09-22-2006
Quote:
Originally Posted by pathological
... What i would LIKE to do is in the rack put 1 or 2 for redundancy, OpenBSD servers in there, to run the firewalls. Now these will be Xeons with like a gig of RAM so i would almost use them for more than just firewall purposes, but that is just a possibility, i am sure we can get a low end server for this purpose ...
I would advise against using your firewall boxes for anything other than firewalling. The more services you run on a box, the more vulnerable it becomes. Your firewalls should be rock solid bastions of defence. As for your rack config, the physical layout of your boxes in the rack isn't really the issue*, it's the logical configuration you should be more concerned with. Don't just focus on your firewalls, take a layered approach to security models and think about all of the traffic, services, users and data that your systems involve.
I can't view the image you posted. I use
ImageShack to host images for stuff like this forum, check it out. Post a visio diagram of your network layout (
**NO real external IPs/Addresses or other company identifying information!!**) if you can ...
* I won't go into UPS, power & cooling considerations for now.
9 More Discussions You Might Find Interesting
1. Cybersecurity
Just out of curiosity, I see a lot of people here use Linux IPTables as their firewall.
Anyone here use something else like OpenBSD PF or *BSD IPF, IPFW?
I'm quite fond of OpenBSD and their Packet Filters. I find their syntax much easier to manage and from my personal experience, I find them... (5 Replies)
Discussion started by: tarballed
5 Replies
2. Cybersecurity
Would it be possible to restrict access to internet pages in the following way?
A machine:
IP = 128.1.17.123
Only pages from domains of the type "go.jp" and "ne.jp" are viewable. All others are not viewable or only partly viewable.
B machine:
IP = 128.1.17.146
Regardless of the domain... (4 Replies)
Discussion started by: mntamago
4 Replies
3. UNIX for Dummies Questions & Answers
I am a novice to linux and unix and command line, I am willing to jump in head first. I have a couple older computers, one is a dell XPS with a P2 Proccessor and th other is a old old sony VIAO. I have a small home network 3 computers...i have my DSL modem then thats connected to my wireless... (2 Replies)
Discussion started by: Tabryan07
2 Replies
4. Shell Programming and Scripting
I wanted to enable one shell script in the cronetab,how to do crone tabe enabling pl help me:(
regards,
ramesh (1 Reply)
Discussion started by: Ramesh Vellanki
1 Replies
5. Cybersecurity
hi everyone
I am a newbee to firewall scripting. cannot understand how to write rules per host. in ip6tables.
anyone plz:( (2 Replies)
Discussion started by: xecutioner
2 Replies
6. AIX
:b:Hi,,
How do configure firewall in aix.. similar to linux iptable.
Rgards,
k.sumathi. (3 Replies)
Discussion started by: sumathi.k
3 Replies
7. SuSE
Is there a command line interface to the firewall? (4 Replies)
Discussion started by: jgt
4 Replies
8. Linux
Dear All
I have put my windows machine behind my centos firewall server with just one NIC. At now, the windows machine can ping 192.9.9.3 but cannot resolve valid url (like www.google.com). I have set DNS for it as well. Can you please let me know what is the missing step?
Thank you (6 Replies)
Discussion started by: hadimotamedi
6 Replies
9. Cybersecurity
Hey Guys,
I am looking for a good firewall software to implement in medium/large office, with at least 150 users.
I was hopping you guys could help me on this one.
Regards, (4 Replies)
Discussion started by: andrevicente
4 Replies
LEARN ABOUT DEBIAN
lire::firewall
Firewall(3pm) LogReport's Lire Documentation Firewall(3pm)
NAME
Lire::Firewall - supplies a subroutine enabling TCP and UDP portnumber-to-name mapping
SYNOPSIS
use Lire::Firewall qw/:firewall_number2names /;
DESCRIPTION
The Lire::Firewall::firewall_number2names converts numbers for network services, as commonly found in firewall log files, to their
descriptive names.
firewall_revolve FIXME TODO
It takes a firewall Lire dlf object as argument, and operates on its to_port, from_port and protocol properties.
TCP services, UDP services and ICMP types are supported.
SEE ALSO
RPC 792 for ICMP types.
VERSION
$Id: Firewall.pm,v 1.5 2006/07/23 13:16:27 vanbaal Exp $
COPYRIGHT
Copyright (C) 2000, 2001, 2002 Stichting LogReport Foundation LogReport@LogReport.org
This file is part of Lire.
Lire is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free
Software Foundation; either version 2 of the License, or (at your option) any later version.
This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.
You should have received a copy of the GNU General Public License along with this program (see COPYING); if not, check with
http://www.gnu.org/copyleft/gpl.html.
AUTHOR
Francis J. Lacoste <flacoste@logreport.org>. The first Lire implementation of a TCP and UDP portnumber-to-name mapping was written by
Plamen Bozukov.
Lire 2.1.1 2006-07-23 Firewall(3pm)