[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
RE: [FW1] spoofing
Title: spoofing
Don,
Anti-spoofing is configured to prevent protected "public" ip address
ranges behind your firewall from being sourced as inbound sessions through your
firewall. If you're nat'ing the private ranges to your external IP address
& the fact that your ISP should "by default" be dropping RFC1918 addresses
(192.168.x.x in your case) you have no ip address to
anti-spoof...
Michael Romano
KnowledgePlanet
Competitive Advantage Through People
Application
Services
5095 Ritter Road
Mechanicsburg, PA 17055
p:Ext 4310
e: mromano@knowledgeplanet.com
Visit Us: http://www.knowledgeplanet.com
I was wondering if someone could give me your input
on anti-spoofing. I have 3 interfaces on my FW:
DMZ 192.168.2.1
External
63.64.1.1
Internal 192.168.1.1
I have a DNS server and web server sitting on the
DMZ. Which needs to be open to the public.
I have my email server and one web server on the Internal. They
need to be accessible to the public as well. All addresses that are for
the public are nated. Could someone tell me how you would set up the
anti-spoofing on the FW that won't affect my setup but protect me? I noticed
in my logs that someone was trying to get in using private addresses. Thanks
for your help in advance. (I did look it up but I think its better to
hear how others do it!) Kind of confusing....
Donnie Leeper