OK.  Now I've got rules.

DENY *   > WAN  'RPC Service'
DENY WAN > *    'RPC Service'

Consider that my existing rules deny ALL incoming WAN connections except for
a few IPs and small ranges.  Goes to show that was not an effective defense.
Now I realize that to deny all ports except the ones we need is impossible -
or is it?

This Microsoft Windows might really catch on someday.  :-)




on 8/11/2003 12:42 PM, David McRell at [EMAIL PROTECTED] wrote:

> Hello, SW List.
> 
> Has anyone seen this, yet?
> 
> 'The cache is full; 3072 open connections; some will be dropped'
> 
> 
> I guess I'm wondering about new exploits.  A PC running XP Pro was
> generating lots of outgoing connections to port 135 when this happened.  The
> destination addresses all resided within 93.130.0.0/16.

-- 
David McRell

---
[This E-mail scanned for viruses by Declude/F-Prot AV]

===================================================================================================
To unsubscribe, send email to [EMAIL PROTECTED] In the body of the email put the 
following: unsubscribe sonicwall your_name
The archive of this list is at http://www.mail-archive.com/sonicwall%40peake.com/


Reply via email to