Firewall - Page 5

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Firewalls News

Web filtering for Smoothwall using squidGuard

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Chris Lowth submits squidGuard describes itself as: "An ultrafast and free filter, redirector and access controller for Squid". In my experience, it is the ideal web filter for use with Smoothwall since it is lightweight and easy to set . . .

Configuring NFS under Linux for IPTABLES Control

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

When setting up IPTABLES firewalling for Linux systems running the NFS service (network file system), you hit the problem that some of the TCP/IP and UDP ports used by components of the service are randomly generated as part of the "SunRPC" mechanism. . .

PF: The OpenBSD Packet Filter

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Packet Filter (from here on referred to as PF) is OpenBSD's system for filtering TCP/IP traffic and doing Network Address Translation. PF is also capable of normalizing and conditioning TCP/IP traffic and providing bandwidth control and packet prioritization. PF has been a part of the GENERIC OpenBSD kernel since OpenBSD 3.0. Previous OpenBSD releases used a different firewall/NAT package which is no longer supported.. . .

A Technique for Counting NATted Hosts

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Johannes Faustus submits, Steven M. Bellovin (co-author of the classic and recently re-published Firewalls and Internet Security: Repelling the Wily Hacker) has an interesting paper on detecting NATs (Network Address Translation setups) and counting the hosts behind the NAT box.. . .

Running Linux and Netfilter on Nokia IP Series Hardware

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Check Point Software Technologies has the largest market share of any firewall vendor with their Firewall-1 (FW-1) product, and Nokia manufactures several hardware appliances together with an operating system called IPSO to run FW-1. IPSO is based on FreeBSD, provides advanced . . .

HOWTO: Rolling Your Own Firewall

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

I've been hearing a lot of talk lately about firewall appliances and how much of a pain they can be to use. Many of them tend to be Windows-specific in various ways, or they don't have all the flexibility us Penguin-heads . . .

What CIOs Need To Know About New Firewall Tech

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

As recently as a few years ago, IT personnel were trained to harden their network perimeter, barring outsiders entirely. In contrast, today's security environment is far less clear-cut -- and the role of firewalls is expanding. . .

Security Year in Review: VPNs and Firewalls

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Mirko Zorz submits With many new and improved products on the market, this has been a good year for designing VPNs and deploying firewalls. Here's an overview of happenings during 2002 with exclusive comments from David Flynn, Vice President . . .

Time For Everyone To Get Serious About Firewalls

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

There's nothing like getting a computer for Christmas - especially if it's somebody else's. If your machine's on the Internet, it's under near-constant attack from people who'd like to ''own'' it. And if some digital crook can read all of . . .

Vendors complete tougher ICSA 4.0 firewall tests

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

ICSA Labs, which provides one of the most important certifications firewall vendors strive for, said yesterday it has completed the first wave of tests of product against version 4.0 of its certification criteria, writes Kevin Murphy. For the first time, . . .

VPN, firewall sales expected to boom

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Worldwide revenue from sales of VPN (virtual private network) and firewall hardware and software will grow by 31 percent from $668 million in the third quarter of 2002 to $874 million in the third quarter of next year, according to research released Wednesday by Infonetics Research. . .

Linux Embedded Appliance Firewall: v1.0 Released

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

LEAF is an easy to use embedded Linux network appliance for use in small office, home office, and home automation environments. Although it can be used in other ways, it's primarily used as a gateway/router/firewall for Internet leaf sites.. . .

Linux firewalls: IT Manager's top picks

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Linux firewalls--it's one of the hot topics for CIOs and IT managers at the moment. ZDNet Australia takes a look at some of the options available for IT departments. Monitoring traffic, configuration glitches, and decisions about which firewall to opt for--they are all issues facing Australia's IT managers. Here we feature some tips, reports and analysis about Linux firewalls.. . .

Firewalls - back to basics

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A firewall is software or hardware that sits between two networks -- typically, between your LAN and the Internet -- and allows some sorts of network traffic through while preventing others. It works by rules that you set, which define the . . .

Firewalls: The soft option

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The threat of an external attack on the corporate network is now so great that companies need to consider a firewall. There is no excuse for failing to protect data on a network and there are plenty of options on the . . .

The Threat of Internet Worms

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Worms are a major threat to the Internet. Their automatic nature makes them powerful and destructive. Using existing and evolving methods of propagation, it is likely that they will become increasingly more powerful. Solutions based on diligent application of patches or . . .

Using MonMotha's firewall script to build safe Internet sharing with Debian GNU/Linux: HOWTO Version

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

John Gowin wrote in about using IP masquerading and Debian to build a simple firewall. "This tutorial will give you the necessary steps to turn one of your old PCs into a firewall with IP Masquerading, using a popular Linux distribution. I will leave it to you to get and install Debian onto your machine and work out connectivity to your ISP, then I will guide you through a kernel compile and install. . .

A Rookie's Guide to Defensive Blocks

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Rule No. 1: Firewalls are all about access control. You create a set of rules defining which ports to keep open, which to disallow, and any IP addresses or entire networks to block. A firewall on the edge of your network is effective only if it is configured correctly. And don't forget in-house traffic--firewalls are not just for Internet connections. . .

Firewalls and VPNs drive security spending

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

End-user investment in firewalls and virtual private networks (VPNs) will lead to the security market growing to $18.9bn worldwide by 2005, according to a report by analyst Datamonitor. Awareness of cyberterrorism has forced companies to focus on the effectiveness of their . . .