is included no matter what your implied policy
rules are.
Laters,
Paul
-Original Message-
From: Jochen Bauer [mailto:[EMAIL PROTECTED]]
Sent: Wednesday, July 11, 2001 7:45 PM
To: [EMAIL PROTECTED]
Subject: Re: Check Point response to RDP Bypass
On Wed, Jul 11, 2001 at 11:41:23AM +020
On Wed, 11 Jul 2001, Johan Lindqvist wrote:
> The original advisory
> (http://www.inside-security.de/advisories/fw1_rdp.html) says that a
> workaround is to "Deactivate implied rules in the Check Point policy editor
> (and build your own rules for management connections).". I've not been able
> t
On Wed, Jul 11, 2001 at 11:41:23AM +0200, Johan Lindqvist wrote:
> The original advisory
> (http://www.inside-security.de/advisories/fw1_rdp.html) says that a
> workaround is to "Deactivate implied rules in the Check Point policy editor
> (and build your own rules for management connections).".
The original advisory
(http://www.inside-security.de/advisories/fw1_rdp.html) says that a
workaround is to "Deactivate implied rules in the Check Point policy editor
(and build your own rules for management connections).". I've not been able
to find any changes in the INSPECT code generated to
- Forwarded message from Scott Walker Register <[EMAIL PROTECTED]>
-
From: Scott Walker Register <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Subject: Check Point response to RDP Bypass
Date: Mon, 9 Jul 2001 10:33:42 -0500
Message-ID:
X-Mailer: Z-