Home page logo
/

bugtraq logo Bugtraq mailing list archives

Solution: Kill a Unisys Clearpath with nmap port scan
From: <Michael.Kain () unisys com>
Date: 17 Oct 2002 20:40:51 -0000

In-Reply-To: <20021004173141.25444.qmail () mail securityfocus com>

We've determined that the dynamic initialization feature of the ClearPath 
MCP environment is contributing to the high processor utilization and 
excessive log entries.  To solve this, the customer can either disable the 
dynamic initialization feature for those ports which are not in use on the 
system or place a third-party product (like SYNDefender) in front of the 
ClearPath.  For complete details on how to inquire what ports are open on 
the ClearPath MCP and to disable dynamic initialization on those ports, 
please refer to the FAQ on the Unisys Product Support website:

http://www.support.unisys.com/ALL/PLE/WEB-VIEW-DOC?
PLATFORM=AS&NAVIGATION=AS&CHOSEN-DOCUMENT=FAQ&ID=10023971&OPTION=DEFAULT

If there are any questions or concerns, please contact me directly.

Mike Kain





  By Date           By Thread  

Current thread:
  • Solution: Kill a Unisys Clearpath with nmap port scan Michael.Kain (Oct 18)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]