Puedes utilizar un 'software de auditor�a'. Dentro de esta gama de
herramientas busca lo que se llaman scanners de red. Hay varios, licenciados
y freeware. Entre los licenciados te recomiendo el Internet Scanner de ISS
(Internet Security Systems) o el NetSonar de Cisco. Entre los freeware, el
m�s popular es el Satan pero la verdad es que nunca lo he utilizado.
Las licencias se venden por n�mero de hosts que deseas scanear. Lo que hacen
esto programas es detectar puertos abiertos del sistema y otras
vulnerabilidades en funci�n de patrones de ataques.
Sobre lo de Stonebeat, nunca he entrado a una lista de este software.
Saludos

Fabiola Mayorca

-----------------------------------------------------
Fabiola Daniela Mayorca Arellano
CCSE  & CCSA CheckPoint Certified Security Engineer / Administrator
Sistemas de Informaci�n
Telef�nica Sistemas, sucursal Per�.  Los Sauces 374 Piso 10/11
Edificio La Torre Roja.  San Isidro - Lima 27
Email: [EMAIL PROTECTED]  Phone: (511) 211-9500 ext. 386
http://www.ts.com.pe/

----- Original Message -----
From: Sergio Munoz -- Ingeniero de Sistemas (x.219) <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Monday, November 06, 2000 9:02 AM




Hi all...
I need support with two questions please :

1. How do you probe your firewall. Is there a software
   which attack a firewall machine ??
2. Is there a Stonebeat/FW-1 HA mailinglist, I've problems
   with that.

Thanks for all.

-----
Sergio Mu�oz Godoy
Ingeniero de Sistemas
mailto:[EMAIL PROTECTED]
Cientec Computacion S.A.      Tel. (56-2) 426 2626
http://www.cientec.cl         Fax  (56-2) 233 9009
Santiago, CHILE





============================================================================
====
     To unsubscribe from this mailing list, please see the instructions at
               http://www.checkpoint.com/services/mailing.html
============================================================================
====



================================================================================
     To unsubscribe from this mailing list, please see the instructions at
               http://www.checkpoint.com/services/mailing.html
================================================================================

Reply via email to