Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations SkipVought on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

Search results for query: *

  1. JoeBloggssss

    Question

    Hi, I am new to this area of security, I am aware of how to integrate a proxy with Firewall-1 using UFP. My questions are 1. Is it better to place a proxy internal and let the clients contact it direct with it define in the web broweser of the clients, or using CVP. 2. I believe you can...
  2. JoeBloggssss

    RFC 1918 Client Management

    Hi, I have two sites that are connected to corporate network, all clients are RFC 1918 compliant and not directly contactable by the internet, there is no on-site IT support, what is the best practice for remote mangement. I was considering setting up a management server in a private segment...
  3. JoeBloggssss

    Check Point VPN-1 Secure Client Protocol Problem

    Hi, Run a registry monitoring tool such as active registry monitor, deselect the binding then compare it with the orginal registry snapshot, then create two registry files say called bind and unbind. You can then execute these as needed.
  4. JoeBloggssss

    DownGrade

    I am unsure if the client orginally had R54 installed before the upgrade, or this was a clean install. I have it in mind to remove all the CP packages via the Nokia Voyager interface, then upload, unpack and install Check Point R54 from my FTP Server. Hostname, binded to external IP facing...
  5. JoeBloggssss

    DownGrade

    Hi, Any more please share their experience of the process and any quirks in downgrading from R55 to R54 on an IPSO box. The general process you find works and any issues to be aware off. Thanks
  6. JoeBloggssss

    Trace email source w/out headers

    mvvilleza do you want a hard cash figure, this would depend on what type of deal you get or partnership status.
  7. JoeBloggssss

    Trace email source w/out headers

    :) I work for a IT Managed Provider, and many of our clients are government departments. You are right, the cost for all this is high. However, most companies use a firewall like Check Point which supports gateway AV scanning. You could use an open source IDS/IPS so no cost there. Interity...
  8. JoeBloggssss

    How to View Outlook Message Content

    Hi, Cool, why do Microsoft always have to make in a burden!
  9. JoeBloggssss

    Trace email source w/out headers

    Alot less than the law suits for client personal information leaks.
  10. JoeBloggssss

    securing ftp

    Gene6 BulletProof FTP support ssl/sh I believe.
  11. JoeBloggssss

    switch vulnerability

    The only traffic you should be seeing with a switch is broadcast traffic in that domain generated by the switch to determines which end devices have an associated IP and MAC not yet in the CAM table. Except when SPAN port enabled. My experience with arp posining is it is usually directed at the...
  12. JoeBloggssss

    TCP/UDP connection

    Hi, Session establishment is a three stage process for TCP. Client A ----> SYN Client B Client A <---- SYN/ACK Client B Client A ----> ACK Client B This is the session established. This process requires for all communications. Also, packet flags such as RST (Reset), and FIN...
  13. JoeBloggssss

    2003 Server and USB

    http://www.devicelock.com/
  14. JoeBloggssss

    How to View Outlook Message Content

    Outlook doesn't have a View, Source option like you'll find in Outlook Express. It has View, Options which shows you the Internet header in a small text box. But it only includes the Internet header, not the full message source. Using Outlook 2003 you can view the header and source together, if...
  15. JoeBloggssss

    2003 Server and USB

    Hi, My company is a Microsoft Gold Partner, this area interested me and I spoke with Microsoft regarding this. There is no real solution without using a third-party application, Windows XP SP2 does include a workaround but is still far to administrative intensive and would not be good foryour...
  16. JoeBloggssss

    Trace email source w/out headers

    Hi, ----------------- - Best Practice - ----------------- 1. Invest in an gateway anti-virus solution, Check Point can integrate CVP Servers, which supports many best-of-breed anti-virus programs. 2. In relation to home and mobile users having compromised endpoints, using somthing like Zone...
  17. JoeBloggssss

    Prevent users from using laptops

    Hi, 1. You should have the use of laptops prohibited in your organisational policies, this should have management buy in, and have actions taken against users whom break it. 2. This can be enforced by technology, port security using only authorised MAC address is the most obvious way...
  18. JoeBloggssss

    VPN Tunnel Termination Points

    Hi, I agree with what you say regarding the enhanced functionality of Check Point. However, Check Point and other cisco and non-security solutions offer NAT-T, which encapsulates the IPSEC traffic so it can traverse NAT devices with invalidating the packet, thus, the router would not need to...
  19. JoeBloggssss

    VPN Tunnel Termination Points

    Hi Chris, Just a quick question, why do you perfer to perform NAT on the firewall and not the edge router? Is it becuase of functionality of CP. Thinking about it would it not place more load on the already resource intersive firewall, and does the platform really scale, Nokia is very...
  20. JoeBloggssss

    VPN Tunnel Termination Points

    Chris, If I dont NAT at the edge router. I assume I will have to assign the primary public IP to the router's external interface, then one of the public block's IP to router's internal interface and the firewall's external interface? Is this not wasteful of the router external and internal IP...

Part and Inventory Search

Back
Top