Great Circle Associates Firewalls
(April 1994)
 

Indexed By Date: [Previous] [Next] Indexed By Thread: [Previous] [Next]

Subject: Re: Encrypted tunnels
From: lear @ yeager . corp . sgi . com (Eliot Lear)
Date: Thu, 14 Apr 1994 10:58:34 -0700
To: "Robert G. Moskowitz" <0003858921 @ mcimail . com>, firewalls <firewalls @ GreatCircle . COM>
In-reply-to: "Robert G. Moskowitz" <0003858921 @ mcimail . com> "Encrypted tunnels" (Apr 14, 7:05am)
References: <14940414120541/0003858921NA4EM @ mcimail . com>

There are several companies such as Semaphore Technologies that
provide encryption tools that will encrypt/decrypt IP on the fly.
If you use two such boxes, and allow IP to pass between them, you may
be OK.

There are a number of variables in this equation,such as whether you
allow the two machines to talk to others within their respective
companies.  If you do, then you must take great care to control the
environments of each of these machines.  (I fully realize that you
would likely be directly responsible for only one end).


-- 
Eliot Lear
[lear @
 sgi .
 com]




References:
Indexed By Date Previous: Re: probe_tcp_ports
From: long-morrow @ CS . YALE . EDU (H Morrow Long)
Next: Inbound telnet sessions.
From: "Rhett, Joe" <JRhett @ sextantgroup . com>
Indexed By Thread Previous: Re: Encrypted tunnels
From: imarr @ london . micrognosis . com (Ian Marr)
Next: Re: Encrypted tunnels
From: Steve Kennedy <steve @ gbnet . org>

Google
 
Search Internet Search www.greatcircle.com