|On Thu, 18 Apr 2002 12:38:56 +0200 (CEST) |[EMAIL PROTECTED] wrote | about presentation:
> have you suggestions about such demonstratrations that i can do? Just browsing the maillist archives will provide plenty of examples. But since you asked: - log invalid access to specif ports or from specific hosts/nets (possibly with Harald's ULOG patch) - general firewalling issues (blocking access to services) - access control (user authentication implicates in adding rules and enabling traffic from inside/out or vice-versa) Guess that is enough homework ;o) best regards, Senra -- Rodrigo Senra MSc Computer Engineer (GPr Sistemas Ltda) [EMAIL PROTECTED] http://www.ic.unicamp.br/~921234 (LinUxer 217.243) (ICQ 114477550)
