NAI provide a patch cluster.SOLARIS.patch level 1, it should resolve your
logging destination problem.




---------------------- Forwarded by Susan M Bustamante/Long Beach/IBM on
02/14/2000 11:58 AM ---------------------------

"Steven Pierce" <[EMAIL PROTECTED]>@Lists.GNAC.NET on 02/12/2000
05:30:43 PM

Sent by:  [EMAIL PROTECTED]


To:   "Merton Campbell Crockett" <[EMAIL PROTECTED]>, "Firewall List"
      <[EMAIL PROTECTED]>
cc:
Subject:  Re: Gauntlet 5.5 for Unix



Merton,

If you go to Sunfreeware.com page they have a utility that will allow you
to run Linux Apps under Solaris.  It is called lxrun.  If you go to the
site
http://www.sunfreeware.com/ and in the right hand box you will see the link
for it.  I have not personally used it so I can not say if it is any good
or not.  But it might be a worth a try.

*********** REPLY SEPARATOR  ***********

On 02/12/2000 at 11:02 AM Merton Campbell Crockett wrote:

>After NAI announced that it was discontinuing the BSD/OS based version of
>Gauntlet, my customer decided to switch to the Solaris based version of
the
>product.  The replacement hardware and Gauntlet 5.5 arrived and have been
>installed.
>
>Unfortunately, the switch from the BSD/OS based Gauntlet 5.0 to the
Solaris
>based Gauntlet 5.5 has been a far more difficult transition than one would
>expect.  Literals used in IPFW rules, e.g. telnet, were not translated to
>the correct port numbers.  It's taken a few days but these problems have
>been erradicated.
>
>The major problem that remains involves the "securityalert" entries in the
>log, /var/log/messages.  The target or destination address that is
reported
>is the IP address of the interface on which the packet arrived.  The
BSD/OS
>based versions of Gauntlet reported the IP address of the actual target or
>destination.
>
>The latter is what we would prefer seeing recorded.  It allows us to
quickly
>identify activity involving the "dim stars in our corporate firmament"
that
>have taken a laptop home and forgotten to change their system
configuration
>appropriately.  In addition, knowing the target IP address allows us to
>differentiate between activity targetted at a specific system and activity
>that is simply probing for a weakness.
>
>What are the "sweet nothings" that need to be whispered in Gauntlet's ear
to
>force the recording of the actual destination IP address?
>
>Merton Campbell Crockett
>
>
>-
>[To unsubscribe, send mail to [EMAIL PROTECTED] with
>"unsubscribe firewalls" in the body of the message.]



-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]



-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to