's free, and if you manage multiple Win2K
> >> > servers you can even use the same policies on all of them.
> >>
> >> I don't remember the ability to do statefull filtering in any
> >> of these tools.
> >
> >Nope. That's what external firewalls are for. My approach to host-based
> >security is generally just to disallow as much traffic as I can; I don't
> >know what kind of performance hit you'd take with doing that on each host,
> >and I don't want to find out. I guess I shouldn't have said "the OS
> provides
> >all the tools you need" if you're not going to use an external firewall,
> >though.
> >
> >If you do want that functionality, though, and you don't want to pay for
> it,
> >you might look at Snort:
> >http://www.snort.org/

Snort does not do any filtering. It's an IDS that logs scans.

______________________________________________________________________
Get the mailserver that powers this list at http://www.coolfusion.com
FAQ: http://www.thenetprofits.co.uk/coldfusion/faq
Archives: http://www.mail-archive.com/[email protected]/
Unsubscribe: http://www.houseoffusion.com/index.cfm?sidebar=lists

Reply via email to