Remove the modem, insert a modem pool device that provides uses one of the
standard Authentication and Authorization Protocols (RADIUS,TACACS,
TACACS+), then you will have some logging and some granular control of
what the user can do using a modem.
The second action to take is go to you telecomm guy and restrict the
lines, so that they can only dial out and a would be intruder will not be
able to dial them back or dial into that modem, just in case some user
flips the modem into auto answer mode.
The reason the below logic does not work is that if a user is used to
doing things one way for a very long time, all changes to any organization
security architecture should be transparent to the user. In some cases,
this cannot be done, but in most cases, a user doesn't even know they are
communicating to the Internet via a firewall, or that his/her's email is
being scrubbed by some sort of virus/content scanner.
The more noticeable the security architecture the greater the possibility
a user may attempt to avoid any of the security mechanisms that they know
about.
/mark
Tom Rowan <[EMAIL PROTECTED]>
Sent by: [EMAIL PROTECTED]
06/08/00 07:22 AM
To: "'[EMAIL PROTECTED]'" <[EMAIL PROTECTED]>, fw mailing list
<[EMAIL PROTECTED]>
cc:
Subject: RE: [FW1] modem internet access on the internal LAN
Hi,
With the greatest of respect, the wrong thing that you're doing is
bypassing
your firewall!!! Why spend all that money on huge, expensive titanium
padlocks if you're going to leave them undone?!
1) Remove the modems.
2) Buy a standalone PC. Put a modem in it but NO network card.
3) Stick a skull and cross bones on it and never trust it again.
Well okay, perhaps number 3 is a bit extreme, but you get my point? ;-)
Tom
-----Original Message-----
From: Karim Amrani [mailto:[EMAIL PROTECTED]]
Sent: Thursday, June 08, 2000 2:25 PM
To: fw mailing list
Subject: [FW1] modem internet access on the internal LAN
Hi everybody,
Some users of the internal LAN of our firewall still use modems to
connect to internet (used to check the visibility of our web sites from
outside the firewall, mainly).
On their PC, they have an Ethernet card and a ISDN card.
As I saw some of IP addresses they got from the modem ISP in the IP
database of the FW, it means that their PC is leaking its ISDN's IP on
the ethernet LAN...
Am I wrong somewhere ?
May this be corrected by some configuration on the PC ?
TIA,
Karim AMRANI
Allasso
Theale House
Brunel Road
Theale, Reading
RG7 4AQ
+44 (0) 118 9711511
[EMAIL PROTECTED]
http://www.allasso.com
DISCLAIMER
Any opinions expressed in this email are those of the individual and not
necessarily the Company. This email and any files transmitted with it,
including replies and forwarded copies (which may contain alterations)
subsequently transmitted from the Company, are confidential and solely for
the use of the intended recipient. It may contain material protected by
attorney-client privilege. If you are not the intended recipient or the
person responsible for delivering to the intended recipient, be advised
that you have received this email in error and that any use is strictly
prohibited.
If you have received this email in error please notify the IT manager by
telephone on +44 (0)118 9711511 or via email to
[EMAIL PROTECTED], including a copy of this message. Please
then delete this email and destroy any copies of it.
================================================================================
To unsubscribe from this mailing list, please see the instructions at
http://www.checkpoint.com/services/mailing.html
================================================================================
================================================================================
To unsubscribe from this mailing list, please see the instructions at
http://www.checkpoint.com/services/mailing.html
================================================================================