Skip to main content

Hardware Firewall

NETWORK TECH WORLD The best firewall is a hardware firewall that is completely separate from your operating system. It need not be a dedicated router, could be an old pentium box running Linux. Below I have found some sites that have How To's on setting up an outside hardware router using an old computer and using a little linux program that fits on a single floppy disk.

Brief Description:
floppyfw is a router with the advanced firewall-capabilities in Linux that fits on one single floppy disc.

Features:
Access lists, IP-masquerading (Network Address Translation), connection tracked packet filtering and (quite) advanced routing. Package for traffic shaping is also available.
Requires only a 386sx or better with two network interface cards, a 1.44MB floppy drive and 12MByte of RAM ( for less than 12M and no FPU, use the 1.0 series, which will stay maintained. )
Very simple packaging system. Is used for editors, PPP, VPN, traffic shaping and whatever comes up. (now this is looking even more like LRP (may it rest in peace) but floppyfw is not a fork.)
Logging through klogd/syslogd, both local and remote.
Serial support for console over serial port.
DHCP server and DNS cache for internal networks.

floppyfw


h#tp://www.zelow.no/floppyfw/



Sentry Firewall CD-ROM is a Linux-based bootable CDROM suitable for use as an inexpensive and easy to maintain firewall, server, or IDS(Intrusion Detection System) Node. The system is designed to be immediately configurable for a variety of different operating environments via a configuration file located on a floppy disk, a local hard drive, and/or a network via HTTP(S), FTP, SFTP, or SCP.

The Sentry Firewall CD is a complete Linux system that runs off of an initial ramdisk, much like a floppy-based system, and a CD. The default kernel is a current 2.4.x series kernel with various Netfilter patches applied. An OpenWall-patched current 2.2.x kernel is also available on the CD.

Booting from the CDROM is a fairly familiar process. The BIOS execs the bootloader(Syslinux) - which then displays a bootprompt and loads the kernel and ramdisk into memory. Once the kernel is running, the ramdisk is then mounted as root(/). At this point our configuration scripts are run(written in perl) that configure the rest of the system. It is the job of these configure scripts to put the various startup and system files into the proper location using either what is declared in the configuration file(sentry.conf) or the system defaults located in the /etc/default directory.

Most of the critical files used at boot time can be replaced with your own copy when declared in the configuration file. This is essentially how we allow the user to configure the system using his/her own configuration and init files.

All of the binaries, files, scripts, etc, used to create the CD-ROM are also available on the CD-ROM. So, with a little practice, you can easily build and customize your own bootable Sentry Firewall CD. Please see the HOWTO for more details.


Sentry Firewall


ht*p://www.sentryfirewall.com/docs.html#overview

Comments

Popular posts from this blog

What is network

NETWORK TECH WORLD What is network  A network is a group of devices, such as computers, servers, and printers, that are connected together and able to communicate with each other. Networks can be classified based on their size and scope, such as a local area network (LAN), which is a network that is confined to a small area, such as a single building or campus, or a wide area network (WAN), which is a network that spans a large geographical area, such as a city or a country. Networks can also be classified based on their communication protocols, such as the Internet, which is a global network that uses the Internet Protocol (IP) to connect devices around the world.

Google Tricks

AA few things you might want to try with Google: Hand type the following prefixes and note their utility: link:url Shows other pages with links to that url. related:url same as "what's related" on serps. site:domain restricts search results to the given domain. allinurl: shows only pages with all terms in the url. inurl: like allinurl, but only for the next query word. allintitle: shows only results with terms in title. intitle: similar to allintitle, but only for the next word. "intitle:webmasterworld google" finds only pages with webmasterworld in the title, and google anywhere on the page. cache:url will show the Google version of the passed url. info:url will show a page containing links to related searches, backlinks, and pages containing the url. This is the same as typing the url into the search box. spell: will spell check your query and search for it. stocks: will lookup the search query in a stock index. filetype: will ...

Network Protocols

NETWORK TECH WORLD A network protocol is a set of rules and standards that define how devices on a network should communicate with each other. Network protocols govern everything from the type of cable that is used to connect devices to the way in which data is transmitted between them. There are many different types of network protocols, each of which serves a specific purpose. Some common examples include: TCP (Transmission Control Protocol): This is a connection-oriented protocol that is responsible for breaking up data into packets, transmitting the packets over the network, and reassembling the packets at the destination. TCP is a reliable protocol that ensures that all packets are delivered to their destination. IP (Internet Protocol): This is a connectionless protocol that is responsible for routing packets between devices on a network. IP is an unreliable protocol that does not guarantee that packets will be delivered to their destination. HTTP (Hypertext Transfer Protocol): Th...