I’m blocking kazaa effectively using
just an outgoing rule blocking tcp and udp port1214. are you sure they’re using kazaa?
-----Original Message-----
From: Serge Vondandamo
[mailto:[email protected]]
Sent: Thursday, March 14, 2002
10:10 AM
To: [email protected]
Subject: [FW-1] Does anyone know
how to block Kazaa, Morpheus and all these paras ites on a FW-1 ?
Hi,
I have made a rule rejecting all incoming &
Outgoing connections on UDP 1214 and TCP 1214, and I thought that would block
KazAa and some of these parasite but it did not !!!
Users can still use Kazaa and share files. Does anyone
know how to effectively block this ?
Thanks for your help.
Cheers,
Serge
-----Original Message-----
From: Don [mailto:[email protected]]
Sent: jeudi 14 mars 2002 14:54
To:
[email protected]
Subject: Re: [FW-1] Source IP
change after creating uri
> I'm using FW 4.1 SP5, anyone any idea how to get
the FW to broadcast
> the actual source IP instead
of it's int IP after applying a URI
> resource to a rule ? ie would
be nice to know what host was attacking
> your dmz with a codered worm
etc...
There is no way to do this. When a
connection passes through the security server it is proxied and the source
becomes the firewall. You would need to look at the firewall logs to find the
source address.
-don
=================================================
To set vacation, Out Of Office, or
away messages,
send an email to
[email protected]
in the BODY of the email add:
set fw-1-mailinglist nomail
=================================================
To unsubscribe from this mailing
list,
please see the instructions at http://www.checkpoint.com/services/mailing.html
=================================================
If you have any questions on how to
change your
subscription options, email
[email protected]
=================================================