I like to use nmap to externally scan firewalls with various options. In addition I often try a few spot checks using an internal netcat listener and then trying to connect to it from the outside world. With all the fragmentation problems these days, one should probably try and route the connections to the netcat listener through something like fragrouter. Cheers, -- Ben Nagy Network Consultant, Volante Solutions PGP Key ID: 0x1A86E304 Mobile: +61 414 411 520 > -----Original Message----- > From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] > Sent: Tuesday, 24 October 2000 8:06 AM > To: [EMAIL PROTECTED] > Cc: [EMAIL PROTECTED] > Subject: Firewall security rule validation via Intrusion Detection > system > > > Has anyone done this type of testing where the IDS agent/detector is > utilized to validate a router's ACL's or a firewall's security > rule/policy?? If not, how does one really validate a > firewall is setup > correctly. Do they just say well, it is passing email and > web, it must be > working or is there some sort of check list people use nowadays.. ?? > > > /m > > - > [To unsubscribe, send mail to [EMAIL PROTECTED] with > "unsubscribe firewalls" in the body of the message.] > - [To unsubscribe, send mail to [EMAIL PROTECTED] with "unsubscribe firewalls" in the body of the message.]
