Endian Firewall Community (EFW) is a “turn-key” linux security distribution that turns every system into a full featured security appliance with Unified Threat Management (UTM) functionality. The software has been designed with “usability in mind” and is very easy to install, use and manage, without losing its flexibility. The features include a stateful packet inspection [...]
The Firefox 4 Beta includes the Feedback Add-on which includes you in user studies. No data will be sent to Mozilla without your permission. Once you install the Firefox 4 Beta, you will notice the Feedback Add-on in the upper right corner. You can use this to provide instant feedback at any time. You will [...]
There are couple of free and open source firewall which are Â so good to protect your home or office network from any kind of attacks which may be a virus attack or human initiated one. Â Here we are going to discuss about an open source firewall called smoothwall which is very easy to install and [...]
Configure default route towards the ISP (assume default gateway is 188.8.131.52) ASA5505(config)# route outside 0.0.0.0 0.0.0.0 184.108.40.206 1
Configure PAT on the outside interface ASA5505(config)# global (outside) 1 interface ASA5505(config)# nat (inside) 1 0.0.0.0 0.0.0.0
Enable the rest interfaces with no shut ASA5505(config)# interface Ethernet0/1 ASA5505(config-if)# no shut Do the same for Ethernet0/1 to 0/7.
Assign Ethernet 0/0 to Vlan 2 ASA5505(config)# interface Ethernet0/0 ASA5505(config-if)# switchport access vlan 2 ASA5505(config-if)# no shut
Configure the external interface vlan (connected to Internet) ASA5505(config)# interface Vlan 2 ASA5505(config-if)# nameif outside ASA5505(config-if)# security-level 0 ASA5505(config-if)# ip address 220.127.116.11 255.255.255.0 ASA5505(config-if)# no shut
Configure the internal interface vlan ASA5505(config)# interface Vlan 1 ASA5505(config-if)# nameif inside ASA5505(config-if)# security-level 100 ASA5505(config-if)# ip address 192.168.1.1 255.255.255.0 ASA5505(config-if)# no shut
pfSense is a free, open source customized distribution of FreeBSD tailored for use as a firewall and router. In addition to being a powerful, flexible firewalling and routing platform, it includes a long list of related features and a package system allowing further expandability without adding bloat and potential security vulnerabilities to the base distribution. [...]
The SmoothWall GPL project was founded in the summer of 2000 by Lawrence Manning (Principle Code Author) and Richard Morrell (Project Manager). Their goal was to create a Linux distribution that could convert a redundant PC into a hardened internet firewall device. With help from other early contributors; John Faulty and Tom Ellils, the first SmoothWall Firewall was posted to sourceforge.net at the end of August 2000.
The project was immediately popular and grew rapidly. Within weeks, thousand of copies had been downloaded and SmoothWall was appearing regularly on magazine cover CDs in the UK and overseas. Many more developers joined the team and new versions were released almost weekly, incorporating new features based on software contributions from all round the world.
Core routers and firewall gateways are usually comprised of basic and extended access control lists including rule sets that define local network security level and control access. They are commonly implemented on gateway routers restricting hosts, protocols and port access to other host or networks located after their default gateways. Basically, routers and default gateways [...]
Failover can be setup for two identical security appliances connected to each other. The devices can be connected either through a dedicated failover link and optionally, a stateful failover link. The Adaptive Security Appliance (ASA) supports two failover configurations: Active/Active failover Active/Standby failover Active/Active failover Setup?With Active/Active failover, both units can pass network traffic. This [...]
In order to configure group lock, send the group policy name in the class attribute 25 on the Remote Authentication Dial-In User Service (RADIUS) server and choose the group to lock the user into within the policy. For example, in order to lock the Cisco 123 user into the RemoteGroup group, define the Internet Engineering [...]