[55335] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: management interface accessability (was Re: Worm / UDP1434)

daemon@ATHENA.MIT.EDU (Christopher L. Morrow)
Mon Jan 27 15:10:11 2003

Date: Mon, 27 Jan 2003 20:07:25 +0000 (GMT)
From: "Christopher L. Morrow" <chris@UU.NET>
To: <alex@yuriev.com>
Cc: NANOG <nanog@merit.edu>
In-Reply-To: <Pine.LNX.4.10.10301271453530.30768-100000@s1.yuriev.com>
Errors-To: owner-nanog-outgoing@merit.edu




On Mon, 27 Jan 2003 alex@yuriev.com wrote:

>
> > > their computers on 24x7.  They may be infected, and will fire up their
> > > VPN tunnels Monday morning.  This may introduce the worm into the chewy
> > > center of many corporate networks.  Hopefully folks have put the proper
> > > filters in place on their VPN access points.
> >
> > Wait, but isn't your corporate network 'secure' cause its got a super kewl
> > firewall infront of it??
>
> The problem is not firewall. The firewall is a tool to implement a security
> policy. If the security policy is wrong, a firewall wont help you. In fact,
> the best demonstration of a firewall is a Cat5 cable. Working cable is a
> firewall with Allow:Any security policy. Cut in two, the cable is a firewall
> implementing Allow:None security policy.

I forgot my smilies in the original post... it was a joke... I'll try not
to do that again.


home help back first fref pref prev next nref lref last post