You may be able to avoid throwing a VPN concentrator into the mix just yet.
Need more information before this can be answered, but it could be that the
source address of your home system is being NATed, which can interface with
IPsec. It could be that your Pix is blocking.
Before you tear into y
Try www.micromuse.com or logboss at
http://www.securityprofiling.com/logboss.htm.
HTH,
Charles
wrote in message
news:[EMAIL PROTECTED]
> Does anyone know of a product that will merge log files from multiple
> sources Snort, PIX, Checkpoint, etc...?
>
> I'm trying to centralize much of ou
There are also some very nice prebuilt Snort sensors with a GUI from the
following vendors.
www.sourcefire.com
www.silicondefense.com
www.packetalarm.com
I have had the opportunity to evaluate and configure products from all
three, and they have done an excellent job of bringing Snort to the mas
John,
Sounds like you had what I call a "Floating Talking Head" experience. It's
happened to me before.
Basically, you are in the middle of teaching, presenting, or briefing, and
you experience a trippy sensation of almost being outside yourself. As you
talk, your self awareness gets distorted,
Chris,
Got this off of www.firewall-1.org, not exactly what you are looking for
but at least you can play with the GUI until CP comes through
You need an eval licence to have a fully functional product for 30 days. But
if what you want is to see the GUI interface (not functionall at all), yo
o Nuts"" wrote in message
[EMAIL PROTECTED]">news:[EMAIL PROTECTED]...
> Hello Charles,
>
> With due respect I ask, why did you abandon your quest for the CCIE? I am
> curious as to how many times you actually hit the Lab?
>
> Sincerely,
>
> CN
>
> >
Chuck,
Your post reminds me of those weird little ice cream stands that I sometimes
see at the mall and various carnivals. It's called something like "Dipping
Dots - The Ice Cream of the Future". The initial human instinct is much
like the Cro-Magnon humanoids encountering the monolith at the b
I believe that if you check the Cisco website or documentation, you will see
that it defines a session as a single TCP or UDP connection. If somehow you
had 2M users, yet their total number of sessions never exceeded 500K, then
your firewall could handle 2M users. I am not addressing performance
letting
users
> download .exe files via e-mail attachments might make a lot of sense as an
> e-mail server configuration.
>
> Anyway, start looking at Layer 7 and above (politics, policies). Question
> your Internet provider!
>
> Priscilla
>
> Charles Riley wrote:
> >
&g
ap first,
reboot
> and then install analyzer.
>
> http://winpcap.polito.it/install/default.htm
> http://analyzer.polito.it/install/default.htm
>
> Then you can see if the packets are coming back to you and if windows is
> dropping them for some reason.
>
> ""Charles R
John,
It's a little dated, but alot of folks like 802.11 Wireless Networks: The
Definitive Guide (O'Reilly Networking) (Matthew S. Gast). I have that book
and it provides some very good detail on A and B, but little on G which just
emerging as the book went to press.
The below is an excellent s
I ran across a strange problem with one of our POPs the other day, and am in
the process of researching/troubleshooting it. We have a configuration
something like this:
"Internet"---2500---AS5300---D/U Users
Not shown is a LAN connected to the 2nd Ethernet on the 2500. All
c
It may that no alerts at the "warnings" level have occured. Trying setting
it at a high level such as 6 or 7 (which pretty much logs everthing). Once
you have ascertained that logging between the PIX and syslog server are
working, then restore it back to the warnings level.
HTH,
Charles
""Eli
Robert,
What new features does it have,and what problems will it solve?
TIA,
Charles
""Robert Raver"" wrote in message
[EMAIL PROTECTED]">news:[EMAIL PROTECTED]...
> Hey,
>
> For all those interested the 4.0 VPN Client(BETA) will be in March/April.
> This VAN Client is totally rebuilt and has
I like the various SNORT products...non-proprietary (or as close as this
field gets).
SNORT looks good (www.snort.org)
And if you don't have time to build your own, try:
www.sourcfire.com
www.silicondefense.com
Heck, even Packet Alarm may be an option though you will not find any
contact inform
;Howard C. Berkowitz"" wrote in message
[EMAIL PROTECTED]">news:[EMAIL PROTECTED]...
> At 5:23 PM + 1/20/03, Charles Riley wrote:
> >Sorry for the OT post, but have searched high and low, and no definite
> >answer in site. Really, really apoliogize for the nont
Thanks to Priscilla, I think the below may be what I was looking for...more
reading before I make a final determination.
http://aspe.hhs.gov/admnsimp/nprm/seclist.htm
Thanks!
""Priscilla Oppenheimer"" wrote in message
[EMAIL PROTECTED]">news:[EMAIL PROTECT
HIPAA compliant" are doing the equivalent of
individuals putting "CCIE Written" on their resumes?
Charles
""Priscilla Oppenheimer"" wrote in message
[EMAIL PROTECTED]">news:[EMAIL PROTECTED]...
> Charles Riley wrote:
> >
> > Sorry for the
Sorry for the OT post, but have searched high and low, and no definite
answer in site. Really, really apoliogize for the nontechnical nature of
this post, but I have reached a wall after searching all over for an answer.
I guess you could say that I am "ill" with searching...
HIPAA is an medical i
Please, kill this thread. It is contributing highly to bandwidth waste. If
you love Cisco and networking, get your CCIE. If you love academia over
everything else, get your Ph.D. If you love both equally, get them both.
Bottom line is that both are hard to attain, and unless you got the love f
Hi, all
Apologies in advance for this slightly OT, but can anyone point me in the
direction of a scanner that can scan and enumerate IPX-only and
AppleTalk-only networks? That is, scan and identify devices on a network
running IPX only or AppeTalk only...no IP.
I would prefer something that di
Howard C. Berkowitz wrote:
>
> Password structure is too detailed for the security policy,
> although
> it's necessary in the security design. The policy should state
> something on the order that people must protect their
> passwords,
> whether they can or cannot change their own, etc.
>
OK,
While security policies need to be unique per organization, there are some
common elements that can be recycled.
Just to give an example, how about the handling of passwords? Really, do
you need to re-create the piece of the policy that says passwords need to be
protected, must be of a certain l
23 matches
Mail list logo