> I don't think you have to put all the access-list in.  I believe 
> that the hack requires a certain combination of packets to the 
> four ports, so leaving one or two of them open should still prevent 
> the hack.  

This was an initial assumption made by many that is apparently not
accurate (per an individual who wrote an exploit for this bug).

-Terry


---------------------------------------------------------------------------
----------------------------------------------------------------------------

Reply via email to