Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

ndiswanip  interface on CheckPoint

Posted on 2002-04-01
1
Medium Priority
?
964 Views
Last Modified: 2013-11-16
When I go to the FireWall Workstation and then "topology" and I press "Get Interfaces". I saw the name = NDISWANIP , ip = 0.0.0.0 and netmask = 0.0.0.0

What is the NDISWANIP interface ?
0
Comment
Question by:leumas
1 Comment
 
LVL 5

Accepted Solution

by:
Mishou earned 40 total points
ID: 6912677
it's not a physical interface.
it's the interface that your Checkpoint see from your RAS service.

By default, windows 2000 installs three extra interfaces on your system.
You can view these by right-clicking on "My Computer" and selecting Manage.
Then RIGHT click on the Device Manager and select "View | Show Hidden Devices".  
When you expand the Network Interfaces, you should see the
following:

WanMiniPort (IP)
WanMiniPort (L2TP)
WanMiniPort (PPTP)

You must DISABLE these... these define your NDISWANIP adapter that Windows 2000 sees.  
If you uninstall them, W2K puts them back....


Mishou
 
0

Featured Post

WatchGuard Case Study: NCR

With business operations for thousands of customers largely depending on the internal systems they support, NCR can’t afford to waste time or money on security products that are anything less than exceptional. That’s why they chose WatchGuard.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

An overview of cyber security, cyber crime, and personal protection against hackers. Includes a brief summary of the Equifax breach and why everyone should be aware of it. Other subjects include: how cyber security has failed to advance with technol…
When you put your credit card number into a website for an online transaction, surely you know to look for signs of a secure website such as the padlock icon in the web browser or the green address bar.  This is one way to protect yourself from oth…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…

927 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question