>Is there any way in FW-1 Ver 4.0 to block users from telneting or ftp'ing
>out on port 80? Port 80 is enabled for http access, and the users need
telnet / ftp
>access to our DMZ. However they are also telneting out to boxes their own
>outside servers that are listening on port 80. So far FW-1 can't
distinguish
>between an ftp/telnet session and an http session.

Easy, Only allow external (non dmz) port 80 access out from an internal
proxy server & force all users to use the proxy for internet browsing.
Better still put a proxy into the DMZ also & chain the internal proxy off
it.

Put explicit rules in the policy such as the following (rough example).

        internal-proxy  ext-proxy               http    accept
        ext-proxy               !internal-nets  any     accept
        internal-nets   dmz-subnet              http    accept 


Greg


--
Greg Hennessy
E-Security Mechanic             Merrill Lynch - HSBC LTD
+44 020 7570 3046

 


--
**********************************************************************
This email and any files transmitted with it are confidential and
intended solely for the use of the individual or entity to whom they
are addressed. If you have received this email in error please notify
the [EMAIL PROTECTED]

This footnote also confirms that this email message has been swept by
MIMEsweeper for the presence of computer viruses.

**********************************************************************


================================================================================
     To unsubscribe from this mailing list, please see the instructions at
               http://www.checkpoint.com/services/mailing.html
================================================================================

Reply via email to