Vulnerability Assessment & Network Security Forums

If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.

Home >> Browse Vulnerability Assessment Database >> Firewalls >> Arkoon identification

Vulnerability Assessment Details

Arkoon identification

Vulnerability Assessment Summary
Acertains if the remote host is an Arkoon

Detailed Explanation for this Vulnerability Assessment

The remote host has the three TCP ports 822, 1750, 1751

It's very likely that this host is an Arkoon security dedicated
appliance with ports

TCP/822 dedicated to ssh service
TCP/1750 dedicated to Arkoon Manager
TCP/1751 dedicated to Arkoon Monitoring

Letting attackers know that you are using an Arkoon
appliance will help them to focus their attack or will
make them change their strategy.

You should not let them know such information.

Solution : do not permit any connection on the
firewall itself, except for the firewall
protocol, and permit that for trusted sources

If you have a router which performs packet
filtering, then add ACL that dispermits the
connection to these ports for unauthorized

See also :
Network Security Threat Level: Low

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 David Maciejak

Cables, Connectors

Lot of 2 HP 2.5" EG0300FBDSP 300GB 10K RPM 6 GB/s SAS HDDs MBF2300RC 599476-001
Lot of 2 HP 2.5NEW HGST HUH728080ALE600 8TB 7200 RPM 128MB Cache SATA 6.0Gb/s 3.5" HDD
NEW HGST HUH728080ALE600 8TB 7200 RPM 128MB Cache SATA 6.0Gb/s 3.5SUN 7064135 600Gb 10K RPM SAS 6Gbps Hard Disk Drive HDD z5
SUN 7064135 600Gb 10K RPM SAS 6Gbps Hard Disk Drive HDD z5 pictureSUN 7064133 300Gb 2.5" 10K RPM 6Gbps SAS Disk Drive z5
SUN 7064133 300Gb 2.5


No Discussions have been posted on this vulnerability.