Solved

tiny personal firewall activity monitor

Posted on 2003-11-24
4
812 Views
Last Modified: 2013-11-16
I'm deeply sorry, but I only have 20 points left to use.

I just wondered if someone could see if this registrations in the tiny personal firewall activity monitor is dangerous or not. maybe you can tell what they're all about? I get these all the time....

Count:1
Action:Monitored
Application:System
Access:Network intrusion report
Object:"ICMP Destination Unreachable (Undefined Code!)" -> 172.151.196.220
Interface:
Time:24.11.2003 20:18:00

Count:1
Action:Monitored
Application:System
Access:Inbound ICMP access
Object:Ping Request (8) <- 62.252.58.148 (cpc3-whit1-3-0-cust148.cdif.cable.ntl.com)
Interface:[1] Intel(R) PRO/100 VE Network Connection
Time:24.11.2003 22:01:44

Count:1
Action:Monitored
Application:System
Access:Inbound ICMP access
Object:Ping Reply (0) <- 62.252.58.148 (cpc3-whit1-3-0-cust148.cdif.cable.ntl.com)
Interface:[1] Intel(R) PRO/100 VE Network Connection
Time:24.11.2003 22:01:44

Count:1
Action:Monitored
Application:System
Access:Network intrusion report
Object:"ICMP PING CyberKit 2.2 Windows" <- 62.252.58.148
Interface:
Time:24.11.2003 22:01:44

Count:1
Action:Monitored
Application:System
Access:Network intrusion report
Object:"ICMP Echo Reply (Undefined Code!)" -> 62.252.58.148
Interface:
Time:24.11.2003 22:01:44
0
Comment
Question by:Darth_helge
  • 2
  • 2
4 Comments
 
LVL 33

Accepted Solution

by:
MikeKane earned 25 total points
ID: 9818881
ICMP's are pings.   Not VERY harmful, but its not ideal to respond to external Ping requests unles syou have a good reason to allow it.    

For example
Count:1
Action:Monitored  
Application:System
Access:Inbound ICMP access   <---- This is what's coming into your system.
Object:Ping Reply (0) <- 62.252.58.148 (cpc3-whit1-3-0-cust148.cdif.cable.ntl.com)  <---- This is the originator of the PING
Interface:[1] Intel(R) PRO/100 VE Network Connection
Time:24.11.2003 22:01:44

It also seems you are only monitoring the access.    You should really block all inbound stuff and open only what you need.  

But in short, pings don't do much much except tell the other party that your machine is here and active.   It could lead to further scans.  

0
 
LVL 5

Author Comment

by:Darth_helge
ID: 9820108
is there some guide to this on the net that you can recommend? im kinda new at firewalls and security.
0
 
LVL 33

Expert Comment

by:MikeKane
ID: 9820177
You can start here:  
http://www.uksecurityonline.com/husdg/

that same site has support info for tiny firewall and general overviews of network security good for a beginner.  

Good luck.  
0
 
LVL 5

Author Comment

by:Darth_helge
ID: 9823057
thanks a lot! :=)
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
iptables question 3 72
Need Advise - System / Network Security 4 53
Tab device internet access -MicroSIM insert telco connection 2 72
TMG 2010 Deployment 3 86
Wikipedia defines 'Script Kiddies' in this informal way: "In hacker culture, a script kiddie, occasionally script bunny, skiddie, script kitty, script-running juvenile (SRJ), or similar, is a derogatory term used to describe those who use scripts or…
To setup a SonicWALL for policy based routing to be used with the Websense Content Gateway there are several steps that need to be completed. Below is a rough guide for accomplishing this. One thing of note is this guide is intended to assist in the…
Windows 10 is mostly good. However the one thing that annoys me is how many clicks you have to do to dial a VPN connection. You have to go to settings from the start menu, (2 clicks), Network and Internet (1 click), Click VPN (another click) then fi…
Video by: Mark
This lesson goes over how to construct ordered and unordered lists and how to create hyperlinks.

920 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now