The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


Check Point response to CERT CA-2002-03 (Multi-vendor SNMP vulnerabilities)


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Date: Wed, 20 Feb 2002 18:16:15 -0500
From: Scott Walker Register <[email protected]>
To: [email protected]
Subject: Check Point response to CERT CA-2002-03  (Multi-vendor SNMP vulnerabilities)
Cc: [email protected]


Check Point Statement on SNMP Vulnerability Test Suite (CERT CA-2002-03)

Recently, an automated suite was released which tests products for known SNMP vulnerabilities.  

FireWall-1, by default, blocks all SNMP communication to, from, or across a FireWall-1 gateway.  
SNMP communication is enabled only if the administrator writes a specific rule which allows the communication.  

SNMP communication is not required for correct functionality of any Check Point products.

If SNMP monitoring of Check Point firewalls is needed, Check Point recommends that the FireWall-1 rule base tightly restrict SNMP communication and that all relevant operating system security patches be applied.

Check Point knows of no SNMP-related security issues in any of its products, and has 
conducted an extensive review to ensure that none exist.


----------------------------------------------------------------
[email protected]  ||  FireWall-1 Product Manager
               Check Point Software Technologies, Inc.
2255 Glades Road    /    Suite 324A     \  Boca Raton, FL  33431
Voice: 561.989.5418 | Fax: 561.997.5421  |   02/20/02   18:16:15
----------------------------------------------------------------

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру