Firewall Wizards mailing list archives

Re: Discretionary WiFi Access


From: Roger Rustad <roger.rustad () gmail com>
Date: Thu, 21 Jul 2005 11:38:55 -0700

How would you know if there were port abuse? What types of port activity would you look for?

Roger

Paul D. Robertson wrote:
On Fri, 8 Jul 2005, Josh Welch wrote:


I have setup an access point outside of our firewall for this express
purpose. It is wide open and I simply monitor port usage to keep an eye
out for any abuse, it hasn't been an issue so far.


Isn't this kind of SBCYF[1]?
Paul
[1] Security by crossing your fingers.
-----------------------------------------------------------------------------
Paul D. Robertson      "My statements in this message are personal opinions
paul () compuwar net       which may have no basis whatsoever in fact."

_______________________________________________
firewall-wizards mailing list
firewall-wizards () honor icsalabs com
http://honor.icsalabs.com/mailman/listinfo/firewall-wizards

_______________________________________________
firewall-wizards mailing list
firewall-wizards () honor icsalabs com
http://honor.icsalabs.com/mailman/listinfo/firewall-wizards


Current thread: