"K2NNJ" wrote in message news:sTMMf.605$ snipped-for-privacy@fe08.lga...
- Vote on answer
- posted
18 years ago
"K2NNJ" wrote in message news:sTMMf.605$ snipped-for-privacy@fe08.lga...
The point is if you have malware on the machine and it's sending outbound traffic to a WAN IP and you have detected this because you have reviewed the syslogs and detected or determined that the traffic is dubious in nature, then you can block the outbound traffic to the WAN IP until such time that you find the malware using software tools on the machine to track it down. The malware cannot circumvent or come around the outbound rules that have been set on the router like it can on a host based FW solution such as a personal FW that runs with the O/S. The malware can at the computer boot process with a host based FW solution beat the FW to the TCP/IP connection before the host based FW can even be started to stop the connection. That includes any worthless Application Control in PFW's too. The router with it's outbound rules set to stop outbound if need be is not part of the computer and is not running with the O/S like the PFW or host based solution with the O/S with them being easily defeated.
That is the point.
Duane :)
So it has a syslog out put and maybe should be using something like Wallwatcher (free) to better organize what you are seeing to help you make determinations or analysis on the network traffic to/from the router.
Duane :)
Below is all I get on the wireless router.
ALLOW:wrapper.3dgamers.com] Source: 192.168.1.3 M>> I hooked up the FR114P to get a look.
If it were me, I would use the wired router as the gateway router, disable DHCP on the wireless router making it a wire/wireless AP switch still using the MAC and whatever else wireless security the can be enabled as it being a wire/WAP switch and plug it into that wire router. The wire computer seems to have better security and FW features than the wireless has like stopping *outbound*.
You can apply the information in the link to your Netgear equipment as the principles of connecting two routers together are the same no matter if they are two wired, two wireless or wire and wireless routes or brand names.
Duane :)
I was actually thinking of wiring the two together, but I didn't think it could be done. I also didn't think about the WAP scenario either. Oh well, live and learn I guess!
Rule of thumb: You ALWAYS need a FW, when connected to ANY net...
It's too difficult to decide when you really don't need one.
Erik
No.
No.
Yours, VB.
ah-ha
I suspect you don't realise what you know
Hm... maybe you're right.
But: if you don't have Windows, but let's say Debian GNU/Linux, SuSE Linux, Fedora, FreeBSD or MacOS X (as an example), then it's even easier not to offer network services to the Internet than to implement a firewall.
If you have Windows 2000, then
Only if you have a small network with Windows at home, then it is possible while too complicated for a home user to configure sercurely, I'd say.
Then a small router with included firewall really will help. And of course, to have such a filtering router is not an error and at least a good idea for everybody, so you're not too wrong.
Yours, VB.
[compton ~]$ nmap ghotto -p 1- Starting nmap V. 3.93 (
There is no firewall on ghotto. It's a UNIX workstation - and it's not running a web server... or any other server. It _does_ have a web browser - three in fact, and from here I can see that one is being used at the moment. Now, what exactly would adding a firewall do?
It took 36 seconds to find out - but if I went over to the keyboard and typed in the command 'netstat -tuan' I'd find the same thing in less than a second. Even windoze supposedly has that command, although the options are different.
I know enough to know that there is more to using a computer than clicking on some icon or URL and "being amazed". They lied to you when they said that even an untrained monkey on crack can use a computer.
Old guy
To appreciate the knowledge involved in all this, try tracing it back to the level of the general user (often, wrongly, indicated by words like stupid, ignorant, dumbo etc, by the high prietsts of ICT)
You can't do it, I suspect.
Again: try to list the knowledge involved in this... examine your own history.
The quote at the bottom, which reads:
They lied to you when they said that even an untrained monkey on crack can use a computer.
The general user (and this isn't limited to computers) has been mis-led into the concept that computers (in this case) require no special knowledge to use. This is not true. But even limited knowledge would help.
And whose fault is that?
Old guy
Cabling-Design.com Forums website is not affiliated with any of the manufacturers or service providers discussed here. All logos and trade names are the property of their respective owners.