RE: Border router security configuration

From: Naveen Pareek (
Date: 10/22/03

  • Next message: Fields, James: "RE: When does a scan attempt become a focused attack?"
    To: "'rajagopal sekhar'" <>, "'security'" <>
    Date: Wed, 22 Oct 2003 11:01:23 +0530

    Hi Sekhar,

    I did same for one bank. They were using same model and I blocked
    particular ports and small server dameon on the router. I did this
    through access list it was successful. Try this will 100% works to
    prevent known spasm and virus.


    -----Original Message-----
    From: rajagopal sekhar []
    Sent: Tuesday, October 21, 2003 7:41 PM
    To: security
    Subject: Border router security configuration

    > Hello group,
    > I am planning to install a router which is
    > connected to the internet. The router is cisco 2600
    with 2 wan ports and a isdn backup port
    > Could you kindly tell what needs to be done to
    > make the router secure . I also understand that some
    > access lists can be incorporated to prevent attacks
    > from known viruses.
    > I am just off the block , so any help in this
    > regard will be helpful.

             I would also like to thank the moderator for
    checking and informing me to fill the missing info
    regarding make and model of router
    Thhanks for all the help in advance

    > Thanks
    > sekhar

    Do you Yahoo!?
    The New Yahoo! Shopping - with improved product search


    FREE Whitepaper: Better Management for Network Security
    Looking for a better way to manage your IP security?
    Learn how Solsoft can help you:
    - Ensure robust IP security through policy-based management
    - Make firewall, VPN, and NAT rules interoperable across heterogeneous
    - Quickly respond to network events from a central console
    Download our FREE whitepaper at:
    Visual & Easy-to-use are not words that you think of when talking about 
    network analyzers. Are you sick of the three window text decodes? Download ClearSight Network's Analyzer and see a new network analysis tool that 
    makes the complex - easy

  • Next message: Fields, James: "RE: When does a scan attempt become a focused attack?"