 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
• |
Denial
of service attack sources are more easy to find as the
|
|
|
|
average
public access zone may be only one cell, network
|
|
|
management
also helps
|
|
|
• |
Public
Access Controller (PAC) and related vendor solutions
|
|
|
|
• |
use
WWW (https) secured authentication and MAC address
|
|
|
|
based
access filtering
|
|
|
|
• |
the
usage of VPN client for corporate access after the PAC has
|
|
|
opened
the hole to Internet
|
|
|
|
• |
limit
the access to Internet only to few ports (WWW, IMAP,
|
|
|
|
etc.)
=> attacking hosts in Internet does not seem to be feasible
|
|
• |
use
real IP addresses if possible
|
|