Tobias DiPasquale on Mon, 22 Sep 2003 20:08:10 -0400 |
Here you go: box:~# nmap -sS -P0 68.46.172.168 Starting nmap 3.27 ( www.insecure.org/nmap/ ) at 2003-09-22 19:21 EDT All 1623 scanned ports on pcp01770803pcs.audubn01.nj.comcast.net (68.46.172.168) are: filtered Nmap run completed -- 1 IP address (1 host up) scanned in 1336.711 seconds box:~# On Mon, 2003-09-22 at 18:37, Paul wrote: > Request for scan: > > My current IP address is > > 68.46.172.168 > > Will someone please do a port scan or security scan against my > firewall? I just threw together a firewall using the "Shoreline > Firewall" utility. Some simple config file changes and I now have 4 1/2 > printed pages of iptables rules. I'd like to know if the rules are at > least providing basic protection from the Internet. > > The internal LAN (one PC) is trusted and masqueraded. > > On the wireless side (one laptop) all I have is MAC and IP verification > to limit access. Otherwise, the wireless network is trusted and > masqueraded. I'm hoping to further limit access to VPN traffic. I'm > assuming 128-bit WEP is almost pointless. (?) > > http://www.shorewall.net/ > http://hostap.epitest.fi/ > http://www.freeswan.org/ > > _________________________________________________________________________ > Philadelphia Linux Users Group -- http://www.phillylinux.org > Announcements - http://lists.netisland.net/mailman/listinfo/plug-announce > General Discussion -- http://lists.netisland.net/mailman/listinfo/plug Attachment:
signature.asc
|
|