Linux Firewall - Page 14
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
In this three-part series, you'll learn to install and configure a Linux server and firewall. Part 1 covered the selection and installation of a secure Linux distribution. Part 2 covers the reassignment of the services provided by the old firewall the . . .
In Part 2 of our series on firewalls, another big name in software goes Linux. Check Point FireWall-1 helps Linux adapt to the critical area of securing enterprises. Also, some more firewalls for those who want to pay for their security. . . .
This document, written in 1996, does an excellent job of describing the basics of the firewall, including proxy and bastion hosts, building a firewall, placement, and references to more information on building firewalls.
The following problem (as discussed in this paper) has not yet been identified. Certain firewalls today, will not authenticate the validity of certain protocol fields, within the packet they are processing. The risk is exposure of information. What kind of information . . .
In this three-part series, you will learn to install and configure a Linux server and firewall. Part 1 covers the selection and installation of a secure Linux distribution. Part 2 will cover the reassignment of services provided by the old firewall . . .
A relationship with the National Security Agency has netted Marconi Communications the technology to produce a firewall that is said to run at OC-12 speeds (622 Mbits/second) and to be undetectable to potential intruders. The technology, licensed from the NSA and . . .
In this three-part series, Pawel Leszek looks at firewall products for Linux. Part 1 is all about open source solutions. Part 2 will cover commercial products, while Part 3 will take a look at firewall appliances. The standard firewalling support in . . .
The Stormix Firewall box contains one CD that includes a full copy of Storm Linux 2000 Starter Edition, Storm Firewall, and Debian GNU/Linux packages. Also included are a boot and a driver disk, a product registration sticker, and two manuals: the Storm Linux 2000 Installation Guide and the Storm Firewall User Guide. . . .
This article is a good discussion about what a firewall can be expected to do, and what it can't. "In most organizations, firewalls are now a commodity: everyone has at least one. In the future, access controls will need to become . . .
This is another document on using TCP Wrappers and building a quick firewall script. "The simplest way to secure your machine (short of locking it up in the wine cellar with no Internet connection) is to disable all nonessential services from . . .
Corrections to path issues relating to use of script with Red Hat Linux and from ip-up scripts, a test for ipchains kernel support, and a few minor bugfixes with interface detection routines. "ipchains-firewall is an easily-configurable shell script to establish masquerading . . .
There are many common configuration problems with firewalls, ranging in severity and scope. By far the most common problems relate to what should be blocked or allowed. This is often problematic because needs change; you may need to allow video-streaming, for . . .
Security is no good if it isn't in the right place. Think about a modern office building - where are the doors with locks? The lobby doors can always be locked, and usually the doors on each floor have locks as . . .
You've seen those cute little Cobalt cube servers on television, in magazines, and in your dreams, but you haven't taken the time to give one a test run. Why? Who really knows what they're for? Web servers? File servers? Print servers? . . .
Firewalls seem to be the stuff of legend in the IT community. Everyone has one because they're afraid of system crackers, viruses, and other nefarious things, but very few people know what a firewall is, let alone how to construct one. . . .
While Checkpoint issues service pack to address vulnerabilities, hackers warn against placing too much faith in firewalls. An audience of several hundred network security professionals watched with rapt attention last week as a trio of hackers repeatedly penetrated one of the . . .
Firestarter is a complete firewalling tool for Linux. Features include a firewall wizard, on the fly firewall shaping, a real time hit monitor and IP Masquerade support. Firestarter is made for the GNOME desktop.
Here's a quick 12 tips that describes a firewall, and how to build one. 1.A firewall implements your security policy. A firewall enforces some security policy. If you didn't have a security policy before you put the firewall in place, you . . .
If you haven't heard of TCP Wrappers, or are interested in making it work a bit better, this is a good article to read. "TCP wrappers are designed to filter incoming connections to network services. In this article Paul Dunne . . .
Microsoft is championing a protocol for cross-platform communication that can bypass firewall defences and could leave . . .