What's going on....
#31
Scooby Regular
Join Date: Feb 2002
Location: Lurkin Somewhere
Posts: 7,951
Likes: 0
Received 0 Likes
on
0 Posts
bugger!
Sorry trying to do to many things at once.
Im finishing my degree in leeds Either BSc Computer Science or Applied Computing not sure which yet.
Si
Sorry trying to do to many things at once.
Im finishing my degree in leeds Either BSc Computer Science or Applied Computing not sure which yet.
Si
#33
Scooby Regular
Join Date: Nov 2001
Location: Leeds - It was 562.4bhp@28psi on Optimax, How much closer to 600 with race fuel and a bigger turbo?
Posts: 15,239
Likes: 0
Received 1 Like
on
1 Post
lol... hardly call nick a moderator..
How do I deal with them?
So anyway... send him another mail... could do with an interesting meeting at your expense!
David
How do I deal with them?
So anyway... send him another mail... could do with an interesting meeting at your expense!
David
#35
Scooby Regular
Thread Starter
For Deano.....
Stateful inspection works between the data link layer (OSI layer 2) and the network layer (OSI layer 3). It looks at the same headers that a packet filter examines, but it can also peek into the packet's data where the application protocol appears. More importantly, stateful inspection technologies maintain state data -- that is, information about past packets. Stateful inspection only needs to compare the first packet in a connection to the rule set. If the packet is permitted, information (the state) is added to an internal database. If the rule set for a type of service requires the examination of application data, then part of each packet must still be examined. FireWall-1 dynamically opens up access to allow end-to-end connections with authorized traffic, but it keeps track of each connection and shuts down access when a connection completes.
Jeff
Stateful inspection works between the data link layer (OSI layer 2) and the network layer (OSI layer 3). It looks at the same headers that a packet filter examines, but it can also peek into the packet's data where the application protocol appears. More importantly, stateful inspection technologies maintain state data -- that is, information about past packets. Stateful inspection only needs to compare the first packet in a connection to the rule set. If the packet is permitted, information (the state) is added to an internal database. If the rule set for a type of service requires the examination of application data, then part of each packet must still be examined. FireWall-1 dynamically opens up access to allow end-to-end connections with authorized traffic, but it keeps track of each connection and shuts down access when a connection completes.
Jeff
#36
Scooby Regular
Join Date: Feb 2002
Location: Lurkin Somewhere
Posts: 7,951
Likes: 0
Received 0 Likes
on
0 Posts
Im banned from the net at college! Why i never go. Banned from the diploma days when i was bad and sorta hacked the server with this some Novell software i found on the net. Was good i had administrator privilages for a while.
Ive read the specs for the course's i think applied is more using the apps.
Also the option of finishing at newcastle aswell.
Ive read the specs for the course's i think applied is more using the apps.
Also the option of finishing at newcastle aswell.
#37
My apologies, this wasn't actually muppety apart from the occasional Si interjection and I have rather muppeted it.
Stateful inspection strikes me as a Very Good Thing, IMHO. Without it, your firewall is just a router that happens to have better logging facilities.
More serious service is now resumed. Sorry.
Nick.
Stateful inspection strikes me as a Very Good Thing, IMHO. Without it, your firewall is just a router that happens to have better logging facilities.
More serious service is now resumed. Sorry.
Nick.
#38
Perhaps we need a new security question:
How do we prevent internal attacks from script kiddies who download the latest trojan'd crap and hack our internal network, whilst exposing us to God only knows what?
Actually, this could be a good 'un.
How do we prevent internal attacks from script kiddies who download the latest trojan'd crap and hack our internal network, whilst exposing us to God only knows what?
Actually, this could be a good 'un.
#39
Scooby Regular
Join Date: Nov 2001
Location: Leeds - It was 562.4bhp@28psi on Optimax, How much closer to 600 with race fuel and a bigger turbo?
Posts: 15,239
Likes: 0
Received 1 Like
on
1 Post
you speak to Jeff and he sells you some nice products...
Cant remember the name... but pissed on my bonfire for a lot of things...
Jack
According to my diary 8th Oct 11am at our office in leeds
(ill try not to have a hangover or fall asleep... but that sales guy fooking loved himself last time.. )
David
Cant remember the name... but pissed on my bonfire for a lot of things...
Jack
According to my diary 8th Oct 11am at our office in leeds
(ill try not to have a hangover or fall asleep... but that sales guy fooking loved himself last time.. )
David
#41
Scooby Regular
Thread Starter
Nick
I was only joking......but your right about any thread with Super_Si involved does appear to bring out the worst in people.
In answer to your question you need a product from Security Designers called Active Net Steward (http://www.securitydesigners.com which will do what you want (and signifcantly more!)
Jeff
I was only joking......but your right about any thread with Super_Si involved does appear to bring out the worst in people.
In answer to your question you need a product from Security Designers called Active Net Steward (http://www.securitydesigners.com which will do what you want (and signifcantly more!)
Jeff
#43
Jeff
I've always approached from another direction e.g. A Bridge or switch is layer 2 device (looks @ Mac address) , a router layer 3 (looks @ IP address) then a basic packet filter filtering purely on IP it at least Layer 3. A packet filter which filters on IP address and TCP/UDP port is getting towards layer 4 and stateful inpsection where the TCP session itself is inspected to ensure packets are from a known conversation or session - is at least layer 4.
Where the firewall then goes beyond that to understand the application protocol (e.g. Cisco f/W IOS "understands" smtp) then its pushing into Layer 5.
My £0.02 anyway
Deano
I've always approached from another direction e.g. A Bridge or switch is layer 2 device (looks @ Mac address) , a router layer 3 (looks @ IP address) then a basic packet filter filtering purely on IP it at least Layer 3. A packet filter which filters on IP address and TCP/UDP port is getting towards layer 4 and stateful inpsection where the TCP session itself is inspected to ensure packets are from a known conversation or session - is at least layer 4.
Where the firewall then goes beyond that to understand the application protocol (e.g. Cisco f/W IOS "understands" smtp) then its pushing into Layer 5.
My £0.02 anyway
Deano
#44
Scooby Regular
Join Date: Nov 2001
Location: Leeds - It was 562.4bhp@28psi on Optimax, How much closer to 600 with race fuel and a bigger turbo?
Posts: 15,239
Likes: 0
Received 1 Like
on
1 Post
lol at all...
because I was probably a c*unt last time and asked him why they insisted on using LDAP and DB2 or whatever it was for EPO 1.1...
And I need someone to defend why your product crashes reguarly on our servers.. (according to someone on our team.. who looks like punch from punch and judy..
And I want to know what you have so SAVI isnt an issue... need a DLL Based Scanner.. Signed up for beta but nowt yet?
David
because I was probably a c*unt last time and asked him why they insisted on using LDAP and DB2 or whatever it was for EPO 1.1...
And I need someone to defend why your product crashes reguarly on our servers.. (according to someone on our team.. who looks like punch from punch and judy..
And I want to know what you have so SAVI isnt an issue... need a DLL Based Scanner.. Signed up for beta but nowt yet?
David
Thread
Thread Starter
Forum
Replies
Last Post
Spec'c'57
Essex Subaru Owners Club
15
07 August 2005 06:36 PM