> Again, I'm baffled by the level of paranoia that is present among
> current security practitioners.
??!!
> The issue here is not NM or the protocols it's using, but how you can
> implement it in a secure fashion. If that means to set up a Proxy
> Server, that can dynamically open ports, behind, before, or next to an
> existing, static rule firewall, then so be it. Open your mind, and the
> bytes will follow...
So please outline the steps to take to secure NM and meet the three criteria
you mentioned, using the technique you just proposed.
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]