would not stop)
https://www.microsoft.com/security/blog/2019/11/26/insights-from-one-year-of-tracking-a-polymorphic-threat/
>
> Thank you,
> CJ
>
>
>
>
> Get Outlook for iOS
> From: Curtis, Bruce
> Sent: Friday, October 9, 2020 5:23:45 PM
> To: Christopher
> Simple router ACLS are also good to shutdown back trafffic, take a hint from
> Comcast
>
> https://www.xfinity.com/support/articles/list-of-blocked-ports
>
>
> Regards,
> CB
>
>
>
>
>
> Get Outlook for iO
>
> From: Curtis, Bruce
> Sent: Frida
If this is really greenfield, consider taking a tenant approach to your
egress traffic handling, you mentioned a "black box with subscription",
then consider making that blackbox/traffic path be only available to
whatever tenant subscribes to the service, and if they want the SSL/MITM
decryption, t
> Is it fair to say that an NGFW *must* decrypt SSL traffic in order to
> fully categorize for IPS/IDS prevention?
well, not really. aside from damage, it will not 'protect' you against
more modern transports, such as quic, which were designed to keep the
net open.
randy
ttps://www.xfinity.com/support/articles/list-of-blocked-ports
Regards,
CB
>
>
> Get Outlook for iO <https://aka.ms/o0ukef>
>
--
>
> *From:* Curtis, Bruce
> *Sent:* Friday, October 9, 2020 5:23:45 PM
> *To:* Christopher J. Wolff
>
prevention?
Thank you,
CJ
Get Outlook for iOS<https://aka.ms/o0ukef>
From: Curtis, Bruce
Sent: Friday, October 9, 2020 5:23:45 PM
To: Christopher J. Wolff
Cc: nanog@nanog.org
Subject: Re: Securing Greenfield Service Provider Clients
EMAIL FROM EXTERNAL SEND
On Fri, Oct 9, 2020 at 2:27 PM Christopher J. Wolff
wrote:
> Without setting up SSL encrypt/decrypt through a MITM setup and handing
> certificates out to every client, is there any other software/hardware that
> can perform DPI and/or ssl analysis[...]?
>
No. That was kind of the point of SSL.
If you search for this phrase
During 2020 more than fifty percent of new malware campaigns will use
various forms of encryption and obfuscation to conceal delivery, and to conceal
ongoing communications, including data exfiltration.
you will find lots of vendors of decryption have th
Are you really suggesting decrypting customer traffic? In most parts of the
world that act falls in one of two categories: it is either required by law
or it is illegal.
Offer your customers a good virus scanner to install instead.
Regards
Baldur
fre. 9. okt. 2020 21.27 skrev Christopher J. Wo
Behalf Of
Jared Geiger
Sent: Friday, October 9, 2020 3:45 PM
To: nanog@nanog.org
Subject: Re: Securing Greenfield Service Provider Clients
WARNING!! This message originated from an External Source. Please use proper
judgment and caution when opening attachments, clicking links, or responding to
CJ,
On 09.10.20 15:09, Christopher J. Wolff wrote:
Dear Nanog;
Hope everyone is getting ready for a good weekend.� I�m working on a
greenfield service provider network and I�m running into a security
challenge.� I hope the great minds here can help.
Since the majority of traffic is
DNS filtering might be an easier option to get most of the bad stuff with
services like 9.9.9.9 and 1.1.1.2. Paid options like dnsfilter.com will
give you better control. Cloudflare Gateway might also be an option.
On Fri, Oct 9, 2020 at 12:29 PM Christopher J. Wolff
wrote:
> Dear Nanog;
>
>
>
>
On Fri, Oct 9, 2020 at 2:27 PM Christopher J. Wolff
wrote:
> Dear Nanog;
>
>
>
> Hope everyone is getting ready for a good weekend. I’m working on a
> greenfield service provider network and I’m running into a security
> challenge. I hope the great minds here can help.
>
>
>
> Since the majorit
Dear Nanog;
Hope everyone is getting ready for a good weekend. I'm working on a greenfield
service provider network and I'm running into a security challenge. I hope the
great minds here can help.
Since the majority of traffic is SSL/TLS, encrypted malicious content can pass
through even an
14 matches
Mail list logo