Firewall - Page 12

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Firewalls News

Protect Yourself With Firewalls

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

If you access the Net from home using a DSL or cable modem (CM) connection that is always on, you definitely need a firewall. Why? Well, most hacks on the Internet happen because of automated port scans: "robots" scanning the Internet . . .

Firewall appliances back in vogue

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Small and medium-size companies last year spent more money on hardware-based firewall appliances than on software-based systems, helping WatchGuard Technologies Inc. remain in the No. 1 position in the most competitive segment of the firewall market, according to a new analyst . . .

Firewalls not enough, says security vendor

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Firewalls and intrusion detection systems need an extra layer of protection, according to a leading security vendor. Paul Lawrence, European technical director at Top Layer Networks, said it was crucial to build up a picture of the data traffic on . . .

Security: Firewalls; IPtables and Rules

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

First you need to know how the firewall treats packets leaving, entering, or passing through your computer. Basically there is a chain for each of these paths. Any packet entering your computer goes through the INPUT chain. Any packet that your . . .

Iptables Tutorial

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

I'm sure many of you have been wondering how to use iptables to set up a basic firewall. I was wondering the same thing for a long time until I recently figured it out. I'll try to explain the basics to at least get you started.. . .

Firewalling: Reject vs. Deny, Default-open vs. Default-closed

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

... there are a number of issues considered all too rarely by firewall administrators. Most IP level firewalls have a number of options for handling a packet. The packet can typically be accepted, dropped, or sent through another set of rules for inspection (allowing you to break up your ruleset into more manageable pieces). . .

Setting up a proxy server on Linux

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Many people have heard the term proxy server but don't know how it can benefit them. We've all heard of firewalls, and we all know the value of a good firewall. Some of you might even be using a firewall proxy to make life easier. For those of you who are unaware of what a proxy server or firewall proxy is, let me first explain the concept, and then I'll show you how to set one up on Linux.. . .

DMZs for dummies

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

You've ordered a new firewall, and you want to get it running on your network ASAP. Your first reaction is probably to put every client and server behind it. That's fine for a small company, but a larger company should consider . . .

Firewalls, VPNs, and Remote Offices

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This month I will look at what we might call "best practices" for internetworking remote offices. It is arguably an old topic--we've been connecting remote offices over Virtual Private Networks (VPNs) for a few years now. It is one of the main purposes for VPNs, second only to secure dial-in connections. And yet, I think most of us do it wrong.. . .

Embedded Firewalls: The Next Wave?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Certainly your organization uses a firewall, most likely at your network borders. And many of you have adopted firewalls to protect your internal network segments, servers, and workstations. Most of these solutions are software-based-you must load that software on top of . . .

Security flaw in Linux 2.4 IPTables using FTP PORT

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Firewalls using Linux Kernel 2.4.x with IPTables could potentially be compromised as a result of bad logic in the FTP PORT processing. "There is a security flaw in the manner in which the PORT command is interpreted and processed. Essentially, you . . .

Iptables Basics NHF

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

I'm sure many of you have been wondering how to use iptables to set up a basic firewall. I was wondering the same thing for a long time until I recently figured it out. I'll try to explain the basics to . . .

Considerations of a firewall: Part 1

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

If you're upgrading your firewall, or installing one on your network for the first time, you'll discover that firewall technology has changed a lot in the last several years. How do you select one that's appropriate for your business? Before you . . .

Remote users need firewalls too

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Last December, a bank in Southern California received a call from an online customer asking why one of the bank's computers was trying to hack into his system. It turned out that the machine doing the hacking belonged to the bank's . . .

How to Build a FreeBSD-STABLE Firewall with IPFILTER

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This howto walks you through the process of building one of the most stable and secure firewalls available - a FreeBSD-STABLE firewall with IPFILTER. As a part of the installation process, all services will be disabled except OpenSSH, which will have . . .

NetMAX FireWall worth the fickle installation

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

NetMAX FireWall from Cybernet Systems is a smooth-running, easily configurable firewall, if you can get past its annoying setup and installation. I'd like to mention some useful-looking features that I was unable to test. NetMAX FireWall includes a traffic monitor that . . .