Colm Buckley wrote:
> 
> 
> It doesn't necessitate any such thing; most organisations will probably 
> continue to block all unknown inbound traffic, and rightly so.  There's 
> nothing about P2P applications which requires an open firewall; what's 
> being gained is the ability to have consistent source and destination 
> headers along the whole route, without requiring routers or firewalls to 
> keep track of all connections for NAT purposes.
> 

Actually isn't that making some connections more secure? There won't be any 
need for the current horrible firewall punching techniques used today with udp.


>     Yes, NAT could be useful to mask your internal
>     network topology from the wild world web.

Yes, this is the core of my original question. I suspect you could hide your 
subnets (natting everything to a single subnet, assuming you can (enough 
address on one subnet)), BUT does exposing our subnets make our network 
vulnerable? Assuming here we still have a DMZ and an internal network, and we 
firewall the internal network the same way we do today (don't allow 
connections initiated from the outside, etc...)?



-- 
Yves.                                                  http://www.SollerS.ca/



_______________________________________________
Discuss mailing list
Discuss@lopsa.org
http://lopsa.org/cgi-bin/mailman/listinfo/discuss
This list provided by the League of Professional System Administrators
 http://lopsa.org/

Reply via email to