|
I am very well aware of that. My point, as
you've restated in your rebuttal, is that the less a hacker has at his
fingertips with which to develop an overview of your network, the harder it will
be for him to mount a successful attack. While ping is just a scratch at
the surface of possible attack methods it's removal is another notch on the belt
of the administrator trying to protect his network.
If my answer was not clear the
first time I apologize. Next time I'll try to be a little bit more
detailed into the explanation of such things. I was just under the
impression that we we're, to some extent, professionals capable
of comprehending the meaning behind short
explanations.
I also have to say that I've done some extensive testing on
Checkpoints firewall with the majority of the Security
scanners out there, nmap in particular, and if you've been able to
do a successful scan on a Checkpoint firewall, properly configured of
course, without it being noted in the logs, I tip my hat to you.
Maybe it's time for me to go back to basic
training.
Juan Concepcion
Network Security Consultant CCSA/CCSE Certified E-Mail: [EMAIL PROTECTED]
|
- [FW1] Blocking ICMP Tony Wong
- RE: [FW1] Blocking ICMP Juan Concepcion
- RE: [FW1] Blocking ICMP David E. Hoobler Jr.
- RE: [FW1] Blocking ICMP Carl E. Mankinen
- RE: [FW1] Blocking ICMP Steven Schuster
- RE: [FW1] Blocking ICMP Juppunov, George
- RE: [FW1] Blocking ICMP Steve Moran
- RE: [FW1] Blocking ICMP Jason Maley
- RE: [FW1] Blocking ICMP Juan Concepcion
- RE: [FW1] Blocking ICMP Franklyn Mendez
- RE: [FW1] Blocking ICMP Juan Concepcion
- RE: [FW1] Blocking ICMP Carl E. Mankinen
- RE: [FW1] Blocking ICMP Juan Concepcion
- RE: [FW1] Blocking ICMP Tom Louis
