[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <15533237421C6E4296CC33A2090B224A05C23B@UTDEVS02.campus.ad.utdallas.edu>
From: pauls at utdallas.edu (Schmehl, Paul L)
Subject: WinME firewalling
> -----Original Message-----
> From: full-disclosure-admin@...ts.netsys.com
> [mailto:full-disclosure-admin@...ts.netsys.com] On Behalf Of
> Valdis.Kletnieks@...edu
> Sent: Sunday, November 09, 2003 10:39 PM
> To: morning_wood
> Cc: j; full-disclosure@...ts.netsys.com
> Subject: Re: [Full-Disclosure] WinME firewalling
>
> I just didn't want anybody leaving the impression that it was
> possible to firewall off a Microsoft box and be safe....
>
Hopefully, you're not referring to my post. I *did* state that she
should patch and keep her AV software up to date as well. But trust me,
those little $50 SOHO routers work *quite well* at walling of a Windows
box from the Internet. We have several here that are protecting
expensive scientific test equipment that is controlled by a Windows
computer that cannot be patched per vendor and/or FDC requirements. And
not a one has ever had a problem of any kind.
Of course they are *not* used for surfing the web or checking email,
which is why I pointed out that she needs to keep her AV software up to
date and patch her box regularly as well.
In case you're not aware of it, those little routers include a firewall,
IDS (which can be configured to email alerts to him instead of granny),
DHCP, NAT and MAC ACL restrictions. The boxes behind those are on
private IP space and there are no open incoming ports. You can lock
down a box pretty good behind one of them.
Paul Schmehl (pauls@...allas.edu)
Adjunct Information Security Officer
The University of Texas at Dallas
AVIEN Founding Member
http://www.utdallas.edu/~pauls/
Powered by blists - more mailing lists