I like to use nmap to externally scan firewalls with various options. In
addition I often try a few spot checks using an internal netcat listener and
then trying to connect to it from the outside world.

With all the fragmentation problems these days, one should probably try and
route the connections to the netcat listener through something like
fragrouter.

Cheers,

--
Ben Nagy
Network Consultant, Volante Solutions
PGP Key ID: 0x1A86E304  Mobile: +61 414 411 520  


> -----Original Message-----
> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]
> Sent: Tuesday, 24 October 2000 8:06 AM
> To: [EMAIL PROTECTED]
> Cc: [EMAIL PROTECTED]
> Subject: Firewall security rule validation via Intrusion Detection
> system
> 
> 
> Has anyone done this type of testing where the IDS agent/detector is 
> utilized to validate a router's ACL's or a firewall's security 
> rule/policy??  If not, how does one really validate a 
> firewall is setup 
> correctly. Do they just say well, it is passing email and 
> web, it must be 
> working or is there some sort of check list people use nowadays.. ??
> 
> 
> /m
> 
> -
> [To unsubscribe, send mail to [EMAIL PROTECTED] with
> "unsubscribe firewalls" in the body of the message.]
> 
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to