Hi,
I have made a rule rejecting all incoming & Outgoing
connections on UDP 1214 and TCP 1214, and I thought that would block KazAa
and some of these parasite but it did not !!!
Users can still use Kazaa and share files. Does anyone
know how to effectively block this ?
Thanks for
your help.
Cheers,
Serge
-----Original Message-----
From:
Don [mailto:[email protected]]
Sent: jeudi 14 mars 2002 14:54
To: [email protected]
Subject: Re: [FW-1] Source IP change after creating uri
> I'm using FW 4.1 SP5, anyone any idea how to get the
FW to broadcast
> the actual source IP instead
of it's int IP after applying a URI
> resource
to a rule ? ie would be nice to know what host was attacking
> your dmz with a codered worm etc...
There is no way to do this. When a connection passes
through the security server it is proxied and the source becomes the
firewall. You would need to look at the firewall logs to find the source
address.
-don
=================================================
To set vacation, Out Of Office, or away messages,
send an email to [email protected]
in the BODY of the email add:
set
fw-1-mailinglist nomail
=================================================
To unsubscribe from this mailing list,
please see the instructions at http://www.checkpoint.com/services/mailing.html
=================================================
If you have any questions on how to change your
subscription options, email
[email protected]
=================================================