Skip to main content

Hardware Firewall

NETWORK TECH WORLD The best firewall is a hardware firewall that is completely separate from your operating system. It need not be a dedicated router, could be an old pentium box running Linux. Below I have found some sites that have How To's on setting up an outside hardware router using an old computer and using a little linux program that fits on a single floppy disk.

Brief Description:
floppyfw is a router with the advanced firewall-capabilities in Linux that fits on one single floppy disc.

Features:
Access lists, IP-masquerading (Network Address Translation), connection tracked packet filtering and (quite) advanced routing. Package for traffic shaping is also available.
Requires only a 386sx or better with two network interface cards, a 1.44MB floppy drive and 12MByte of RAM ( for less than 12M and no FPU, use the 1.0 series, which will stay maintained. )
Very simple packaging system. Is used for editors, PPP, VPN, traffic shaping and whatever comes up. (now this is looking even more like LRP (may it rest in peace) but floppyfw is not a fork.)
Logging through klogd/syslogd, both local and remote.
Serial support for console over serial port.
DHCP server and DNS cache for internal networks.

floppyfw


h#tp://www.zelow.no/floppyfw/



Sentry Firewall CD-ROM is a Linux-based bootable CDROM suitable for use as an inexpensive and easy to maintain firewall, server, or IDS(Intrusion Detection System) Node. The system is designed to be immediately configurable for a variety of different operating environments via a configuration file located on a floppy disk, a local hard drive, and/or a network via HTTP(S), FTP, SFTP, or SCP.

The Sentry Firewall CD is a complete Linux system that runs off of an initial ramdisk, much like a floppy-based system, and a CD. The default kernel is a current 2.4.x series kernel with various Netfilter patches applied. An OpenWall-patched current 2.2.x kernel is also available on the CD.

Booting from the CDROM is a fairly familiar process. The BIOS execs the bootloader(Syslinux) - which then displays a bootprompt and loads the kernel and ramdisk into memory. Once the kernel is running, the ramdisk is then mounted as root(/). At this point our configuration scripts are run(written in perl) that configure the rest of the system. It is the job of these configure scripts to put the various startup and system files into the proper location using either what is declared in the configuration file(sentry.conf) or the system defaults located in the /etc/default directory.

Most of the critical files used at boot time can be replaced with your own copy when declared in the configuration file. This is essentially how we allow the user to configure the system using his/her own configuration and init files.

All of the binaries, files, scripts, etc, used to create the CD-ROM are also available on the CD-ROM. So, with a little practice, you can easily build and customize your own bootable Sentry Firewall CD. Please see the HOWTO for more details.


Sentry Firewall


ht*p://www.sentryfirewall.com/docs.html#overview

Comments

Popular posts from this blog

Distance learning online course

NETWORK TECH WORLD If anybody wants to doing online distance learning courses are We all the courses. BA, MA, BCOM, MCOM, BCA, MCA, BSC IT, MSC IT, BED, MED, BSC, MSC, B LIB, M LIB, BTECH, MTECH, BBA, MBA, D PHARMA, B PHARMA, BHM, DHM, MHM, PhD, Bped, More etc or 10th and 12th University's are 1. IEC University Himachal Pradesh 2. Sunrise University Alwar Rajasthan 3. Himalayan Garhwal University Uttrakhand 4. Sangai International University Manipur 5. Calorx University Ahmedabad Gujarat 6. Himalayan University Arunachal Pradesh 7. Arni University Himachal Pradesh 8.Subharti University Inquiry call or what's app number is 7017329859 or comments below thank u.

How to increase your internet speed

NETWORK TECH WORLD  How to increase your internet speed Moderate Internet speed is the most ghastly and abominable condition for each Internet client. It influences the work of the clients and causes wastage of time. There are numerous purposes for the moderate Internet speed. Luckily, you can build the pace of your net association with a few enterprises. Top 5 ways to increase your internet speed Use antivirus program: A standout amongst the most normal purposes for the moderate  Internet speed  is infection, spy wares and ad ware. These infections influence the Internet settings and capacities that in turn cause moderate scanning speed. Thus, it is fitting that you institute exceptional quality against infection programming to get freed from the infection and their terrible impacts. Filter your workstation on a normal foundation with a hostile to infection to evacuate all the infections and ad ware. Use ad ware evacuation system and spy ware evac...

What is difference between osi model and tcp model

NETWORK TECH WORL What is difference between osi model and tcp model  The OSI model (Open Systems Interconnection model) and the TCP/IP model are both frameworks that describe how data is transmitted between computers over a network. The OSI model is a theoretical model that consists of seven layers, each of which performs a specific function in the process of transmitting data. The layers are: Physical layer: This layer deals with the physical transmission of data. It is concerned with things like cables, connectors, and the actual physical transmission of data over the network. Data link layer: This layer is responsible for ensuring that the data is transmitted accurately from one device to another over a physical link. It is concerned with things like error correction and flow control. Network layer: This layer is responsible for routing data between devices on a network. It determines the best path for data to take based on things like network congestion and the availability of...