[Okta Webinar] Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

jupiter netscreen 25 port scanning t can protection

Posted on 2013-05-31
2
Medium Priority
?
691 Views
Last Modified: 2013-06-08
i have a netscreen ns 25,
in is screening => screen link
there is many categories like flood defence, MS-Windows Defense, Denial of Service Defense, Protocol Anomaly Reports -- IP Option Anomalies, Protocol Anomaly Reports -- TCP/IP Anomalies, Scan/Spoof/Sweep Defense

to protect from hack, should in setup in untrust zone or trust zone?

there is also select to setup thoese in v1-trust and v1-untrust zone, to protect from port scanning, use which zone?

expert please advice.
0
Comment
Question by:john80988
2 Comments
 
LVL 21

Expert Comment

by:Rick_O_Shay
ID: 39210458
Screens normally go in the untrust zone. You can see in the counters to see what ones are hitting.
0
 
LVL 71

Accepted Solution

by:
Qlemo earned 1500 total points
ID: 39213091
Those v1* zones cannot be used if your NS is in routing (versus bridging) mode. In bridging mode, the NS works like a switch.
With routing mode, you have a WAN and at least one LAN side. WAN is in the Untrust zone, and that is where the defense should start. So the prior answer is correct - you use Screening in Untrust most of the time.
0

Featured Post

A Cyber Security RX to Protect Your Organization

Join us on December 13th for a webinar to learn how medical providers can defend against malware with a cyber security "Rx" that supports a healthy technology adoption plan for every healthcare organization.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

With the evolution of technology, we have finally reached a point where it is possible to have home automation features like having your thermostat turn up and door lock itself when you leave, as well as a complete home security system. This is a st…
Phishing emails are a popular malware delivery vehicle for attack.  While there are many ways for an attacker to increase the chances of success for their phishing emails, one of the most effective methods involves spoofing the message to appear to …
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
In a question here at Experts Exchange (https://www.experts-exchange.com/questions/29062564/Adobe-acrobat-reader-DC.html), a member asked how to create a signature in Adobe Acrobat Reader DC (the free Reader product, not the paid, full Acrobat produ…
Suggested Courses

872 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question