Eric,
In all the documents I have read till now, in each CP training that I
attended ... I hear the same message, don't use Domain objects, maybe
you can avoid using that domain object by defining a network range, as
a domain most of the time uses a specific subnet ... just an idea ??
Met vriendelijke groeten - Bien à vous - Kind regards
Guy ROELANDTS
EMEA GS Internet Expertise Centre - CCSA & CCSE
Compaq Software Engineer - Belgium
E-mail : [email protected]
Tel: +32(02)729.77.44 (options 3 - 3 - 1)
Fax: +32(02)729.77.65
=====================================================================
This message may contain confidential and/or proprietary information,
and is intended only for the person/entity to whom it was originally
addressed. The content of this message may contain private views and
opinions which do not constitute a formal disclosure or commitment
unless specifically stated. Should you receive this message by mistake
please inform the sender immediately.
=====================================================================
-----Original Message-----
From: Eric I. Davis [mailto:[email protected]]
Sent: Friday, October 12, 2001 1:40 AM
To: [email protected]
Subject: [FW-1] Domain objects
I have defined a domain object so allow only computers from a
certain doamin to come through the firewall as such
.blah.da.ca.uu.net
The firewall seems to ignore the object. I have seen alot of docs say
that the domain objects dont work very well because the way reverse
DNS functions. Any comments or help would be appreciated.
--
Eric I. Davis
NARAC
Lawrence Livermore National Lab
TelFaxprivate email [email protected]
============================================================================
====
To unsubscribe from this mailing list, please see the instructions at
http://www.checkpoint.com/services/mailing.html
============================================================================
====
================================================================================
To unsubscribe from this mailing list, please see the instructions at
http://www.checkpoint.com/services/mailing.html
================================================================================