NETWORK PRESENCE ABOUT SERVICES PRODUCTS TRAINING CONTACT US SEARCH SUPPORT
 


Search
display results
words begin  exact words  any words part 

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: [FW1] spoofing



Title: spoofing
Don,
 
Anti-spoofing is configured to prevent protected "public" ip address ranges behind your firewall from being sourced as inbound sessions through your firewall.  If you're nat'ing the private ranges to your external IP address & the fact that your ISP should "by default" be dropping RFC1918 addresses (192.168.x.x in your case) you have no ip address to anti-spoof...
 

Michael Romano
KnowledgePlanet
Competitive Advantage Through People
Application Services
5095 Ritter Road
Mechanicsburg, PA 17055
p:Ext 4310
e: mromano@knowledgeplanet.com
Visit Us: http://www.knowledgeplanet.com

-----Original Message-----
From: Don Leeper [mailto:[email protected]]
Sent: Wednesday, July 25, 2001 1:59 PM
To: '[email protected]'
Subject: [FW1] spoofing

I was wondering if someone could give me your input on anti-spoofing.  I have 3 interfaces on my FW:
DMZ 192.168.2.1
External 63.64.1.1
Internal 192.168.1.1
I have a DNS server and web server sitting on the DMZ.  Which needs to be open to the public.
I have my email server and one web server on the Internal.  They need to be accessible to the public as well.  All addresses that are for the public are nated.  Could someone tell me how you would set up the anti-spoofing on the FW that won't affect my setup but protect me? I noticed in my logs that someone was trying to get in using private addresses. Thanks for your help in advance.  (I did look it up but I think its better to hear how others do it!) Kind of confusing....


Donnie Leeper



 
----------------------------------

ABOUT SERVICES PRODUCTS TRAINING CONTACT US SEARCH SUPPORT SITE MAP LEGAL
   All contents © 2004 Network Presence, LLC. All rights reserved.