Author Retains Full Rights


After determining the initial state of insecurity in an existing corporate firewall, the following discusses the process of building a hardened Solaris 8 Sun clone with SSH connectivity for remote firewall console access with Checkpoint NG FP1 firewall, an upgrade to FP3 then HF2, hardened further with JASS, and the last step remote syslog. Discussed below is the detailed account of the pre-existing insecurity, a brief note of the catalytic event precipitating the actual changes to the firewall, a discussion of the imp... Copyright SANS Institut

Similar works

Full text

oaioai:CiteSeerX.psu: time updated on 10/29/2017

This paper was published in CiteSeerX.

Having an issue?

Is data on this page outdated, violates copyrights or anything else? Report the problem now and we will take corresponding actions after reviewing your request.