Hi chaps,
We are looking at setting up a DMZ based wifi AP at a remote site where they have lots of freelancers coming and going. This would be used for the freelancers and would stop them accessing internal resources while allowing them external access. There would be another wifi AP for the internal staff to use. I want to also block certain outgoing ports on the DMZ based Wifi AP so that traffic use is limited. Essentially I want to limit access to just the basics. Now, my 'basics' and someone else's 'basics' are two different things I'm sure. I thought I might asked the list whether anyone has looked at the kind of traffic internal staff legitimately use/create and what ports other people are blocking. The list so far is; To Allow: HTTP (80) HTTPS (443) FTP (21) RDP (3389) RWW (4415) To Block (ideally all but at least): SMTP (25) IRC (6666 - 6669) Any others? Olly -- G2 Support Online Backups Email: [EMAIL PROTECTED] <mailto:[EMAIL PROTECTED]> Web: http://www.g2support.com <http://www.g2support.com> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~
