Solved

Networking with a router/hub

Posted on 2004-03-31
3
2,931 Views
Last Modified: 2013-12-07
I am using a Netgear router/hub with 3 computers connected to it, all share the Internet connection.

I am using Norton Internet Security Firewall. I have included the IP addresses of the PCs in my Trusted Zone - should I include the router's IP address in here as well?

Each time I start up Norton's comes up with a Trojan Horse warning, which relates to the IP address of the router.

If I include the router's IP address in the Trusted Zone, will my network be any less secure from hackers?

Thanks
0
Comment
Question by:colscream
3 Comments
 
LVL 6

Expert Comment

by:SlyDog
ID: 10726892
Please post the message regarding what port the suspected Trojan is trying to use. Other than pushing DHCP, and maybe ICMP packets to your computer, I can't think of anything else the router might be pushing. I'm also assuming the Netgear is a Broadband/DLS NAT router. This type of device will protect you from most inbound connections, so you should be pretty safe allowing the router access to your computer.

Thanks
Dog
0
 
LVL 24

Accepted Solution

by:
SunBow earned 50 total points
ID: 10728471
> If I include the router's IP address in the Trusted Zone, will my network be any less secure from hackers?

no
firewalls can still block intrusion attempts by address and/or port, protocol, etc

You must keep your patches and upgrades up to date
0
 

Author Comment

by:colscream
ID: 10732459
The message from Norton's says it is a Sockets de Trois v1 Trojan Horse. It happens everytime I start up my PC.

I then get a message saying that the Internet Gateway is Unconfigured.

Yes the Netgear is a broadband router.

I assume that the Router/Hub is looking to see what is connected to the network?

Thanks
0

Featured Post

Netscaler Common Configuration How To guides

If you use NetScaler you will want to see these guides. The NetScaler How To Guides show administrators how to get NetScaler up and configured by providing instructions for common scenarios and some not so common ones.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If your business is like most, chances are you still need to maintain a fax infrastructure for your staff. It’s hard to believe that a communication technology that was thriving in the mid-80s could still be an essential part of your team’s modern I…
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question