Guys,
I recently had an incident whereby Someone got further than they should have.
Under ENS, I do not allow intenet pings, and I have add a rule to firewall which says connections from the internet, port 1-65535 action deny for TCP and UDP.
according to me therefore, only sessions created from inside the network through a NAT port should allow the NAT to pass traffic back and this seems to work well.
I also run a time server from analogue x "atomic timesync" which both retrieves the time and acts as an internal time server for the network. I can see therefor that since this will rcreate a session whilst it retrieves the time, someone could try to follow in on it, which is what happened, somone tried to telnet to it. I have checked this and it connects and immediatly disconnects so nothing could be done through it. Interestingly though, at the same time, my logs show that the guest account on wingate was activated and that there was a session initiated from NAT To one of the networked machines.
Can you help me try to understand whats happened here please. If you want the logs, I can email them directly.
Also, if you added a time server to wingate the port of which was under your control, you could prevent this as you could retrieve time and then close the port until the next retrieval. I know it was a feature which has been discussed any idea if and when it may come about?
Many thanks,