News

security policy

The company’s business objective should be the key driver for a company security policys creation implementation and enforcement

DHCP “starvation” attack

Exhausting the address space available on the DHCP servers so an attacker can inject their own DHCP server addresses for malicious reasons, describes the DHCP “starvation” attack

ASA (nat control)

The command “nat control” on the ASA, requires traffic originating from the inside interface to match a NAT transiation rule to pass through the firewall on the outside interface

IPSEC PORTS

The following ip protocols and ports are commonly used in Ipsec portocols TCP ports 50, 51 UDP ports 500 and 4500

CSA quarantine lists

Low and slow reconnaissance scans used to gain information about a system to see if it is vulnerable to an attack can be stopped with CSA quarantine lists