• Consolidated Security Product/Approach? What about layered approach?

    Hi Punnet, I'm a It Director at lasrge Media firm in NY. Looking at the security overhaul in the recent months and business looking to cxonsolidate the offices enviornment the talk of the town is to have ALL IN One device which does Firewall,IDS,VPN etc. I thought layerd security approach was the...

    Networksecure10 pointsBadges:
  • Demilitarized zone using iptables?

    Hi, I'm the Assistant Editor for SearchEnterpriseLinux.com. One of our users, "ruhi," posted the following question. Can you help? "I have to plan and design a demilitarized zone using iptables. How can I do this?" You can post your answer here on ITKE, or reply to...

    AmyKucharik870 pointsBadges:
  • Sendig Mail to user@IP

    We have two Mx Record (same ISP) pointing to the same mail server. The Mail Server is REDHAT Linux. I want to send a mail to user@ip address (first or second Mx Record). This is basically to test if first Mx record fails, will the second record be used. I would be sending this mail from the LAN to...

    Jagdish60 pointsBadges:
  • problem with exchange sync and pocket pc 2003

    i have a HP iPAQ hx4700 with Pocket PC 2003 on it that connect to the internet through my phone cellolar (with bluethooth connection), i want to sync all my contact and my calender on my ipaq to my exchange small buisness server 2003 through the internet,my server connect to the internet and are...

    Drorbenyosef5 pointsBadges:
  • Desktop firewalls: Windows XP vs 3rd party

    For those with more experience with Windows XP, what do you think of the native personal firewall software? We recently upgraded a remote user to Windows XP from Windows 2000 Pro (actually, he got a new laptop). He connects to the Internet over DSL and we installed a free ZoneLabs firewall when he...

    VirgilB0 pointsBadges:
  • PIX VPN DHCP Relay not relaying DHCP packets

    Hi, I've setup a VPN across 2 PIX506e's using primarily the PDM software. IT is a very basic setup using PDM. I also needed DHCP relay to relay from clients on pix B to pixA and then the dhcp server. So I add in the DHCP relay server address on pixB and point to the relevant IP over the outside...

    Rgoulding0 pointsBadges:
  • Is Windows security an afterthought?

    As the editor of SearchWindowsSecurity.com, I often speak with users about their Windows security responsibilities. One senior systems analyst in particular sent me an interesting note recently... To give you some background, he's in charge of configuring and administering desktop systems...

    RobynLorusso230 pointsBadges:
  • Segmenting the LAN for Security purposes

    The worm Mspn32 came in on one machine behind the firewall and spread over e-mail or network to other departments. Could I isolate a worm once it's inside by dividing up my LAN into departments or sections with either departmental firewalls or managed switches and VLANS? Anyone doing this,...

    Rbos770 pointsBadges:
  • Backup of Router & Pix IOS

    How can we protect our router & pix firewall & how can we recover the ios when ios is totaly corrupted. how can we take backup of ios through tftp server. Please guide step by step as i am new to router & pix firewall. can u provide me website link from where i get the exact information.

    Psharma11760 pointsBadges:
  • How did I get a virus on my computer?

    Do you hear that question or something similar too often? We're taking an informal survery on SearchSecurity.com to find out what the most common security-related user questions are. Results will be compiled into a question and answer tip that you will be able to post or handout to your users. What...

    jwise41020 pointsBadges:
  • Cisco PIX VPN Bridging – Am I missing something??

    Hi, I'm tryin to set up a VPN between two internal sites on the same subnet. I have 2 PIX 506E's linked together (physically) in my test lab (on outside interfaces). All the configuration examples I've seen of setting up a VPN is between 2 different logical networks. However, I want them to act as...

    Rgoulding0 pointsBadges:
  • PIX – Allow UDP replies in.

    Hi All, The president of my company has started to use skype (www.skype.com). There is a function in the program to do file transfers. When we try that the program show that it has to relay the transfer and when it does that it limits the bandwith to 0.5kB/second. I've pasted the documentation that...

    Dansken0 pointsBadges:
  • How to BVlock port on Pix 506 Firewall

    I am new to networking. I want to know how can i block the port in the network through firewall & proxy. Anybody can provide me some documenation on PIX Firewall & its basics.Pl. send some inportant site address to expand my knowledge. Bye Pramod

    Psharma11760 pointsBadges:
  • Use of TFTP

    Why is the use of TFTP discouraged on the network from a security perspective?

    AaronD0 pointsBadges:
  • Help required in configuring ISA server 2000 firewall

    Hi all, I have some queries related to Microsoft ISA server 2000. First of all I want to provide some info about my network. In my network most of the systems are using different flavor of MS windows and one computer (call it server1) is providing internet access to all the other computers...

    Iazher0 pointsBadges:
  • How to do a Linux DMZ Intranet with Windows authentication?

    I am designing a new network that has a DMZ containing Linux webservers and behind a firewall separating the DMZ a Windows backoffice . I want to run our company Intranet on the DMZ side using Linux but I want to limit access to employees both from the Internet and behind the firewall using windows...

    Stephang0 pointsBadges:
  • Blocking P2P in SBS2003 network with no ISA Server

    Hi All, I manage a small SBS2003 network, which doesn't have ISA server - i.e. the SBS box and all clients are wired via a switch to the ADSL router (Netgear DG384G). One of the users has been downloading MP3's from a P2P network and I want to block this sort of activity. Can I just block...

    Rmrsystems0 pointsBadges:
  • Cisco ACS, PIX and VPN problem

    I am trying to configure Cisco PIX to accept vpdn connections that will be authenticated by the Cisco ACS after looking up username and profile details in Active Directory. I am seeing failed attempts on the ACS - so I think the config is ok (below) access-list acl_in permit ip 10.xxx.xxx.0...

    Silks1010 pointsBadges:
  • CITRIX – How to Print outside LAN to OFF-Site printers

    I need your help in this scenerio! what are your 2 cents? Goal: To go to a FULL Citrix Enviroment, Aiming at Thin clients, maybe linux based Off-site: Offices connect through the internet, they have DSL/T1's. Right now they are using Citrix successfully. If they have a printer over there and they...

    Ocarmona0 pointsBadges:
  • VPN and email

    Hello, I set up a VPN on the office server and I am not allowing split tunneling. Now I am trying to set up a laptop to access the VPN, the Outlook Exchange serve, internet and email. Igot the laptop connecting to the VPN and set it up to use the proxy on the server so that the laptop can access...

    Adambeazley0 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following