| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Re: Network sniffers (software) |
From: "Geo."
"Hrvoje Mesing" wrote in
message news:411bc080{at}w3.nls.net...
> Then You should Block it with outgoing rules. Maybe You can use IPSec
> (netsh) to filter it out of the proccessing.
I never thought about it this way before but this is a real good example to
show people why one firewall sucks compared to another. IPsec won't stop
the outbound packets because IPsec is a higher level block than where these
come from. You can't use IPsec to block IPX or other protocols and these
broadcasts are special ethernet level packets which come from pretty much
as low a level as you can get. I do believe sygate firewall can block them,
never tried it but if it's loaded before the NM driver then it should work.
Oh btw for those of you using sygate, it leaves port 488 unblocked. Oddly
enough 488 is gss-http, also known as the copyprotection port... When I
created a specific rule for 488 it then opened 480 so my guess is it's some
sort of phone home function. (even though I have those all turned off)
Geo.
--- BBBS/NT v4.01 Flag-5
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45)SEEN-BY: 633/267 270 @PATH: 379/45 1 396/45 106/2000 633/267 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.