Sunday, September 12, 2010

How To Unlock Vip Suitecase

antivirus on Ubuntu (IV) - The Fire Safety

After
the summer break we return items to a dedicated security firewall (Or firewall). According
Wikipedia
, a firewall is:
".. a device or set of devices configured to permit, restrict, encrypt, decrypt, traffic between different areas on the basis of a set of standards and other criteria. " For what we want we can define the firewall as a set of rules with which to filter and control all network traffic in and out of your computer (or network). The firewall is the main piece in the network security.
The core of GNU / Linux (or kernel) has an integrated firewall so no need to install any specific software to have it. However, communication with the firewall features of the core (via the command iptables
) can be somewhat complicated for non-experts, for this reason there are programs that will facilitate the task of managing the firewall.
For this article I will use the program gufw (you can find at the Center for Software) to manage the firewall, but others such as firestarter
or ufw-gtk
Set access policy

There are two main policies when configuring the firewall, depending on the type of use that we will give our network connection choose one or the other:
Deny incoming traffic: reject all incoming connections and explicitly allow connections we want (secure method). Recommended for desktop users and small networks.

Allow incoming traffic: accept all connections and establish specific rules for those who want to deny (unsafe method).
From the main screen gufw

( System - Administration - Configuring firewalls ) activate the firewall and select the default restrictive policy for incoming traffic:

  • restrictive default policy

  1. define the rules

Once defined restrictive policy can define the rules that allow those communications need. We add a rule for each service they want to offer. There are many types of connections and many configurations for each, we will see some representative examples, thou must you apply to services and the conditions that you please lay down your firewall. Open

ports for p2p programs, p2p networks (emule, torrent ...) require certain ports open to function properly, by setting a restrictive policy we have "closed" all ports so you can set up rules for opening we need.
allowed the program access deluge (torrent)



In the same way we can allow access to programs or services that we deem necessary.

Allow administration remote: it is very common to have to configure computers remotely via different protocols (ssh, vnc ...) for which generally requires open access a given port. This is an "open door" to the world and a potential security hole. To minimize the risks filter these connections permitting only the connection from a specific IP address (the computer that performs remote administration). In this case the process will Add - Advanced - Allow - Incoming - Register - TCP -
select the IP address and port of origin and destination
- Add .


rulebook definition


In this case we have established a rule that allows access to the SSH service (on port 22) from the address 192.168.1.10 (our internal network) to the computer 192.168.1.2 (also Our internal network, so that not allow connections from any other location to the SSH service.) In addition to greater safety, we have activated the connection log.


More Wikipedia: Firewall

SoftLibre:
New GUI for configuring the Firewall on Ubuntu (ufw-gtk)

Related Articles


Security
    Ubuntu (I) - Introduction
  • Ubuntu Security (II) - User and Password Security
Ubuntu (III) - Software Insurance
Administration firewall gufw

ufw firewall administration
  • firestarter firewall administration

0 comments:

Post a Comment