09-14-2005
i would say no, with no additional features a firewall should only act as a "router". if you have some features like intrusion detection, Application-layer security, VPN so&so&so&so, it could be slower than a "normal" router, but to be honest, i cannot believe that in that situation port 80 is faster than another one....
gP
9 More Discussions You Might Find Interesting
1. Cybersecurity
This may be kind of a stupid question, but here goes:
Say I'm running a FreeBSD webserver (w/apache). I've managed to close ALL open ports (including SSH/telnet and portmapper), excepting '80' that apache is listening on. A netstat -a shows me nothing open.
Discounting DoS/DDoS or holes in... (7 Replies)
Discussion started by: adam_crosby
7 Replies
2. Cybersecurity
Just out of curiosity, I see a lot of people here use Linux IPTables as their firewall.
Anyone here use something else like OpenBSD PF or *BSD IPF, IPFW?
I'm quite fond of OpenBSD and their Packet Filters. I find their syntax much easier to manage and from my personal experience, I find them... (5 Replies)
Discussion started by: tarballed
5 Replies
3. Cybersecurity
Would it be possible to restrict access to internet pages in the following way?
A machine:
IP = 128.1.17.123
Only pages from domains of the type "go.jp" and "ne.jp" are viewable. All others are not viewable or only partly viewable.
B machine:
IP = 128.1.17.146
Regardless of the domain... (4 Replies)
Discussion started by: mntamago
4 Replies
4. Cybersecurity
hi everyone
I am a newbee to firewall scripting. cannot understand how to write rules per host. in ip6tables.
anyone plz:( (2 Replies)
Discussion started by: xecutioner
2 Replies
5. AIX
:b:Hi,,
How do configure firewall in aix.. similar to linux iptable.
Rgards,
k.sumathi. (3 Replies)
Discussion started by: sumathi.k
3 Replies
6. SuSE
Is there a command line interface to the firewall? (4 Replies)
Discussion started by: jgt
4 Replies
7. Linux
Dear All
I have put my windows machine behind my centos firewall server with just one NIC. At now, the windows machine can ping 192.9.9.3 but cannot resolve valid url (like www.google.com). I have set DNS for it as well. Can you please let me know what is the missing step?
Thank you (6 Replies)
Discussion started by: hadimotamedi
6 Replies
8. Cybersecurity
Hey Guys,
I am looking for a good firewall software to implement in medium/large office, with at least 150 users.
I was hopping you guys could help me on this one.
Regards, (4 Replies)
Discussion started by: andrevicente
4 Replies
9. UNIX for Dummies Questions & Answers
Alright... this question comes from the fact that I'm trying to setup postfix to relay messages to Office 365 SMTP but its giving me connection refused... I read that if you have doubts if your port is open or not you should telnet to them so thats what I did.
This is a Red Hat 6.3 box.
My... (4 Replies)
Discussion started by: RedSpyder
4 Replies
LEARN ABOUT OSF1
secsetup
secconfig(8) System Manager's Manual secconfig(8)
NAME
secconfig, secsetup - Security features setup graphical interface (Enhanced Security)
SYNOPSIS
/usr/sbin/sysman secconfig
NOTE: The secsetup utility has been replaced by the secconfig graphical interface.
DESCRIPTION
The utility is a graphical interface used to select the level of system security needed. It can convert from Base to enhanced security
mode, and configure base and enhanced security features. If you are using secconfig to enable Enhanced security, you must first have
loaded the enhanced security subsets.
You can run while the system is in multiuser mode. However, if you change the security level, the change is not completed until you reboot
the system.
For both base and enhanced security, the secconfig utility allows you to enable segment sharing, to enable access control lists (ACLs), and
to restrict the setting of the execute bit to root only.
For enhanced security, the secconfig utility additionally allows you to configure security support from simple shadow passwords all the way
to a strict C2 level of security. Shadow password support is an easy method for system administrators, who do not wish to use all of the
extended security features, to move each user's password out of /etc/passwd and into the extended user profile database (auth.db. You can
use the Custom mode if you wish to select additional security features, such as breakin detection and evasion, automatic database trimming,
and password controls.
When converting from base to enhanced security, secconfig updates the system default database (/etc/auth/system/default) and uses the con-
vuser utility to migrate user accounts.
While it is possible to convert user accounts from enhanced back to base, the default encryption algorithms and supported password lengths
differ between base and enhanced security, and thus user account conversions do not succeed without a password change.
NOTE: Because of the page table sharing mechanism used for shared libraries, the normal file system permissions are not adequate to protect
against unauthorized reading. The secconfig interface allows you to disable segment sharing. The change in segment sharing takes effect
at the next reboot.
FILES
RELATED INFORMATION
acl(4), authcap(4), default(4), convuser(8),
Security delim off
secconfig(8)