Hello,
Anyone has setup firewall policy to allow Nortel Contivity VPN clients through ? What
would be the additional ports other than the standard IP Protocol 50 and UDP 50
Thank you
Regards,
Leonard
---
--
I seem to recall that TCP port 57 was also needed, I am pretty sure this was for the
Nortel VPN client.
>
> From: <[EMAIL PROTECTED]>
> Date: 2003/08/12 Tue PM 11:27:43 EDT
> To: <[EMAIL PROTECTED]>
> Subject: Nortel Contivity VPN and Firewalls
>
> Hello,
>
, August 12, 2003 8:28 PM
To: [EMAIL PROTECTED]
Subject: Nortel Contivity VPN and Firewalls
Hello,
Anyone has setup firewall policy to allow Nortel Contivity VPN clients
through ? What would be the additional ports other than the standard IP
Protocol 50 and UDP 50
Thank you
Regards,
Leonard
---
---
Contivity VPN and Firewalls
I seem to recall that TCP port 57 was also needed, I am pretty sure this was
for the Nortel VPN client.
>
> From: <[EMAIL PROTECTED]>
> Date: 2003/08/12 Tue PM 11:27:43 EDT
> To: <[EMAIL PROTECTED]>
> Subject: Nortel Contivity VPN and Firewalls
I thought it was port 500?
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
Sent: August 12, 2003 8:28 PM
To: [EMAIL PROTECTED]
Subject: Nortel Contivity VPN and Firewalls
Hello,
Anyone has setup firewall policy to allow Nortel Contivity VPN clients
through ? What
mailto:[EMAIL PROTECTED]
> Sent: Tuesday, August 12, 2003 8:28 PM
> To: [EMAIL PROTECTED]
> Subject: Nortel Contivity VPN and Firewalls
>
>
> Hello,
>
> Anyone has setup firewall policy to allow Nortel Contivity
> VPN clients through ? What would be the additional po
Hmm.
Please give some reasons why you don't like Sonicwall products. I have 4
of them and find them good (but not much to compare with others), and several
clients and other VARs that are happy with them.
Someone in the group mentioned power-supply-cable problems, but that seems
to be solved.
So,
SecurityFocus is very pleased to announce the roll-out of two new focus
areas: Pen-Test and Firewalls. The Pen-Test focus area
(http://www.securityfocus.com/pen-test), along with its associated mailing
list, Pen-Test (http://www.securityfocus.com/archives/101) will offer a
forum for all aspects
>Tim Heagarty wrote:
>
>>Hey folks,
>>
>>I have a potential client that is looking for a way to manage multiple,
>>up to 50 or so, firewalls built on OpenBSD 2.9 and IP Filter. I can
>>imagine a central aggregating console of some kind to consolidate
f your firewall machines and pipe the logs into a local log file
or an analysis program.
Brian
Tim Heagarty wrote:
Hey folks,
I have a potential client that is looking for a way to manage multiple,
up to 50 or so, firewalls built on OpenBSD 2.9 and IP Filter. I can
imagine a central aggrega
original-
De: Tim Heagarty [mailto:[EMAIL PROTECTED]
Enviado el: Miércoles, 26 de Marzo de 2003 01:04 p.m.
Para: [EMAIL PROTECTED]
Asunto: Managing Multiple OpenBSD-IP Filter firewalls
Hey folks,
I have a potential client that is looking for a way to manage multiple,
up to 50 or so
Hey folks,
I have a potential client that is looking for a way to manage multiple,
up to 50 or so, firewalls built on OpenBSD 2.9 and IP Filter. I can
imagine a central aggregating console of some kind to consolidate
logging results, status, whatever information can be gleaned from the
boxes
Greetings,
RFC 1918 specifies the reserved "private use" networks which should never
be seen across the public Internet.
RFC 2827 filtering specifies preventin a network's users from spoofing
other networks by preventing any outbound traffic on your network that
does not have a source address in
t's reasonable to expect the ISP to install ACL to
prevent the router itself being attacked.
John
-Original Message-
From: Rich MacVarish [mailto:[EMAIL PROTECTED]]
Sent: 31 January 2003 13:08
To: [EMAIL PROTECTED]
Subject: RE: Router Packet Filtering and Firewalls
Greetings,
RFC
ive effort
from their part.
Radu
-Original Message-
From: Geoff Shatz [mailto:[EMAIL PROTECTED]]
Sent: Wednesday, January 29, 2003 5:55 PM
To: [EMAIL PROTECTED]
Subject: Router Packet Filtering and Firewalls
I am trying to confirm my thoughts regarding the use of router packet
fi
.ie
Tel: +353 1 2983000
Fax: +353 1 2960499
-Original Message-
From: Paul Stewart [mailto:[EMAIL PROTECTED]]
Sent: 30 January 2003 17:17
To: 'Geoff Shatz'; [EMAIL PROTECTED]
Subject: RE: Router Packet Filtering and Firewalls
In my opinion.. This is a great question..:)
The
: Geoff Shatz [mailto:[EMAIL PROTECTED]]
Sent: 29 January 2003 22:55
To: [EMAIL PROTECTED]
Subject: Router Packet Filtering and Firewalls
I am trying to confirm my thoughts regarding the use of router packet
filtering in addition to having a firewall behind the router but first a
little
TED]]
Sent: Wednesday, January 29, 2003 2:55 PM
To: [EMAIL PROTECTED]
Subject: Router Packet Filtering and Firewalls
I am trying to confirm my thoughts regarding the use of router packet
filtering in addition to having a firewall behind the router but first a
little background...
Years a
ather logging from and analysis. Of
course I'm presuming that you are logging the denies and possibly
permits against syslog or something similar...
I realize in this setup you only have one box protecting you versus
potentionally two But I like routers to do routing and firewalls to
do f
M.D., GSEC
Coalition of National Cancer Cooperative Groups
-Original Message-
From: Geoff Shatz [mailto:[EMAIL PROTECTED]]
Sent: Wednesday, January 29, 2003 5:55 PM
To: [EMAIL PROTECTED]
Subject: Router Packet Filtering and Firewalls
I am trying to confirm my thoughts regarding the use
stems.
The IOS "firewall feature", for instance, can filter on a bunch
of low-level "malformed packet" issues that I'm not certain many
common firewalls even look for. On the other hand, stateful
inspection is a Very Good Thing, but takes more memory than most
routers h
I am trying to confirm my thoughts regarding the use of router packet
filtering in addition to having a firewall behind the router but first a
little background...
Years ago when we first connected our firm to the Internet we did not have
a firewall but used packet filtering on the route
ECTED]
Mobile. +65 9431 6184
Phone. +65 6723 1724
Fax.+65 6723 1596
-Original Message-
From: ext Rick Darsey [mailto:rdarsey@;aims1.com]
Sent: Wednesday, October 30, 2002 11:10 PM
To: Security Basics
Subject: Physical Firewalls VS NAT
I am not sure if this is the right list for
few points as to why this is better:
1) A router is designed with the idea of assisting communication, while a
firewall is designed with the idea of limiting it.
2) Firewalls can do stateful packet inspection
3) As you mentioned, firewalls have more granular control, allowing you to
control
I am not sure if this is the right list for this question. If it is not,
please let me know where to post it.
I am doing some research for one of my clients. They have requested a
physical firewall installed on their network. They are already running a
NAT'ed network behind a LinkSYS router.
If you are comfortable with setting up rules along the lines provided by
tools like IPCHAINS on linux then you might try looking at CHX-1.
I don't work for them or have an interest in them except that I've used
it and like it.
http://www.idrci.net/idrci_products.htm
-Noah
// My company has a VERY distributed user base with many people
// working from small satellite sites and/or from home. I would
// love suggestions for a PC level firewall that would protect
why only a pc level firewall?
// from intrusions and also whether hardware v. software solutions
//
of VPNs connecting users, its always been a good
> thing to
> > do to secure data. VPNs are used mostly with people who have broadband
> > routers implementing FreeBSD or Linux. I'm not so sure if some stand-alone
> > firewalls like Linksys will allow VPN connectio
d
this is the solution that they use.
Tim Donahue
-Original Message-
From: Nicole Tutt [mailto:[EMAIL PROTECTED]]
Sent: Friday, July 12, 2002 1:14 PM
To: [EMAIL PROTECTED]
Subject: Personal Firewalls
My company has a VERY distributed user base with many people working from
small satellite site
eBSD or Linux. I'm not so sure if some stand-alone
> firewalls like Linksys will allow VPN connections however.
>
There actually is a Linksys consumer router/firewall that has its own VPN
capabilities, supporting both IPSec and PPTP. It's fairly configurable,
supporting both DES and 3
. VPNs are used mostly with people who have broadband
routers implementing FreeBSD or Linux. I'm not so sure if some stand-alone
firewalls like Linksys will allow VPN connections however.
2. Keeping critical data, like patient data for instance is very crucial, so
you should put most of your
EMAIL PROTECTED]
>To: [EMAIL PROTECTED] (\"Nicole Tutt\"),
>[EMAIL PROTECTED]
>Subject: Re: Personal Firewalls
>Date: Fri, 12 Jul 2002 14:22:01 -0400
>
>Nicole -
>
>Although this is probably obvious, since you are dealing with medical
>patient info, whatever s
Here is the short answer for those with hundreds of e-mail to read:
If you want Free: Zonealarm
If you have $50: Norton 2002 Professional
Here is my Long Answer:
I had used ZoneAlarm, then ZoneAlarm Pro and eventually moved up to
Norton Personal Firewall and System Works 2002 Professional. I lik
If you have an old 386 or 486 clunker and a couple of extra NIC cards, go
to http://www.ipcop.org and download this Linux based firewall. It's VERY
EASY to use, and secure (I'm behind one now). It can be configured with a
web browser on the GREEN interface only If need be, and you need a
Nicole -
Although this is probably obvious, since you are dealing with medical patient info,
whatever solution you go with you should have someone make sure that your solution and
your resulting architecture are HIPAA-compliant.
John
In a message dated Fri, 12 Jul 2002 12:13:52 PM Eastern St
From: Nicole Tutt [mailto:[EMAIL PROTECTED]]
Sent: Friday, July 12, 2002 10:14 AM
To: [EMAIL PROTECTED]
Subject: Personal Firewalls
My company has a VERY distributed user base with many people working from
small satellite sites and/or from home. I would love suggestions for a PC
level firewall that w
Firewalls
My company has a VERY distributed user base with many people working
from small satellite sites and/or from home. I would love suggestions
for a PC level firewall that would protect from intrusions and also
whether hardware v. software solutions would be best. We deal with
medical records so
For a chart which shows a comparison of the various personal firewalls, go
here: http://www.pcflank.com/art19.htm
One I don't list out below which I like the best is Outpost Firewall by
Agnitum. <http://www.agnitum.com/download/outpostfree.html>
This gives some details even though
PROTECTED]
Subject: Personal Firewalls
My company has a VERY distributed user base with many people working from
small satellite sites and/or from home. I would love suggestions for a PC
level firewall that would protect from intrusions and also whether hardware
v. software solutions would be best
Black Ice Defender seems to be an all time favorite.
On Fri, Jul 12, 2002 at 10:13:52AM -0700, Nicole Tutt wrote:
> My company has a VERY distributed user base with many people working from small
>satellite sites and/or from home. I would love suggestions for a PC level firewall
>that would pr
>My company has a VERY distributed user base with many people working from
small satellite sites
>and/or from home. I would love suggestions for a PC level firewall
that would protect from intrusions
>and also whether> hardware v. software solutions would be best. We deal
with medical re
"Nicole Tutt"
.com>cc:
Subject: Perso
My company has a VERY distributed user base with many people working from small
satellite sites and/or from home. I would love suggestions for a PC level firewall
that would protect from intrusions and also whether hardware v. software solutions
would be best. We deal with medical records so
Of course, with
the latter, Zone Alarm tries the same thing when first installed.
-Original Message-
From: Katarn
Sent: Monday, May 20, 2002 13:00
To: [EMAIL PROTECTED]
Subject: Personal firewalls question (for Windows)
I have been reading this mailing list for several months now, and
se of security against
trojans and viruses by firewall products. Firewalls do not protect
against these. For genuine protection from malware, you need the tools
for the job. This means up to date antivirus software, anti spyware
software, and antitrojan software.
You might also want to check out the
: "Katarn" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Saturday, May 18, 2002 12:48 AM
Subject: Personal firewalls question (for Windows)
> I have been reading this mailing list for several months now, and I
> haven't "heard" about a "perso
Try this
http://online.securityfocus.com/infocus/1573
[]´s
Fabiano Pacheco
-Mensagem original-
De: Katarn [mailto:[EMAIL PROTECTED]]
Enviada em: sexta-feira, 17 de maio de 2002 19:49
Para: [EMAIL PROTECTED]
Assunto: Personal firewalls question (for Windows)
I have been reading
I have been reading this mailing list for several months now, and I
haven't "heard" about a "personal firewall" (for Windows) with the
amount of options and features of AtGuard. I still use AtGuard at home
and work and I really really like it but I don't know what other options
exist in case i
Does anyone have any infromation regarding using
SoftOS or SoaftWall as a Linux firewall? The box would
be setup as a physical link between various servers
including SSL, SQL, and IIS. Any information regarding
SoftOS or SoftWall would be much appreciated.
both firewalls so even if one exists your LAN would still be
secure (however your DMZ might be breached). Also you time to patching
period is increased which gives you some leeway if you are not up to the
moment with potetial security flaws.
M
-Original Message-
From: White, Michael
ecure. The main problem is that one
firewall provides a single point of entry for attackers. Should an attacker
manage to infultrate the DMZ, the likelihood they'll be able to infultrate
the local network is higher.
Option 2: 2 Firewalls. The configuration would look something like this
on your firewall.
You've also severely limited your ability to grow the network with this
approach. If you want to add a second Internet connection, DMZ, or
internal network in the future you will have to rebuild your firewall,
as well as re-write your rulesets.
I prefer to use two firewal
>
Neither
One firewall with 3 network carts inserted
Regards
Kim
-Oprindelig meddelelse-
Fra: Derrenbacker, L. Jonathan [mailto:[EMAIL PROTECTED]]
Sendt: 2. april 2002 20:41
Til: '[EMAIL PROTECTED]'
Emne: DMZ - 2 firewalls, or 1 firewall + 1 router
I heard that you can ma
There are many possible "correct" answers.
The key factor is protecting yourself against the worst case
scenario. If you have one firewall with three cards that's only
one box for someone to take over. If you use two separate boxes
to create your DMZ the hacker has to go throug
In our lan topology we currently use 3 firewalls, and one router, the
router does routing only, as it is designed to do, the first firewall is
a IDS/routing unit that is basically invisible, all good packets it sees
it forwards to the appropriate lan interface DMZ or private, all private
PROTECTED]'
Subject: Re: DMZ - 2 firewalls, or 1 firewall + 1 router
1 firewall + 1 router is a technique, but not
recommended. Using the 2 firewall setup is usually
best. Using one firewall for the external connection
(Internet) and the other firewall for the internal
network (LAN).
Good L
L PROTECTED]'
Subject: DMZ - 2 firewalls, or 1 firewall + 1 router
I heard that you can make a DMZ with a router and a firewall. Is that a good
way to make a DMZ, or should you use 2 firewalls?
Thanks in advance.
]]
Inviato: lunedi 1 aprile 2002 22.27
A: [EMAIL PROTECTED]
Oggetto: Firewalls
What is the difference between the various levels of Firewalls. My current
requirement is comparing a (router-based) level 3 firewall to a (PIX) level
7 firewall. Can anyone explain the differences?
Does anyone know
> What is the difference between the various levels of Firewalls.
> My current requirement is comparing a (router-based) level 3 firewall to a
> (PIX) level 7 firewall. Can anyone explain the differences?
The different layers being discussed are the from the OSI networking model.
So,
David Campbell" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Monday, April 01, 2002 2:27 PM
Subject: Firewalls
> What is the difference between the various levels of Firewalls. My
current
> requirement is comparing a (router-based) level 3 firewall to a (PIX)
level
> 7 fir
Neither
One firewall with 3 network carts inserted
Regards
Kim
-Oprindelig meddelelse-
Fra: Derrenbacker, L. Jonathan [mailto:[EMAIL PROTECTED]]
Sendt: 2. april 2002 20:41
Til: '[EMAIL PROTECTED]'
Emne: DMZ - 2 firewalls, or 1 firewall + 1 router
I heard that you can make
r, L. Jonathan"
<[EMAIL PROTECTED]> wrote:
> I heard that you can make a DMZ with a router and a
> firewall. Is that a good
> way to make a DMZ, or should you use 2 firewalls?
>
> Thanks in advance.
>
__
Do You Yahoo!?
Yaho
You only need one firewall for a DMZ. Most firewalls have more than two
interfaces.
1 interface for the inbound traffic
1 interface for the private network
1 interface for the DMZ
> I heard that you can make a DMZ with a router and a firewall. Is that a good
>
Levels map to the OSI layers of TCP/IP.. Level 3 is network level or level 7
is the application level. At level 7 the firewall can differentiate the
applications such as HTTP or SMTP.. There are many pros and cons (speed,
security etc..)
Check out: NIST's SP 800-41 Guidelines on Firewall
I have seen DMZs set up between two firewalls and off a third network
from the firewall. Example, firewall has connection to the internet
router, another connection to the inside network, and a third to the
DMZ segment. This is the method I've usually used, the idea being to
have a sep
erify
http://www.firetower.com/forum/applicationproxy.html
meaculpa
-Original Message-
From: David Campbell [mailto:[EMAIL PROTECTED]]
Sent: Monday, April 01, 2002 10:27 PM
To: [EMAIL PROTECTED]
Subject: Firewalls
What is the difference between the various levels of Firewalls. My
current
I heard that you can make a DMZ with a router and a firewall. Is that a good
way to make a DMZ, or should you use 2 firewalls?
Thanks in advance.
What is the difference between the various levels of Firewalls. My current
requirement is comparing a (router-based) level 3 firewall to a (PIX) level
7 firewall. Can anyone explain the differences?
Does anyone know of a good resource that defines/compares the attributes of
firewalls of
I am trying to decide on a Distributed Firewall product for a VPN rollout.
I have several vendors that I am looking at. (Zone Labs Integrity, Cyber
Armour, CMDS) Does anyone out there have any experience with any of these
products or have a suggestion for a good one?
Thanks
Iyad Abbas,
VPN Pro
The difference is negligible, given that the individual is an expert in
their respective operating system. The proof is in the pudding... which
ones are *easier* to configure initially, easier to maintain in the long
run, and requires the least security patches? OpenBSD wins *hands_down* on
From personal experience, IPf (now PF) and NAT on OpenBSD are easier to
set up than IP Chains, and are pretty straightforward. Check out
http://www.openlysecure.org for a little better idea of how each works.
Jim Swanson
DocValde wrote:
> Hallo Enphourell Security,
> am Samstag, 26. Januar
Thanks alot guys, sometimes I need that concensus. OpenBSD is my first choice usually
when I have to build something that needs to be secure. I just wanted to see if
anyone though linux with iptables might be a better choice than OPenBSD with pf, for
some reason.
On Sat, 26 Jan 2002 19:28:4
> Which OS do you guys think would make the best firewall, OpenBSD or
> Linux?
While the various flavors of Linux can be secured, OpenBSD is built from the
ground up with security in mind.
Good luck,
Jeffrey C. Keyser
Hallo Enphourell Security,
am Samstag, 26. Januar 2002 um 10:27:50 schrieben Sie:
ES> Which OS do you guys think would make the best firewall, OpenBSD or Linux?
What a question! My first thought was "The one you're most familiar
with!". But well, OpenBSD shouts to the world:"4 1/2 years without
Which OS do you guys think would make the best firewall, OpenBSD or Linux?
I wouldn't relay upon software firewalls for servers, since sofware
friewalls are best suited for desktops and home users, not as a cheap
solution for networks. If you need a firewall for servers, then purchase
a hardware version!
Kevin Crichton, MCSE
ICL, UK
Kleber S Oliveira wrote:
We are running into a few companies demanding that
we use proxy firewalls instead of stateful inspection.
My boss made the following comment:
" ... an inbound proxy firewall does not provide any
additional protection that I can see. If port 80 is open
through a proxy server
I think that the performance of the machine (server) fall down.
"Kevin Crichton" <[EMAIL PROTECTED]> wrote:
>I run zone alarm and norton internet security 2001 together. I think
>that if you are going to install software firewalls you should have 2
>installed to
e pix, linksys firewall.
Let me know if that helps,
-Terry
Hi,
Would there be a problem if you ran two two firewall proggies at the
same time?
I did a websearch first any only found
http://www.fosters.com/special_sections/online/articles2001/1023d.htm
Which only says two firewalls might con
I run zone alarm and norton internet security 2001 together. I think
that if you are going to install software firewalls you should have 2
installed to complement each other or provide "defence in depth" since
its not really true to believe or argue that they 'spread the lo
home or small office solution based on the nature of your
query.
i have found that running software/host based firewalls at home is a
waste of money, time and CPU, and doesn't offer nearly the levels of
security that can be achieved with the solutions i described in the
first paragraph. i
Hi,
Would there be a problem if you ran two two firewall proggies at the
same time?
I did a websearch first any only found
http://www.fosters.com/special_sections/online/articles2001/1023d.htm
Which only says two firewalls might conflict with each other without any
specific info.
Besides
Bypassing a firewall is a good question to be asked my security engineers. And
probably half of the people on this list know methods to beat different types of
firewalls. For those of you familiar with SANS, they offer classes that touch on this
topic, like the Firewall class and the
ound those. Learn all about routers n firewalls etc
etc, and think and check about currently used network configuration about
how everything is connected between themselfes and what type of equipment is
being used. These things always depends on so many other things. ;)
Regards:Antti.
-Origin
Why do you want to bypass a firewall? It's there for your
protectionand to keep you out of trouble.
> -Original Message-
> From: Michael Watson [mailto:[EMAIL PROTECTED]]
> Sent: Sunday, December 30, 2001 1:44 PM
> To: [EMAIL PROTECTED]
> Subject: firewalls
&g
That sort of would defeat the purpose, wouldn't it?
Michael Watson wrote:
>
>
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> happy new year everyone!
>
> i was wondering if anyone could direct me to some detailed
> information on bypassing firewa
under the advanced settings
>
>-Original Message-
>From: Cami Boyd [mailto:[EMAIL PROTECTED]]
>Sent: Thursday, December 27, 2001 11:17 PM
>To: [EMAIL PROTECTED]
>Subject: windows XP and firewalls
>
>I have a home network that has windows XP. I did have Norton firewall
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
happy new year everyone!
i was wondering if anyone could direct me to some detailed
information on bypassing firewalls. thanks.
-BEGIN PGP SIGNATURE-
Version: PGPfreeware 7.0.3 for non-commercial use <http://www.pgp.com>
yd [mailto:[EMAIL PROTECTED]]
Sent: Thursday, December 27, 2001 11:17 PM
To: [EMAIL PROTECTED]
Subject: windows XP and firewalls
I have a home network that has windows XP. I did have Norton firewall
on here, and now sygate firewall. If my firewall is on, my clients in
my home network aren't
I have a home network that has windows XP. I did have Norton firewall on here, and
now sygate firewall. If my firewall is on, my clients in my home network aren't able
to access the internet. I have opened the UDP and TCP ports that I was supposed to
open, and they still can't help me any, c
AIL PROTECTED]>
To: 'kutulu' <[EMAIL PROTECTED]>
Cc: <[EMAIL PROTECTED]>
Sent: Monday, October 15, 2001 10:41 PM
Subject: RE: Personal firewalls for laptops
> I have had quite a few problems with zone alarm.
>
> With windows 2000:
>
> Machine 1: I installed
several months.
-Original Message-
From: Nina Levitin [mailto:[EMAIL PROTECTED]]
Sent: Monday, October 15, 2001 1:41 PM
To: 'kutulu'
Cc: [EMAIL PROTECTED]
Subject: RE: Personal firewalls for laptops
I have had quite a few problems with zone alarm.
With windows 2000:
Machine
]]
Sent: Mon, October 15, 2001 10:41 PM
To: 'kutulu'
Cc: [EMAIL PROTECTED]
Subject: RE: Personal firewalls for laptops
I have had quite a few problems with zone alarm.
With windows 2000:
Machine 1: I installed ZoneAlarm and rebooted. From that point on windows
2000 refused to come up.
[mailto:[EMAIL PROTECTED]]
Sent: Sunday, September 30, 2001 11:45 PM
To: [EMAIL PROTECTED]; [EMAIL PROTECTED]
Subject: Re: Documenting Firewalls
Basically when documenting a firewall, it is like doing a business case for
a firewall.
1. You need to write why the need of the firewall (i.e. just a 1 page
Basically when documenting a firewall, it is like doing a business case for
a firewall.
1. You need to write why the need of the firewall (i.e. just a 1 page threat
analysis of your network),
2. How does the firewall provide security against the mentioned threats.
3. Type of firewall, supplier
HAs anyone test driven this ? I went to the site and found it very
proffessionally presented.
-P
-Original Message-
From: Rick Bestany [mailto:[EMAIL PROTECTED]]
Sent: Wednesday, August 15, 2001 2:07 PM
To: Joe Heaton; [EMAIL PROTECTED]
Subject: RE: Firewalls
http://www.smoothwall.org
96 matches
Mail list logo