Mailing List ArchiveSupport open source code!
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]Basic security on 2611
- To: <tlug@example.com>
- Subject: Basic security on 2611
- From: Sven Simon <sven@example.com>
- Date: Sat, 19 May 2001 22:05:47 -0500 (CDT)
- Content-Type: TEXT/PLAIN; charset=US-ASCII
- Reply-To: tlug@example.com
- Resent-From: tlug@example.com
- Resent-Message-ID: <o6FUAD.A.uvE.TSzB7@example.com>
- Resent-Sender: tlug-request@example.com
I actually managed to get the cisco 2611 hooked to the T1 line and to do its job at the ISP yesterday. Now for some basic security issues... I did a "ip route 0.0.0.0 0.0.0.0 serial0/0" What would be the correct format to only allow packets with an IP from the local LAN thru, in order to prevent spoofing? Is it source destination or rather source netmask or do we use /24 netmask style? Further, I came across a mail in a newsgroup saying the cisco's vulnerable on the syslog UDP port 514, anybody know about this? SVEN
Home | Main Index | Thread Index
- Prev by Date: Re: XIM, kinput2 & Tk
- Next by Date: Re: Can't type fast!!
- Prev by thread: MS password
- Next by thread: RE: Basic security on 2611
- Index(es):
Home Page Mailing List Linux and Japan TLUG Members Links