Linux Firewall - Page 8
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
Lutel's Firewall Script is a Linux IPtables shell script written in bash for use as a firewall and NAT/masquerade router for home networks or multiple subnets applications. It shares access to a internet connection from multiple workstations. It makes use of . . .
As part of the 'shake up' in its security system, Ahorro Corporación decided to change the platform for its applications and choose to invest in Linux. This meant that the firewall would also have to run with Linux. The StoneGate firewall . . .
As a result of the recent onslaught of Internet-based virus attacks and their effect on many companies' operations, some organizations responded defensively by shutting down TCP ports that were vulnerable. Unfortunately, many quickly learned that other essential business applications relied on . . .
There are many tools we use as network and security professionals to build a secure network. Routers, virtual private networks, intrusion detection systems and vulnerability scanners are regularly employed to tackle this challenging task. Many would agree that the foundation of . . .
Every self-respecting Linux guru should be familiar with firewalls and how to install and configure them. With this in mind, Linux gurus also should be curious about how firewalls function and how to build a firewall of his or her own. . . .
This could be because the ISP has its own firewalls in place, and, in any event, the peril is far less for telephone modem users than for folks with high-speed, or broadband, connections via cable modem, digital subscriber line and such. . . .
The "p2pwall" project has developed a GPL add-in for iptables based firewalls that allows blocking of traffic to and from "Fast-Track" software such as "Kazaa", Kazaa-lite, iMesh and grokster. The software is designed for use in "permissive" firewall configurations where . . .
Firewalls provide a variety of services to networks in terms of security. They provide for network address translation (NAT), virtual private networks (VPN), and filtering of traffic that does not conform to the network's stated security policy. There are many forms . . .
When our home LAN graduated to a 24x7 Internet connection, my Linux box became the firewall and the router. I liked the ability to customize the firewall, and by using Snort I could keep an eye on the barbarians at the . . .
Proxy servers were originally developed to cache frequently accessed web pages for computersbehind a common Internet connection. In the early days of the Internet, wide area links were veryslow, the Web was relatively small, and web pages were static. The entire . . .
Most people, when creating a Linux firewall, concentrate soley on manipulating kernel network filters: the rulesets you create using userspace tools such as iptables (2.4 kernels,) ipchains (2.2 kernels,) or even ipfwadm (2.0 kernels). However there are kernel variables -- . . .
There are literally hundreds of firewall products available, and there are different theories from different security experts on how firewalls should be used to secure your network. This article will explore the operation of a generic firewall in detail, outline the important features you need in a firewall, and discuss how firewalls should be deployed in networks of any size.. . .
From the title it may seem that Personal Firewalls for Administrators and Remote Users was written for administrators and users of business networks. However, as more people take advantage of "always on" Internet connections, they are becoming de facto administrators. Remote . . .
Ste Jones submits By using openBSD's packet filter pf one can utilize the NAT address pools added into OpenBSD 3.3 to aid in distributed port scanning. As the text explains NAT can be used in a large network . . .
Hackers have computers too and want to keep their own machines free of intrusion from the Internet. Paradoxically, these computers may be the most secure computers on the Internet, because the hackers use free software that they can examine for security . . .
NetBSD's itojun has ported PF (openbsd packet filter) to netbsd-current as of today as a patch. He says that presently it does not support (interface) syntax and ip_off/ip_len endian flipping needs testing. His ultimate goal is to replace ipsec policy engine . . .
Network security administrators sometimes need to be able to abort TCP/IP connections routed over their firewalls on demand. This would allow them to terminate connections such as SSH tunnels or VPNs left in place by employees over night, abort hacker attacks . . .
It seems as though the operating system that helped to create the embedded Linux marketplace, the Linux Router Project (LRP), is dead. The website provides more details. . .
How important is a firewall's throughput? According to Check Point Technologies' Mark Kraynak, price performance -- the amount of throughput an enterprise gets versus the dollars it spends -- is more important than top-end throughput.. . .
Firewalls are the cornerstone of Internet security, and for small businesses that might not have in-house security expertise, shopping for one can be difficult. But without a firewall, no one in an organization should be accessing the Internet. How do . . .