Re: Firewall zone books

From: Drew Cutter (andrewc_at_wcoil.com)
Date: 02/11/04


Date: 11 Feb 2004 00:52:30 GMT

Drew Cutter wrote:
>> Drew Cutter wrote:
>>
>>
>>
>>>> Yes , behind a firewall . Their are ways for stealth.
>>
>>
>>
>> Wrong, stealth is nonsense, Read the RfC's describing TCP/IP and you know
>> that stealth is nonsense,
>>
>>
>>>> Something I still
>>>> have to learn more about. For instance nested zones. I learn something
>>>> too from a logging discussion group. Zone is a term use to break down
>>>> into things like zone 1 is database server, zone 2 accounting dept,
>>>> zone 3 intranet, zone 4 log servers.
>>
>>
>>
>> I'd simply call it subnets.
>>
>> Wolfgang
>
>
>
> Wolfgang
> I talking about udp syslogs logs similar to what is done in honeypot
> (article in linux journal)can by stealth . I did find a program
> http://www.zonemaster.org . Yes subnets would equal to security zones.
> This is the limit of my knowledge.
>

Here the link : stealth
http://www.linuxjournal.com/modules.php?op=modload&name=NS-lj-issues/issue92&file=5476s2