RE: Border router security configuration

From: Naveen Pareek (naveen.pareek_at_ecomenable.com)
Date: 10/22/03

  • Next message: Fields, James: "RE: When does a scan attempt become a focused attack?"
    To: "'rajagopal sekhar'" <rlsekhar@yahoo.com>, "'security'" <security-basics@securityfocus.com>
    Date: Wed, 22 Oct 2003 11:01:23 +0530
    
    

    Hi Sekhar,

    I did same for one bank. They were using same model and I blocked
    particular ports and small server dameon on the router. I did this
    through access list it was successful. Try this will 100% works to
    prevent known spasm and virus.

    Naveen

    -----Original Message-----
    From: rajagopal sekhar [mailto:rlsekhar@yahoo.com]
    Sent: Tuesday, October 21, 2003 7:41 PM
    To: security
    Subject: Border router security configuration

     
    > Hello group,
    >
    > I am planning to install a router which is
    > connected to the internet. The router is cisco 2600
    with 2 wan ports and a isdn backup port
    >
    > Could you kindly tell what needs to be done to
    > make the router secure . I also understand that some
    > access lists can be incorporated to prevent attacks
    > from known viruses.
    >
    > I am just off the block , so any help in this
    > regard will be helpful.

             I would also like to thank the moderator for
    checking and informing me to fill the missing info
    regarding make and model of router
    Thhanks for all the help in advance

    >
    > Thanks
    >
    > sekhar
    >

    __________________________________
    Do you Yahoo!?
    The New Yahoo! Shopping - with improved product search
    http://shopping.yahoo.com

    ------------------------------------------------------------------------

    ---
    FREE Whitepaper: Better Management for Network Security
    Looking for a better way to manage your IP security?
    Learn how Solsoft can help you:
    - Ensure robust IP security through policy-based management
    - Make firewall, VPN, and NAT rules interoperable across heterogeneous
    networks
    - Quickly respond to network events from a central console
    Download our FREE whitepaper at:
    http://www.securityfocus.com/sponsor/Solsoft_security-basics_031015
    ------------------------------------------------------------------------
    ----
    ---------------------------------------------------------------------------
    Visual & Easy-to-use are not words that you think of when talking about 
    network analyzers. Are you sick of the three window text decodes? Download ClearSight Network's Analyzer and see a new network analysis tool that 
    makes the complex - easy
    http://www.securityfocus.com/sponsor/ClearSightNetworks_security-basics_031021
    ----------------------------------------------------------------------------
    

  • Next message: Fields, James: "RE: When does a scan attempt become a focused attack?"

    Relevant Pages

    • Re: 2 pc network - cant see host files from pc 2 on pc 1
      ... Assuming that you have firewall protection via your internet router try ... workgroup because it will be needed for the network to work correctly. ... see if you can access TCP ports 139 and 445 on computer one of which at ... permissions. ...
      (microsoft.public.windowsxp.security_admin)
    • [Full-Disclosure] iDEFENSE Security Advisory 06.11.03: Denial of Service Vulnerability in SMC Networ
      ... Denial of Service Vulnerability in SMC Networks' Barricade Wireless ... SMC Networks' Barricade Wireless Cable/DSL Broadband Router, ... Stateful Packet Inspection firewall security, network management, ...
      (Full-Disclosure)
    • Re: Public/Private network split.
      ... The only thing I am currently trying to address is the security of the ... {AS yet to be determined Router with wireless access point -- ... I don't want people on the wireless .2 network to sniff ... on the equipment on the .1 network. ...
      (comp.security.misc)
    • Re: preventing username enumeration on NT4
      ... I am the only IT guy for a small network that was ... it appears as though the attacker did nothing more ... Sounds like the server only has one nic and you have a router sitting ... By all means filter ports at the router - starting with the Netbios ...
      (comp.security.misc)
    • Re: preventing username enumeration on NT4
      ... I am the only IT guy for a small network that was ... it appears as though the attacker did nothing more ... Sounds like the server only has one nic and you have a router sitting ... By all means filter ports at the router - starting with the Netbios ...
      (comp.security.misc)