Policy
........
It seems there are so many reasons to not just allow
all outgoing access to the web these days.

ports 138,139, 445, back oriface...

I am considering doing a "deny unless explicitly
allowed" policy and then allowing what is needed. Like
I do at home with IPCHAINS.
I think this is a good policy and if nothing else, it
forces you to be aware of what is going on.

implementation
...............

The pix as I undestand has a security level assigned
to each interface. The lower security interfaces will
always trust the higher security interfaces. The
"access-list" or "outbound" ( prefer outbound command
) commands can be used to "selectivly" deny or permit
access as required. 


Will the trust between interfaces prevent me from
successfuly implementing a default "deny unless
explicitly allowed" outgoing policy. 

I think this default policy should be feasible.
I have been told otherwise by a consultant, and I
think he might be wrong.

tia
Todd










__________________________________________________
Do You Yahoo!?
Send instant messages & get email alerts with Yahoo! Messenger.
http://im.yahoo.com/
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to