> The security team at my company is coming under increasing pressure to
> About tunnelling it via HTTP: most protocols do not tunnel via real HTTP
> but only with TCP/80. If you enforce the usage of a proxy or
> proxy-firewall (Raptor, Gauntlet etc.) or activate the FW-1 security
> servers (create an "empty" HTTP ressource and use that) most "tunnelled"
> protocols won't be able to pass through the gateway.
How do you set up this 'empty' resource?
--------------------------------------------------------------------------------------------
C. Paul Simons
Corporate Network Security Services
IHS Energy Group, Englewood, CO.
Main: +1 303 736 3000
Direct: +1 303 736 3451
Fax: +1 303 736 3860
Mobile: +1 303 748 5242
================================================================================
To unsubscribe from this mailing list, please see the instructions at
http://www.checkpoint.com/services/mailing.html
================================================================================