Displaying 5 results from an estimated 5 matches for "penisoara".
2004 Apr 05
2
Controlling access at the Ethernet level
> What would you recommand ? Are there any other elegant solutions ?
>
How about using 802.1Q vlan's and dedicate a vlan to each port.
If more than 4000 users then add more gateways.
Just be sure to go for switches that allow you to deny incoming already
tagged packets on the user side as some switches passes already tagged packets.
For a wireless environment i would suggest PPPoE
2006 Aug 11
1
Ports/source dance
Hi,
On 8/10/06, Mark Bucciarelli <mark@gaiahost.coop> wrote:
>
>
> There's a scary security alert from yesterday out and no port
> update so I judged it to be isp-related. I looked for
> ports-security list but didn't see one.
>
>
You know, that might be a very good ideea -- e.g. have a security team and
list for ports as we have one for the base distribution.
2008 Mar 06
2
DDOS problem from Bangkok, Thailand
Dear Security team,
I'm Kamolpat Pornatiwiwat, Sys admin of DMaccess Co., Ltd. I'm got the
problem, My FreeBSD 6.0 got Dos attacked. What should I do? At the
present, I decide to stop apache and leave only mail feature on
functioning. Any guide/recommend/solution will be appreciated.
More detail about my server:
======================
FreeBSD 6.0
apache-1.3.34_4
php5-5.1.2_1
MySQL
2004 Apr 05
4
Q: Controlling access at the Ethernet level
Hi Adrian,
Sunday, April 4, 2004, 10:22:33 PM, you wrote:
AP> We have thought about using static MAC entries per port on managed
AP> switches installed at the client endpoints, but that would require a
AP> overwhelming budget. We are also thinking about L2TP and PPPoE, but I
AP> am uncertain about compatibility.
AP> What would you recommand ? Are there any other elegant
2006 Jul 19
5
UDP connection attempts
Hi everyone,
I administer this 5.2.1 Freebsd Box which runs a few services, among of
which are bind and postfix. On the same box I run ipfw as a firewall, and
have a default policy block for all incoming packets, except for those
that are for ports 53 (tcp and udp) and 25 (tcp).
I also have the following sysctl values enabled:
net.inet.tcp.blackhole=2
net.inet.udp.blackhole=1
In my security logs I