¨Configure firewall to pass a minimum
set of ports
¨Accept the fact that an attacker can
determine
your firewall rules
¨Filter out ICMP Time Exceeded
messages leaving your network
–Side effect of crippling
traceroute
¨Replace traditional and stateful
packet filters with proxy-based firewalls