Firewall - Page 13

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Firewalls News

Netfilter for IP Masquerade

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

As of 2.4, ipchains is a thing of the past. The replacement for ipchains is Netfilter's iptables. What does this mean to the end user? Typically it means little beyond the fact that suddenly their ipmasq script doesn't work. So, for . . .

Leading Open Source firewall developers join SlashTCO

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Richard Morrell and Lawrence Manning, co-authors of the SmoothWall Open Source firewall project, have joined SlashTCO Limited, the UK Open Source services and information provider. Richard and Lawrence will continue to work on a number of Open Source projects, including . . .

Linux Firewall - the Traffic Shaper

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This article will look at ways for users to get more out of that faithful but somewhat dull firewall. In particular, we will look at traffic shaping, a technique that prevents high-bandwidth traffic like Napster from making other Internet applications, such . . .

Installing firewall can keep the PC bad guys at bay

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Ron Trepanier knew that the Internet could be a dangerous place, but it wasn't until he installed a personal firewall that he realized his home computer was coming under daily attack. The mechanical engineer, who lives outside Toronto, recently documented 30 . . .

Firewalls Becoming Ineffective, Experts Say

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

While firewall vendors espouse the virtues or their security solutions, others believe that even the most technologically advanced firewall can't offer companies all of the protection they need to ensure that data is safe from both external and internal threats. . . .

Personal firewalls not so safe

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

It's one thing to rush an application to market without thinking about security. It's another to rush a security application to market. But that's what's happened with several personal firewalls--a product category that was a virtual nonentity . . .

Distributed Pings Setting Off IDS

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

For a couple of weeks now some of you may have been seeing what looks like a ping scan from many hosts to your nameservers. Joe Stewert gave a very good explination of why this is happening in a recent . . .

Top Ten Blocking Recommendations Using ipchains

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Here's a pretty good guide on the most common things you can do to block many of the most commonly exploitable services from entering/leaving your network. "The following 11 sections for this assignment will be demonstrated using a Redhat Linux 6.1 . . .

Introduction to Firewalls

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In this article I cover some of the design decisions that have to be made before creating a firewall, from architecture to various decisions that should be made. A firewall is a device that separates and protects your network, in most . . .

Firewall acceleration over ATM

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Firewalls are not new; but high-performance firewalls are. Historically, firewalls used software to examine every packet and then make the decision to forward or drop the packet. This made them slow. When administrators placed them in line with low-speed WAN . . .

Chapter 6 from Building Internet Firewalls

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This chapter describes a variety of ways to put firewall components together, and discusses their advantages and disadvantages. We'll tell you what some appropriate uses are for each architecture. The simplest firewall architectures have a single object that acts as . . .

Southern Fried Firewalls

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Lewis talked at length about SecureWorks' latest offering, iSensor. A Linux-based stateless firewall product has a significant twist: remote monitoring done at the SecureWorks data center in Atlanta. SecureWorks has done a considerable amount of work in real-time intrusion detection, adding . . .

A Firewall for Linux with Ipchains

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Ipchains is a packet-filtering firewall package. You can findan RPM of Ipchains in RedHat/RPMS in the latest PC Quest RedHat CD. First youhave to check whether the Linux kernel supports Ipchains. For this, look for afile named ip_fwchains in /proc/net. If . . .

Installing a firewall, Part 3

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In this three-part series, you'll learn to install and configure a Linux server and firewall. Part 1 covered selecting a secure Linux distribution and installing it. Part 2 covered the reassignment of services provided by the old firewall which the authors . . .

Setting up Squid as your caching proxy

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Squid is a proxy caching server for HTTP/FTP requests. It caches data off the net on your local network. So the next time the same data is being accessed, whether it is html or a gif, it gets served up . . .

Installing a firewall, Part 2

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In this three-part series, you'll learn to install and configure a Linux server and firewall. Part 1 covered the selection and installation of a secure Linux distribution. Part 2 covers the reassignment of the services provided by the old firewall the . . .