There are three Win 7 laptops on the LAN trying to connect to the ASA5500 Firewall. They generate a Severity Level 3 alert and try the same port three times then move to the next numerical port and try that three times. Is this a malicious Hack.
i'm trying to use VNC as a remote desktop i was told to forward port 5900 in order to connect. but whatever i do i still an error saying that the port is not forwarded..Connection test failed.VNC Server appears to be behind a NAT router with IP address x.x.x.x. You will need to configure that router to forward port 5900 to this computer before you can connect to VNC Server over the Internet.as you can see here the port is forwarded to the server computers local IP.i have no firewalls active, and no anti-virus software that could be blocking VNC.
I have D-Link's DSL-2730U modem/router. I've enabled the router's firewall and disabled TR-069 (putting in some dummy ACS URL and login credentials as well). However port scans show 30005 as open. I believe this is used by the TR-069 client. How do I definitively filter this port?
url...I discovered that it would be possible to be protected from portscan, i mean when someone scan our nework/host from outside, the attacker will see all the 65535 ports as "open" (in that way it will be more difficult for an attacker to perform customized attacks...)So I have follow the setup in that link: policy-map global_policy class class-defaults set connection embryonic-conn-max 15 per-client-embryonic-max 3 service-policy global_policy global . The problem is that I don't have the exepected result..If i do a portscan over Internet from an external host to my hosts the portscan is successfully working and I can view my open ports...I have also tried to set this through a "match" in an access-list but without any sucess.
Is it true that the FCC is investigating the Pogo game site because of poor security? Is Java the cause of this problem?I'm very leery of getting on the Pogo site because I've been told that my computer could get a virus and crash.
I'm new to IT, and have been put in charge of managing our servers hile my boss is on vacation.We currently have a Sonicwall Network Security Appliance that handles our Firewall/VPN and have web content filtering set in place.I have a user who belongs to 2 CFS policy groups that we have set up. I've double checked with Active Directory, and he is a member of both groups.
This person SHOULD have access to Job searches/ and Restaurants,but receives a "content blocked" message on his browser.It appears to me that the settings in Sonicwall are correct, as well with AD member groups.
I am trying to connect to a Security-enabled wireless netowork. I have the key. My problem is that I can't seem to figure out how to enter it. When I try to connect I open the "view available networks"window. I see the network name and it shows a strong signal (all 5 green bars).
I opened my iTunes program today and noticed a roommate's MP3 files were picked up on my network. I think the name of the program is Rocket Tube MP3. Anyway, I came on here because our computers use a Wi-Fi internet connection and I was wondering how much of my web activity (history, cookies, temporary files, etc) he could see from my laptop if his computer was a desktop downstairs. He's very tech-savvy (a former IT guy) and I don't want him snooping through my personal records.
We are a non-profit organization that is heavily reliant on interns that use their own laptops a lot here. My concern is they come in and connect to our wireless network with no supervision or anything else. I am worried they will introduce a virus, trojan, or something to our network. What the best way to keep them from introducing unwanted malware from a thumb drive, virus in email, or something to that effect shy of standing over them while they install and run an antivirus software?
I have problem with the Lan-to-Lan VPN tunnel.the VPN working fines since 9 months ago without any problems.Suddenly got the problem!,In last two days we faced problem the VPN down.in first time the problem in phase-2.. but after that in phase-1... in latest no data packet received to their side.
I am looking for some resources on what steps would be involved in configuring a Cisco ASA 5500 when obtaining a new ISP. Since our static IP will be changing with the new ISP, just need to know what configurations changes will need to take place. We currently have a working config with DSL, but are switching to cable. We are using a DMZ configuration, and are going to try using ASDM first since that should be easier
I have been trying to get into one website (url)The world's best online marketplace, List free Classifieds,buy and sell - auction,post a job and get hire from over 1 million top professionals. | Wanaifieds.com and I can't get into the site from my home I can get into the site everywhere else but here I called the service provider and their telling me it's not them they don't block website and the IP is not stationary so their nothing wrong with their end I called the hosting company of the website and they told me they don't block any IP's I don't know what to do I do remember when it was working about 4 days ago I tried something o the site and I messed up and I clicked back instead of putting my password a little box poped up and said something about a certificate or something but I just clicked off and when I tried to get back on the site.
I'm working with Cisco ASDM 6.1 for pix. I want some of ip addresses are not shunned thus provide a list of addresses which should not be shunned in threat detection, but some of ip addresses are shunned yet.
I want to block 10.0.0.1 and 192.168.1.1 but my router says invalid domain so if will the guess network be able to go to page 10.0.0.1 and 192.168.1.1 even though I don't block it? I have a bypass account but don't want anyone else to access 10.0.0.1 and 192.168.1.1. Also can you tell me some proxy sites I can block?
when I run nestat -b command. I always see a lan ip sending TCP traffic to my computer with state syn_receivedProto >> Lan Address >> Foreign Address >> state >> Process idTCP >> (my ip) >> 192.168.2.222(lan ip) >> syn_received >> 4
My Iphone 4s will no longer connect to my WRT54G Linksys router. I know it's a security issue because if I disable security, then it connects. I'm using WPA-Personal, AES, Mixed mode.I've already tried resetting the network settinegs on the iphone a couple of times.
I've recently spotted my router's configuration page is shown publicly if they connect to external ip or a domain name I've set up to my own IP through a web browser (it's a game server)I see it as a security thread, that everybody can connect to my router's configuration page and want that down asap!
I am trying to figure out how to give computers that connect to my LAN limited access. I have heard that some viruses, though rare, may travel through the network and infect all computers on the network. I want to prevent this. Is there any way to give computers connected to my network strict access to only the internet to prevent viruses or any other harmful attacks?
A couple hours ago I installed AVG free antivirus and pc-cleanup and decided to uninstall them after seeing poor results. When I rebooted my computer, I was unable to, and still am, to find any wireless networks. I've tried disabling Microsoft firewall and restoring but everything has failed.
I have ran speed tests using speedtest.net whilst having my kaspersky internet security 2011 both enabled and disabled.With it enabled, i get download speeds of around 3MbpsWith it disabled, i get download speeds of around 12Mbps3Mbps is awful and loading webpages can take a long time sometimes. What can be done to resolve this problem?
I have a sonicwall tz-170 that has a standard interface. It is the main system with IP 192.168.1.1.Another location using IPs 192.168.0.1 has a dvr (192.168.0.154) with ports 80, 37777 and 37778.I can access them from the main location just fine but setting up a service then a rule does not allow me to connect from outside the network. I assume this is the same for anything trying to reach the other side of the vpn but I'm not sure