I have a request pending to allow IIOP through a proxy firewall gateway
using a generic TCP proxy.  I would welcome comments about the security
implications of allowing IIOP through the firewall gateway, especially if
anyone knows of exploits using IIOP as the means of entry.  IIOP will be
used to allow two-way data transfers between an internal system and a
system on our external network, as so:

Internal IIOP --- Proxy Firewall --- External IIOP
                                  |
                                router --- Internet


-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to