I am concerned that allowing SNMP traps to pass from or through a FW, into a
console on an enterprise network, is opening up the assets which the FW is
protecting to exploits from the outside world. But it's been more of a
hunch than something I can actually demonstrate.
I would greatly appreciate anyone's thoughts on whether this danger is real
or perceived. If real, how might evil-doers actually gain from such a
capability? Use of applications such as OpenView, NetIQ and NetCool come to
mind ...
> -----Original Message-----
> From: Paul Burland [SMTP:[EMAIL PROTECTED]]
> Sent: Tuesday, October 19, 1999 7:00 AM
> To: firewalls
> Subject:
>
> Please could somebody help.....
>
> I'm looking onto the manageability of firewalls using SNMP. I would like
> to
> know, what sort of data I am likely to get from standard mib2, if any.
> And
> what additional detail is available from Enterprise Mibs.
>
> I would also like to know where I can get a copy of an enterprise Mib to
> compile into Network Node Manager, so I can have a look around.
>
> Thanks in advance
>
>
> Paul B
>
> To return mail [EMAIL PROTECTED]
> Remember it is better to regret the things you've done, than the things
> you
> didn't do.
>
> "Unknown"
>
>
> -
> [To unsubscribe, send mail to [EMAIL PROTECTED] with
> "unsubscribe firewalls" in the body of the message.]
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]