How would you know if there were port abuse? What types of port
activity would you look for?

Roger

Paul D. Robertson wrote:
> On Fri, 8 Jul 2005, Josh Welch wrote:
>
>
>>I have setup an access point outside of our firewall for this express
>>purpose. It is wide open and I simply monitor port usage to keep an eye
>>out for any abuse, it hasn't been an issue so far.

>
>
> Isn't this kind of SBCYF[1]?
>
> Paul
> [1] Security by crossing your fingers.
> -----------------------------------------------------------------------------
> Paul D. Robertson "My statements in this message are personal opinions
> paul@compuwar.net which may have no basis whatsoever in fact."
>
> _______________________________________________
> firewall-wizards mailing list
> firewall-wizards@honor.icsalabs.com
> http://honor.icsalabs.com/mailman/li...rewall-wizards
>

_______________________________________________
firewall-wizards mailing list
firewall-wizards@honor.icsalabs.com
http://honor.icsalabs.com/mailman/li...rewall-wizards