Hi mdlueck,
I’m still a little confused, and unfortunately have not had time to do any research/testing locally, but thought I’d throw the question into the forum anyway…
Being from a Cisco (router/access-list & PIX) background, I look for a “1st rule match”, and also to erradicate duplicate rules (to reduce the size/manageablitly of acl lists).
If I look at the screen shot of your gloabl rules in the “VNC how-to”, I see (abridged):
1 - Allow all incoming requests if the sender is in “LDS LAN”
2 - VNC from LDS LAN
What I don’t understand is, rule 1 should already permit the incoming VNC connection… As far as I recall, other Firewalls allow all protocol (ICMP/IP/TCP/UDP) incoming connections when a rule has been created that defines the “local subnet”, and allows all incoming/outgoing connections to that “local subnet” (or “Zone” in the case of CIS and ZoneAlarm, etc.).
So I don’t understand why the additional rule for incoming TCP port 5900 is required?
As previously stated, my solution for the “permit incoming VNC” issue was slightly different - I did not need to add any additional rules to my global rules (which already had the "Allow all incoming requests if the sender is in “LOCAL_LAN” rule, due to my ticking “allow this computer to send/receive to/from all computers on the local network” when the local network was initially “discovered”) - but I did need to add “winvnc4.exe” as a “trusted application” in the Application Rules…
Can I ask whether, after you ticked “remember” and clicked “allow” to the “winvnc4.exe is trying to receive a connection from the Internet” alert, CIS automatically created a new “trusted application” rule in the Applications Rules?
Otherwise, could anyone comment on why they there are two different ways to achieve the same thing (when in a security product, you’d expect it’s functionality to be a little “tighter”?), and the pro’s / con’s of either method?
Thanks,
P.