Bugtraq mailing list archives

Re: Firewall-1 Information leak


From: Christian Herb <che () icon de>
Date: Wed, 18 Jul 2001 17:03:51 +0200

Hi,

Thats not exactly right. You could restrict the topology download, so
that
only authenticated Users can download the topo. Just go undere Policy
Properties Desktop Security of your Policy Editor and uncheck  "respond
to
unauthenticated topology requests". After installing the Policy only
authenticated Users could download the Topology.

The only reason why you have to check this is when your clients whants
to use
FWZ encryption.

Christian

--
ICON Systems GmbH - 85399 Hallbergmoos, Am Söldnermoos 37, Germany
Zentrale: 0811-55515-0 Fax: 0811-55515-15 Hotline: 0811-55515-90

Check Point NG Preisliste:
http://icon-sys.com/preise/checkpoint/NG/index.htm
KNOW-HOWpur Seminare 2. Halbjahr:
http://www.icon-sys.com/dienstleistungen/seminare-uebersicht.htm


The content of this E-Mail is confidential. It is intended solely for
the addressee.For any unauthorized recipient, please delete this E-Mail
to avoid unlawful usage.


Current thread: