[Last Call] Learn how to a build a cloud-first strategyRegister Now


Block ack with ISA2004?

Posted on 2005-04-25
Medium Priority
Last Modified: 2010-04-11
Hey experts...

I need to ensure that the Last Default Rule on ISA2004 deny's external ACK traffic...so I am protected from the possibility of ACK tunneling. If the last rule doesn't block this type of traffic, then I need to know how to create rule in ISA to block it.

Question by:neomage23

Accepted Solution

UnifiedIT earned 2000 total points
ID: 13893644
The last default rule is deny all traffic from all networks to all networks for all users. If this rule was the only rule in place than absolutly nothing would pass in or out of the firewall. The possibility of ACK tunneling would be happening from a rule before the last default rule.

Author Comment

ID: 13895238
Thanks Unified...that's what I thought, I just needed confirmation.

Featured Post

Vote for the Most Valuable Expert

It’s time to recognize experts that go above and beyond with helpful solutions and engagement on site. Choose from the top experts in the Hall of Fame or on the right rail of your favorite topic page. Look for the blue “Nominate” button on their profile to vote.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Considering today’s continual security threats, which affect Information technology networks and systems worldwide, it is very important to practice basic security awareness. A normal system user can secure himself or herself by following these simp…
Securing your business data in current era should be your biggest priority. Numerous people are unaware of the fact that insiders commit more than 60 percent of security breaches. You need to figure out the underlying cause and invoke your potential…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
Suggested Courses

829 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question