|On Thu, 18 Apr 2002 12:38:56 +0200 (CEST)
|[EMAIL PROTECTED] wrote
| about presentation:

> have you suggestions about such demonstratrations that i can do?

Just browsing the maillist archives will provide plenty of examples.
But since you asked:
 - log invalid access to specif ports or from
   specific hosts/nets  (possibly with Harald's ULOG patch)
 - general firewalling issues (blocking access to services)
 - access control (user authentication implicates in adding rules
   and enabling traffic from inside/out or vice-versa)

Guess that is enough homework ;o)
best regards,
Senra

-- 
Rodrigo Senra         
MSc Computer Engineer   (GPr Sistemas Ltda)     [EMAIL PROTECTED] 
http://www.ic.unicamp.br/~921234  (LinUxer 217.243) (ICQ 114477550)

Reply via email to