[21610] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Firewall-1 Information leak

daemon@ATHENA.MIT.EDU (Christian Herb)
Wed Jul 18 12:22:28 2001

Message-ID: <3B55A557.CD912C42@icon.de>
Date: Wed, 18 Jul 2001 17:03:51 +0200
From: Christian Herb <che@icon.de>
MIME-Version: 1.0
To: bugtraq <bugtraq@securityfocus.com>
Content-Type: multipart/mixed;
 boundary="------------3AC31871D4618E86D82AE2DF"

--------------3AC31871D4618E86D82AE2DF
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: 8bit

Hi,

Thats not exactly right. You could restrict the topology download, so
that
only authenticated Users can download the topo. Just go undere Policy
Properties Desktop Security of your Policy Editor and uncheck  "respond
to
unauthenticated topology requests". After installing the Policy only
authenticated Users could download the Topology.

The only reason why you have to check this is when your clients whants
to use
FWZ encryption.

Christian

--
ICON Systems GmbH - 85399 Hallbergmoos, Am Söldnermoos 37, Germany
Zentrale: 0811-55515-0 Fax: 0811-55515-15 Hotline: 0811-55515-90

Check Point NG Preisliste:
http://icon-sys.com/preise/checkpoint/NG/index.htm
KNOW-HOWpur Seminare 2. Halbjahr:
http://www.icon-sys.com/dienstleistungen/seminare-uebersicht.htm


The content of this E-Mail is confidential. It is intended solely for
the addressee.For any unauthorized recipient, please delete this E-Mail
to avoid unlawful usage.


--------------3AC31871D4618E86D82AE2DF--


home help back first fref pref prev next nref lref last post