antivirus on Ubuntu (IV) - The Fire Safety
After
the summer break we return items to a dedicated security firewall (Or firewall). According Sunday, September 12, 2010
How To Unlock Vip Suitecase
".. a device or set of devices configured to permit, restrict, encrypt, decrypt, traffic between different areas on the basis of a set of standards and other criteria. " For what we want we can define the firewall as a set of rules with which to filter and control all network traffic in and out of your computer (or network). The firewall is the main piece in the network security.
The core of GNU / Linux (or kernel) has an integrated firewall so no need to install any specific software to have it. However, communication with the firewall features of the core (via the command iptables
) can be somewhat complicated for non-experts, for this reason there are programs that will facilitate the task of managing the firewall. The core of GNU / Linux (or kernel) has an integrated firewall so no need to install any specific software to have it. However, communication with the firewall features of the core (via the command iptables
For this article I will use the program gufw (you can find at the Center for Software) to manage the firewall, but others such as firestarter
that will be beaten.
Set access policy There are two main policies when configuring the firewall, depending on the type of use that we will give our network connection choose one or the other:
Deny incoming traffic: reject all incoming connections and explicitly allow connections we want (secure method). Recommended for desktop users and small networks.
Allow incoming traffic: accept all connections and establish specific rules for those who want to deny (unsafe method).
From the main screen gufw
( System - Administration - Configuring firewalls ) activate the firewall and select the default restrictive policy for incoming traffic:
- restrictive default policy
- define the rules
Once defined restrictive policy can define the rules that allow those communications need. We add a rule for each service they want to offer. There are many types of connections and many configurations for each, we will see some representative examples, thou must you apply to services and the conditions that you please lay down your firewall. Open
ports for p2p programs, p2p networks (emule, torrent ...) require certain ports open to function properly, by setting a restrictive policy we have "closed" all ports so you can set up rules for opening we need.
This is as simple as
Add - Preconfigured - Allow - Incoming - Program - select the program you want to allow access
- Add .
Add - Preconfigured - Allow - Incoming - Program - select the program you want to allow access
- Add . In the same way we can allow access to programs or services that we deem necessary.
Allow administration remote: it is very common to have to configure computers remotely via different protocols (ssh, vnc ...) for which generally requires open access a given port. This is an "open door" to the world and a potential security hole. To minimize the risks filter these connections permitting only the connection from a specific IP address (the computer that performs remote administration). In this case the process will Add - Advanced - Allow - Incoming - Register - TCP -
select the IP address and port of origin and destination
- Add .
rulebook definition
In this case we have established a rule that allows access to the SSH service (on port 22) from the address 192.168.1.10 (our internal network) to the computer 192.168.1.2 (also Our internal network, so that not allow connections from any other location to the SSH service.) In addition to greater safety, we have activated the connection log.
More Wikipedia: Firewall
rulebook definition
In this case we have established a rule that allows access to the SSH service (on port 22) from the address 192.168.1.10 (our internal network) to the computer 192.168.1.2 (also Our internal network, so that not allow connections from any other location to the SSH service.) In addition to greater safety, we have activated the connection log.
More Wikipedia: Firewall
SoftLibre: Security
- Ubuntu (I) - Introduction
- Ubuntu Security (II) - User and Password Security
Administration firewall gufw
ufw firewall administration
- firestarter firewall administration
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment