Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations TouchToneTommy on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

Search results for query: *

  1. whostolemyhandle

    Oracle client through fw-1 fails

    Make sure you have a rule at the end of the policy that says any any drop log and then try the connection and watch the log files. You will soon find out what ports re required by looking at the log.
  2. whostolemyhandle

    DUAL PROCESSOR

    On a Solaris machine they say one processor per quad ethernet card because the arrival of data on the ethernet port causes CPU interrupts and contect switches. Sun only specify four ports per processor. Other than that you can take your chances. Multiple CPUs usually tke part in symmetric...
  3. whostolemyhandle

    Viewing archived log files

    fwlogexport -n -i <nameofinputlogfile> -o <nameofoutputtxtfile> Do this on the management station and you will get an ASCII readable log file. As long as the objects.C file is on the machine it will recreate the .ptr file The first line of this file defines the column headings. The columns can...
  4. whostolemyhandle

    disabling proxy arp

    Which platform? If it is Nokia IPSO, then there is a Voyager option to switch it off. http to the box and log in as admin. If unix in general, then try man arp and looking for the option to remove an entry from the arp table. You would need to research how to make the change permanent - if...
  5. whostolemyhandle

    Firewall stops connecting but still logs everything as ok

    Seen the same problem on a Nokia IP440, not particularly high traffic. Suspecting the interface card, but that's a hunch.
  6. whostolemyhandle

    FW1 not letting anyone through

    Check your interface topology - ie antispoofing, and decide between static NAT and hide NAT. Do tcpdump on the external and internal interfaces of the firewall while testing the connection. Check your routing. Make sure that you have a static route if you are using pre NG release of FW-1 - or NG...
  7. whostolemyhandle

    What is the best study strategy

    The exam room in Canberra was hot and uncomfortable. 250 questions under such conditions was as much a physical challenge as it was mental. A big bottle of water was essential. During the exam, I found the best way (for me) to tackle it was a combination approach. The pass mark is 70%. I figured...
  8. whostolemyhandle

    Security model. Confusion.

    If anyone has &quot;All in One CISSP Certification exam guide, Shon Harris, Osborne ISBN 0-07-219353&quot;, can you explain the bizzare picture of a security model on p 70, Fig 3.5? It is supposed to be a &quot;layered&quot; model where each layer supports the one above. Here it is, top,down...
  9. whostolemyhandle

    Link to a nice security glossary of terms.

    http://developer.novell.com/research/appnotes/1997/november/10/a971110_.pdf
  10. whostolemyhandle

    Which are the most important of the rainbow guides?

    ... for the CISSP exam, which of the rainbow series would be a good read for the exam in particular? I've got stuck into the Organge Book, and suspect that the Red Book is another, but what about any others. (There are many)
  11. whostolemyhandle

    Polyinstantiation

    Does anyone have a concise, clear explanation of polyinstantiation?

Part and Inventory Search

Back
Top