|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Firewalls >> Arkoon identification Vulnerability Assessment Details
|
Arkoon identification |
||
Acertains if the remote host is an Arkoon Detailed Explanation for this Vulnerability Assessment The remote host has the three TCP ports 822, 1750, 1751 open. It's very likely that this host is an Arkoon security dedicated appliance with ports TCP/822 dedicated to ssh service TCP/1750 dedicated to Arkoon Manager TCP/1751 dedicated to Arkoon Monitoring Letting attackers know that you are using an Arkoon appliance will help them to focus their attack or will make them change their strategy. You should not let them know such information. Solution : do not permit any connection on the firewall itself, except for the firewall protocol, and permit that for trusted sources only. If you have a router which performs packet filtering, then add ACL that dispermits the connection to these ports for unauthorized systems. See also : http://www.arkoon.net Network Security Threat Level: Low Networks Security ID: Vulnerability Assessment Copyright: This script is Copyright (C) 2004 David Maciejak |
||
Cables, Connectors |
|
||
No Discussions have been posted on this vulnerability. |