|
1)
regardless of ANY configuration you have....if you only have a single T1 for
your internet connection and someone sends 50megabits/sec of
data
to ANY address on your subnet, your entire internet connection will be DoS'd...a
firewall will NOT help you.
2) If
someone gleans some information about your internal network and should decide to
target a particular host in your network they can
spoof
the RFC1918 address of the internal victim and use that as the source address in
a packet sent to host that you have made public.
This
is one reason why you need to have anti-spoofing configured properly and why you
need to not allow bastions to talk to your internal
network...and also a reason why you should use a SMTP
security server and slap new headers on all your email traffic since the
internal
relays
have likely put their RFC1918 addresses in the headers.
Stuff
like:
Received: from guru
(dialup-63.214.70.156.Dial1.Boston1.Level3.net
[63.214.70.156])
Only
you are using a dialup connection and if you were sending from office exchange
server you would likely see it's address in the
headers had you not cleaned them
up...
|
- RE: [FW1] Blocking ICMP Juan Concepcion
- RE: [FW1] Blocking ICMP David E. Hoobler Jr.
- RE: [FW1] Blocking ICMP Carl E. Mankinen
- RE: [FW1] Blocking ICMP Steven Schuster
- RE: [FW1] Blocking ICMP Juppunov, George
- RE: [FW1] Blocking ICMP Steve Moran
- RE: [FW1] Blocking ICMP Jason Maley
- RE: [FW1] Blocking ICMP Juan Concepcion
- RE: [FW1] Blocking ICMP Franklyn Mendez
- RE: [FW1] Blocking ICMP Juan Concepcion
- RE: [FW1] Blocking ICMP Carl E. Mankinen
- RE: [FW1] Blocking ICMP Juan Concepcion
- RE: [FW1] Blocking ICMP Tom Louis
