> The security team at my company is coming under increasing pressure to
> About tunnelling it via HTTP:  most protocols do not tunnel via real HTTP

> but only with TCP/80.  If you enforce the usage of a proxy or
> proxy-firewall (Raptor, Gauntlet etc.)  or activate the FW-1 security
> servers (create an "empty"  HTTP ressource and use that) most "tunnelled"

> protocols won't be able to pass through the gateway.

How do you set up this 'empty' resource?

--------------------------------------------------------------------------------------------

C. Paul Simons
Corporate Network Security Services
IHS Energy Group, Englewood, CO.

Main: +1 303 736 3000
Direct: +1 303 736 3451
Fax: +1 303 736 3860
Mobile: +1 303 748 5242














================================================================================
     To unsubscribe from this mailing list, please see the instructions at
               http://www.checkpoint.com/services/mailing.html
================================================================================

Reply via email to