* This is the modus mailing list *
Cary,
That is all very well and good, but an intruder who has managed to get
onto your Mail Server, Web Server or Radius Server would then have
access to your Accounting and Authentication data by way of routing
through the compromised system.
I note you say other firewalling is in place, and I hope that the above
scenario has been considered as many people think that using NAT
protects them.
---
If quitters never win, and winners never cheat, who's the idiot that
said:
Quit while you're ahead?
(--------------------------------) {((((((
( Suneel Jhangiani ) /_ _ )
( Technical Director ) ( . . )
( Inter-Computer Technology Ltd. ) ( / )
(----------------------------------oOOo------------oOOo----)
( 40 James Street Tel: +44 (0) 20 7486 9601 )
( London W1U 1EU Fax: +44 (0) 7050 678 978 )
( United Kingdom Email: [EMAIL PROTECTED] )
( Website: http://www.inctech.com )
(----------------------------------------------------------)
-----Original Message-----
From: Cary Fitch [mailto:[EMAIL PROTECTED]
Sent: 08 February 2004 16:29
To: [EMAIL PROTECTED]
Subject: [Modus] Firewall and Security
* This is the modus mailing list *
One of the things we are about to do is move our SQL Server to a private
address.
Since the only machines that need to talk to it are: Mail Server, Radius
Server(s), Web Server (Rodopi), that are on our network, it should be
able
to be on private (non publicly routeable) addresses, and visable only to
our
own net, thus protecting it from much "ill will".
Those machines will have public and private addresses, but the SQL
Server
would have only a private address.
Other firewalling is also in progress.
Cary Fitch
Attend Peering Conference for ISP's,
April 23-24, 2004, Dallas Texas
Full info: http://www.peercon.org
**
To unsubscribe, send an Email to: [EMAIL PROTECTED]
with the word "UNSUBSCRIBE" in the body or subject line.