OK. Now I've got rules. DENY * > WAN 'RPC Service' DENY WAN > * 'RPC Service'
Consider that my existing rules deny ALL incoming WAN connections except for a few IPs and small ranges. Goes to show that was not an effective defense. Now I realize that to deny all ports except the ones we need is impossible - or is it? This Microsoft Windows might really catch on someday. :-) on 8/11/2003 12:42 PM, David McRell at [EMAIL PROTECTED] wrote: > Hello, SW List. > > Has anyone seen this, yet? > > 'The cache is full; 3072 open connections; some will be dropped' > > > I guess I'm wondering about new exploits. A PC running XP Pro was > generating lots of outgoing connections to port 135 when this happened. The > destination addresses all resided within 93.130.0.0/16. -- David McRell --- [This E-mail scanned for viruses by Declude/F-Prot AV] =================================================================================================== To unsubscribe, send email to [EMAIL PROTECTED] In the body of the email put the following: unsubscribe sonicwall your_name The archive of this list is at http://www.mail-archive.com/sonicwall%40peake.com/
