Hi,
I have made a rule rejecting all incoming & Outgoing
connections on UDP 1214 and TCP 1214, and I thought that would block KazAa
and some of these parasite but it did not !!!
Users can still use Kazaa and share files. Does anyone know
how to effectively block this ?
Thanks for your
help.
Cheers,
Serge
-----Original Message-----
From: Don
[mailto:[email protected]]
Sent: jeudi 14 mars 2002 14:54
To: [email protected]
Subject: Re: [FW-1] Source IP change after creating uri
> I'm using FW 4.1 SP5, anyone any idea how to get the FW
to broadcast
> the actual source IP instead of
it's int IP after applying a URI
> resource to a
rule ? ie would be nice to know what host was attacking
> your dmz with a codered worm etc...
There is no way to do this. When a connection passes through the
security server it is proxied and the source becomes the firewall. You would
need to look at the firewall logs to find the source address.
-don
=================================================
To set vacation, Out Of Office, or away messages,
send an email to [email protected]
in the BODY of the email add:
set
fw-1-mailinglist nomail
=================================================
To
unsubscribe from this mailing list,
please see the
instructions at http://www.checkpoint.com/services/mailing.html
=================================================
If you have any questions on how to change your
subscription options, email
[email protected]
=================================================