Jamie Riden wrote: > 2009/8/26 Bikram Gupta <[email protected]>: >> Scenario: Perimeter IPS deployment, with Stateful firewall at the egress >> point. >> >> Traffic from out to in: Firewall will block all unsolicited UDP ports. >> For the UDP ports where traffic is allowed (RTP data etc) through >> firewall, do I have to pass it though IPS engine? Will there be cases >> of exploits in such cases? Some examples please.
sip is a big source of udp ips rules. >> Traffic from in to out: I believe IPS processing for UDP flows must be >> enabled here.. to detect some of the p2p, IM, skype, trojan etc >> traffic. >> >> I am trying to understand the impact, if I bypass the UDP flows from >> IPS device? Can this be done realistically for some UDP traffic >> (in->out, out->in), or NONE? >> >> Thanks a lot. >> >> Bikram > > Slammer was UDP. Witty was UDP. > http://en.wikipedia.org/wiki/SQL_slammer_(computer_worm) > http://en.wikipedia.org/wiki/Witty_(computer_worm) > > RTP is complex enough that I wouldn't be surprised at a few parser > bugs popping up at some point. > > I'd rather get a higher-powered IPS than not looking at UDP, but it > depends on your cost/benefit analysis. > > cheers, > Jamie > ----------------------------------------------------------------- Securing Your Online Data Transfer with SSL. A guide to understanding SSL certificates, how they operate and their application. By making use of an SSL certificate on your web server, you can securely collect sensitive information online, and increase business by giving your customers confidence that their transactions are safe. http://www.dinclinx.com/Redirect.aspx?36;5001;25;1371;0;1;946;9a80e04e1a17f194
