Linux Firewall - Page 14

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Firewalls News

Installing a firewall, Part 2

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In this three-part series, you'll learn to install and configure a Linux server and firewall. Part 1 covered the selection and installation of a secure Linux distribution. Part 2 covers the reassignment of the services provided by the old firewall the . . .

Internet Firewall Essentials

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This document, written in 1996, does an excellent job of describing the basics of the firewall, including proxy and bastion hosts, building a firewall, placement, and references to more information on building firewalls.

Installing a firewall, Part 1

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In this three-part series, you will learn to install and configure a Linux server and firewall. Part 1 covers the selection and installation of a secure Linux distribution. Part 2 will cover the reassignment of services provided by the old firewall . . .

Hardware firewall runs on NSA technology

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A relationship with the National Security Agency has netted Marconi Communications the technology to produce a firewall that is said to run at OC-12 speeds (622 Mbits/second) and to be undetectable to potential intruders. The technology, licensed from the NSA and . . .

Storm Firewall Reviewed

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Stormix Firewall box contains one CD that includes a full copy of Storm Linux 2000 Starter Edition, Storm Firewall, and Debian GNU/Linux packages. Also included are a boot and a driver disk, a product registration sticker, and two manuals: the Storm Linux 2000 Installation Guide and the Storm Firewall User Guide. . . .

Beyond Firewalls

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This article is a good discussion about what a firewall can be expected to do, and what it can't. "In most organizations, firewalls are now a commodity: everyone has at least one. In the future, access controls will need to become . . .

A Few Recipes for Easier Firewalls

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This is another document on using TCP Wrappers and building a quick firewall script. "The simplest way to secure your machine (short of locking it up in the wine cellar with no Internet connection) is to disable all nonessential services from . . .

ipchains-firewall 1.7.1

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Corrections to path issues relating to use of script with Red Hat Linux and from ip-up scripts, a test for ipchains kernel support, and a few minor bugfixes with interface detection routines. "ipchains-firewall is an easily-configurable shell script to establish masquerading . . .

Firewalls - Common Configuration Problems

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

There are many common configuration problems with firewalls, ranging in severity and scope. By far the most common problems relate to what should be blocked or allowed. This is often problematic because needs change; you may need to allow video-streaming, for . . .

Firewalls - Placement

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Security is no good if it isn't in the right place. Think about a modern office building - where are the doors with locks? The lobby doors can always be locked, and usually the doors on each floor have locks as . . .

Linux for Security Applications

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Firewalls seem to be the stuff of legend in the IT community. Everyone has one because they're afraid of system crackers, viruses, and other nefarious things, but very few people know what a firewall is, let alone how to construct one. . . .

Hackers Breach Firewall-1

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

While Checkpoint issues service pack to address vulnerabilities, hackers warn against placing too much faith in firewalls. An audience of several hundred network security professionals watched with rapt attention last week as a trio of hackers repeatedly penetrated one of the . . .

Introducing Firestarter

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Firestarter is a complete firewalling tool for Linux. Features include a firewall wizard, on the fly firewall shaping, a real time hit monitor and IP Masquerade support. Firestarter is made for the GNOME desktop.

12 Tips on Building Firewalls

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Here's a quick 12 tips that describes a firewall, and how to build one. 1.A firewall implements your security policy. A firewall enforces some security policy. If you didn't have a security policy before you put the firewall in place, you . . .

An introduction to TCP wrappers

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

If you haven't heard of TCP Wrappers, or are interested in making it work a bit better, this is a good article to read. "TCP wrappers are designed to filter incoming connections to network services. In this article Paul Dunne . . .