Bugtraq mailing list archives
Re: Firewall-1 Information leak
From: Christian Herb <che () icon de>
Date: Wed, 18 Jul 2001 17:03:51 +0200
Hi, Thats not exactly right. You could restrict the topology download, so that only authenticated Users can download the topo. Just go undere Policy Properties Desktop Security of your Policy Editor and uncheck "respond to unauthenticated topology requests". After installing the Policy only authenticated Users could download the Topology. The only reason why you have to check this is when your clients whants to use FWZ encryption. Christian -- ICON Systems GmbH - 85399 Hallbergmoos, Am Söldnermoos 37, Germany Zentrale: 0811-55515-0 Fax: 0811-55515-15 Hotline: 0811-55515-90 Check Point NG Preisliste: http://icon-sys.com/preise/checkpoint/NG/index.htm KNOW-HOWpur Seminare 2. Halbjahr: http://www.icon-sys.com/dienstleistungen/seminare-uebersicht.htm The content of this E-Mail is confidential. It is intended solely for the addressee.For any unauthorized recipient, please delete this E-Mail to avoid unlawful usage.
Current thread:
- Firewall-1 Information leak Haroon Meer (Jul 17)
- RE: Firewall-1 Information leak Lars Troen (Jul 18)
- Re: Firewall-1 Information leak Bugtraq Account (Jul 19)
- <Possible follow-ups>
- Re: Firewall-1 Information leak Christian Herb (Jul 18)
- RE: Firewall-1 Information leak David Sexton (Jul 20)
- RE: Firewall-1 Information leak MALIN, ALEX (PB) (Jul 23)
- RE: Firewall-1 Information leak Hugo van der Kooij (Jul 23)
- RE: Firewall-1 Information leak Mariusz Woloszyn (Jul 24)
- RE: Firewall-1 Information leak Stephen JT Bourike (Jul 24)
- Re: Firewall-1 Information leak Grzegorz Mucha (Jul 25)
- RE: Firewall-1 Information leak Hugo van der Kooij (Jul 23)