Vulnerability Scanning Solutions, LLC.
Home
Our Process
Residential
Corporate
What We Scan For
Sample Report
Client List
Terms
Contact Us
What We Scan For
Family: Firewalls --> Category: infos

Checkpoint FW-1 identification Vulnerability Scan


Vulnerability Scan Summary
Acertains if the remote host is a FW/1

Detailed Explanation for this Vulnerability Test

The remote host has the three tcp ports 256, 257 and 258
open.

It's very likely that this host is a Checkpoint Firewall/1.

Letting attackers know that you are running FW/1 will
help them to focus their attack or will make them
change their strategy.

You should not let them know such information.

Solution : do not allow any connection on the
firewall itself, except for the firewall
protocol, and allow that for trusted sources
only.

If you have a router which performs packet
filtering, then add ACL that disallows the
connection to these ports for unauthorized
systems.

See also : http://www.phoneboy.com/fom-serve/cache/405.html
Threat Level: Low

Click HERE for more information and discussions on this network vulnerability scan.

VSS, LLC.

P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.