Perhaps there is a reason why these ports are blocked at the
firewall.  Our security model would forbid opening such a hole - in fact
we open no holes.  And there are no user accounts on the firewall - which
is damn good security policy.  On the firewalls I admin, the moment
someone starts an nmap scan their IP address is permanently blocked from
accessing our nets.  

The one and only correct answer is to review the security policy with the
local security administrator and see what policies are in place.  If there
is a way, work with the admin to gain the access.  If it is not allowed,
accept it.  At many sites, doing an end-around the security policy is a
sure way to be invited to join the ranks of the unemployed.


- rick warner

On Mon, 17 Dec 2001, Oscar Castaneda V. wrote:

> 
> Ask your local sysadmin to open an account for you in the firewall. ssh into the 
>firewall and then into your workstation. Not sure how secure this is but it can work 
>while you find a workaround.
> 
> To find an open port you can use nmap.
> 
> greetings,
> oscar
> -- 
> PGP Key fingerprint =  87 83 5F D3 8D D4 B9 DC  4F 15 B1 68 4E FE 2D AE
> 
> 
> 
> _______________________________________________
> Redhat-list mailing list
> [EMAIL PROTECTED]
> https://listman.redhat.com/mailman/listinfo/redhat-list
> 



_______________________________________________
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to