FirewallPro.com
FirewallPro - HOME arrow Design Library
Thursday, 19 April 2007
 
 
Overview
Hardware Requirements
Installing the Firewall
Configuration
Setting Up a Connection

We provide:

Hardware firewall, vpn firewall, linux firewall, firewall, firewall security, firewall ports, firewall protection, firewall setup, freeware firewall, firewall software, nat firewall, block firewall, firewall port, ip firewall, firewall personal, enterprise firewall, free firewall, configure firewall, firewall settings, personal firewall, firewall configuration, firewall client, firewall download, dmz firewall, udp firewall, ftp firewall, wireless firewall, firewall server, firewall problems, windows firewall, best firewall, internet security firewall, behind firewall, server firewall, internet security, firewall rules, comodo firewall, firewall problem, free firewalls, best free firewall, ez firewall, port forwarding, firewall appliance, computer firewall, business firewall, network firewall, internet firewall, remote desktop, corporate firewall, managed firewall service, through firewall, personal firewall software, free firewall download, free firewall software, firewall system, firewall help, home security, application firewall, network security firewall, firewall downloads, security systems, security cameras, secure firewall, security system, network security, wireless security, computer security, home security systems, information security, home security system.

Home Networking Overview
Essential Tips to ensure the success of your firewall instalation ....
Read more...
 
Overview

FirewallPro.com will deliver the latest version of a customized Linux Firewall. Its sole purpose in life is to protect the network that it is installed on. By implementing existing technology, outstanding new technology and secure programming practices, this firewall is the best solution for those wanting to keep their computers/networks safe and sound.

The firewall software is open source and is distributed under the GNU General Public License [http://www.gnu.org/licenses/gpl.html]. In addition to the many obvious advantages of open source, the fact that the source is open allows security experts, worldwide, to audit and fix security holes.

It will run on older “rescued” PCs retrieved from the junk heap.

Features

  • • A secure, stable and highly configurable Linux based firewall
  • • Easy administration through the built in web server
  • • A DHCP client that allows IPCop to, optionally, obtain its IP address from your ISP
  • • A DHCP server that can help configure machines on your internal network
  • • A caching DNS proxy, to help speed up Domain Name queries
  • • A web caching proxy, to speed up web access
  • • An intrusion detection system to detect external attacks on your network
  • • The ability to partition your network into a GREEN, safe, network protected from the Internet, a BLUE network for your wireless LAN and a DMZ or ORANGE network containing publicly accessible servers, partially protected from the Internet.
  • • A VPN faclity that allows you to connect your internal network to another network across the Internet, forming a single logical network or to securely connect PCs on your BLUE, wireless, network to the wired GREEN network.
  • • Traffic shaping capabilities to give highest priority to interactive services such as ssh and telnet, high priority to web browsing, and lower priority to bulk services such as FTP.
  • • Improved VPN support with x509 certificates.
  • • Built from the ground up with ProPolice http://www.research.ibm.com/trl/projects/security/ssp/] to prevent stack smashing attacks in all applications.
  • • A choice of four kernel configurations, allowing you to choose an optimum configuration for your circumstances.

You will be installing a Linux based operating system, but it is not meant to be a general-purpose system. The firewall design attempts to eliminate as many features from the system as possible. The central idea is that the more code that runs on the firewall, the more places there are that are vulnerable to attacks.

Once you have obtained your configuration parameters, installing the firewall software will take as little as fifteen minutes.

 
Top! Top!