Firewall - Page 10

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Firewalls News

A Rookie's Guide to Defensive Blocks

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Rule No. 1: Firewalls are all about access control. You create a set of rules defining which ports to keep open, which to disallow, and any IP addresses or entire networks to block. A firewall on the edge of your network is effective only if it is configured correctly. And don't forget in-house traffic--firewalls are not just for Internet connections. . .

Firewalls and VPNs drive security spending

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

End-user investment in firewalls and virtual private networks (VPNs) will lead to the security market growing to $18.9bn worldwide by 2005, according to a report by analyst Datamonitor. Awareness of cyberterrorism has forced companies to focus on the effectiveness of their . . .

VPN adoption is strong

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Sales of virtual private networking (VPN) products and services should top $21.3bn this year, according to the latest estimates from San Jose, California-based market research firm Infonetics Research Inc, with future spending levels more than doubling by 2006. . . .

Monitoring Linux firewalls with firelogd

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Monitoring firewalls on a Linux system can be a challenge because of the text-based nature of the OS. The firelogd program can greatly improve the monitoring process by e-mailing concise summaries of important entries to an admin. . . .

Firestarter: 5 minutes to a Linux firewall: Part 2

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The following article is part two of a two part series. "Alternately, you could create limit rules to accept only a certain number of requests every second. Or if you have monitoring software that requires your box to be "pingable," you could accept ICMP requests from only a certain IP or set of IP addresses." . . .

Firestarter: 5 minutes to a Linux firewall

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In a recent article, we looked at manually creating a firewall using iptables , the packet-filtering program built into the Linux 2.4 kernel. Now, we're going to look at a front-end graphical user interface (GUI) you can use not only for iptables but for ipchains as well.. . .

Good firewalls make good policy

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A well-designed computer network, like well-designed policy in a federation like Canada, depends on good firewalls. In a computer network, a good firewall alerts users to potential harmful interactions between the computer and the local network, and also between the local . . .

Setting up a strong Linux firewall

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In most organisations, network security has become interwoven with standard network and system administration. Threats in the form of malicious hackers, self-propagating worms, denial of service attacks, and other nefarious security problems loom large for administrators. . . .

Cracks in the Firewall

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Is your firewall toast? A new report by Web security giant Internet Security Systems (ISSX ) suggests it certainly could use a few upgrades and some additional help. The company combed through data collected from the logs of thousands of . . .

Taking a Stateful Approach to Firewall Design

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Security continues to be the biggest concern for IT managers and, in turn, design engineers developing firewall systems. With more viruses popping up and hackers attacking more often, corporations are looking for any approach possible to plug holes in their firewall . . .

Firestarter: Fast firewalls made simple

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Firestarter is a graphical based firewall interface to the ipchains/Netfilter (iptables) firewalls that come with your Linux distribution, ipchains is used mostly for 2.2.x kernels and Netfilter is used on 2.4.x kernels. This little firewall is easy to use and . . .

Sentry Firewall CD HOWTO

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This document is designed as an introduction on how the Sentry Firewall CDROM works and how to get started using the system. The Sentry Firewall CD is a Linux-based bootable CDROM suitable for use in a variety of different operating environments. The system is designed to be configured dynamically via a floppy disk or over a network.. . .

Design the best security topology for your firewall

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

At its most basic level, a firewall is some sort of hardware or software that filters traffic between your company's network and the Internet. With the large number of hackers roaming the Internet today and the ease of downloading hacking tools, . . .

Building a CD Bootable Firewall

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This document covers the basic steps I took in building a bootable CD containing a live FreeBSD filesystem with a couple of security features enabled and configured. With this CD, it is possible to transform a PC from a mediocre workstation into a VPN Gateway or firewall or both without touching the hard drive. . . .

Implementing a Bridging Firewall

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

What is the difference between a bridging firewall and a conventional firewall? Usually a firewall also acts as a router: systems on the inside are configured to see the firewall as a gateway to the network outside, and routers outside are configured to see the firewall as the gateway to the protected network.. . .

Securing Small Networks with OpenBSD

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This article describes the design and implementation of a small network with a split private/DMZ design that allows a high level of protection for its users while making some services available to the outside world. The design is easy to implement and administer, even for beginners, and can serve as a foundation for custom security installations.. . .

Flaw weakens Linux security software

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Programmers have found a vulnerability in Linux that could allow protective firewall software to grant malicious computer users access to protected networks. The flaw, which affects versions 2.4.14 through 2.4.18-pre9 of the Linux kernel, is in a component of the . . .

New Netfilter Home Page

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The netfilter core team proudly announces: The new netfilter/ipables project homepage. So finally, in the beginning of 2002, about one year after 2.4.x was released, the netfilter project gets its new homepage.. . .

UnderLinux Interviews Core Netfilter Member

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

bit_of_love sent us a note about an interview with Harald Welte. "UnderLinux has an interesting interview with Harald Welte, member of netfilter/iptables project core team. Harald told about his carrer, dificulties in iptables project, Brazil and Free software, GNU/HURD and, of course, the new iptables2 to kernels 2.5.x/2.6.x.". . .