Skip to main content

Hardware Firewall

The best firewall is a hardware firewall that is completely separate from your operating system. It need not be a dedicated router, could be an old pentium box running Linux. Below I have found some sites that have How To's on setting up an outside hardware router using an old computer and using a little linux program that fits on a single floppy disk.

Brief Description:
floppyfw is a router with the advanced firewall-capabilities in Linux that fits on one single floppy disc.

Features:
Access lists, IP-masquerading (Network Address Translation), connection tracked packet filtering and (quite) advanced routing. Package for traffic shaping is also available.
Requires only a 386sx or better with two network interface cards, a 1.44MB floppy drive and 12MByte of RAM ( for less than 12M and no FPU, use the 1.0 series, which will stay maintained. )
Very simple packaging system. Is used for editors, PPP, VPN, traffic shaping and whatever comes up. (now this is looking even more like LRP (may it rest in peace) but floppyfw is not a fork.)
Logging through klogd/syslogd, both local and remote.
Serial support for console over serial port.
DHCP server and DNS cache for internal networks.

floppyfw

http://www.zelow.no/floppyfw/

Sentry Firewall CD-ROM is a Linux-based bootable CDROM suitable for use as an inexpensive and easy to maintain firewall, server, or IDS(Intrusion Detection System) Node. The system is designed to be immediately configurable for a variety of different operating environments via a configuration file located on a floppy disk, a local hard drive, and/or a network via HTTP(S), FTP, SFTP, or SCP.

The Sentry Firewall CD is a complete Linux system that runs off of an initial ramdisk, much like a floppy-based system, and a CD. The default kernel is a current 2.4.x series kernel with various Netfilter patches applied. An OpenWall-patched current 2.2.x kernel is also available on the CD.

Booting from the CDROM is a fairly familiar process. The BIOS execs the bootloader(Syslinux) - which then displays a bootprompt and loads the kernel and ramdisk into memory. Once the kernel is running, the ramdisk is then mounted as root(/). At this point our configuration scripts are run(written in perl) that configure the rest of the system. It is the job of these configure scripts to put the various startup and system files into the proper location using either what is declared in the configuration file(sentry.conf) or the system defaults located in the /etc/default directory.

Most of the critical files used at boot time can be replaced with your own copy when declared in the configuration file. This is essentially how we allow the user to configure the system using his/her own configuration and init files.

All of the binaries, files, scripts, etc, used to create the CD-ROM are also available on the CD-ROM. So, with a little practice, you can easily build and customize your own bootable Sentry Firewall CD. Please see the HOWTO for more details.

Sentry Firewall
ht*p://www.sentryfirewall.com/docs.html#overview

Comments

Popular posts from this blog

Siemens Mobile Secret Codes

C25: SP unlock *#0003*(secret code 8 digits)# *#0606# shows you Secret Code but only without SIM Card. *#06# for checking the IMEI (International Mobile Equipment Identity) Resets language to automatic selection : * # 0000 # then Green button Pin Out (electrical connections) 1- GND 2- SB 3- POWER 4- NC 5- TX 6- RX 7- CLOCK 8- DATA 9- GND MIC 10- HF MIC 11- AUDIO 12- GND AUDIO Languages: *#0000#+green phone - choose automaticaly *#0001#+green phone - English *#0030#+green phone - Greek *#0031#+green phone - Netherlands *#0032#+green phone - French *#0034#+green phone - Spanish *#0039#+green phone - Italian *#0049#+green phone - German *#0090#+green phone - Turkish How to change PIN: **04*old PIN*new PIN*new PIN# How to check simlock status *#0606# and then press left soft-key, you will see strange characters, then text ("brak blokad"). If you see for example 260-02, it means the phone is locked to Era GSM. In older models you can use *#06# and see the same information afte...

Changing a users icon on the Welcome screen

Each user that is set up on your computer can associate an image that appears next to his or her name on the Welcome screen. By default, Windows will randomly select an image for you, but this selection can easily be changed. If you do not like the images that Windows has to offer, you can select any other image. The process of changing a user's image is very simple. Just perform the following steps and you will have it changed in no time: 1. Open up the user manager by clicking the Start menu and selecting Run. Then type in nusrmgr.cpland click OK.This is a shortcut to User Accounts that will save you time going to Control Panel and then clicking the User Accounts icon. 2. This will start up the New User Accounts Manager. To change a user's picture, just click the user name. 3. Then, click Change My Picture text and you will see a screen with all of the different images that are built into Windows XP. 4. If you see one you like, just select it by clicking it and then cl...

Top 10 Tips To Improve System Speed

1 .Let your PC boot up completely before opening any applications. 2 .Refresh the desktop after closing any application. This will remove any unused files from the RAM. 3 .Do not set very large file size images as your wallpaper. Do not keep a wallpaper at all if your PC is low on RAM (less than 64 MB). 4 .Do not clutter your Desktop with a lot of shortcuts. Each shortcut on the desktop uses up to 500 bytes of RAM 5 .Empty the recycle bin regularly. The files are not really deleted from your hard drive until you empty the recycle bin. 6 .Delete the temporary internet files regularly. 7 .Defragment your hard drive once every two months. This will free up a lot of space on your hard drive and rearrange the files so that your applications run faster. 8 .Always make two partitions in your hard drive. Install all large Softwares (like PSP, Photoshop, 3DS Max etc) in the second partition. Windows uses all the available empty space in C drive as virtual memory when your Computer RAM is full. ...