Skip to main content

Firewalls

  • Chapter
  • First Online:
Cyber Operations
  • 1942 Accesses

Abstract

Network firewalls allow a defender to segment their network into different zones. One common architecture uses a DMZ for external facing systems and a separate internal network. Linux distributions such as IPFire can be used as the anchor point for such networks; these can even be implemented virtually using VMWareWorkstation or VirtualBox. IPFire controls traffic in and out of these networks using port forwarding, DMZ pinholes, external access rules, and outgoing firewall rules. IPFire also provides a range of services, including logging, a time server, and a web proxy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 44.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    There should be a secondary DNS server as well; in a real network, one would expect at least one other domain controller and DNS server for redundancy and reliability.

  2. 2.

    GRE is the Generic Routing Encapsulation protocol (RFC 2784); ESP is the Encapsulating Security Payload (RFC 4303).

  3. 3.

    Windows Server 2008 can only configure Internet Explorer 7 and lower. Windows Server 2008 R2 can configure Internet Explorer 8 and lower. Windows Server 2012 and Windows Server 2012 R2 can configure Internet Explorer 10 and lower.

  4. 4.

    When editing preferences in Group Policy, some entries may be marked with red dashed lines. This indicates that the preference setting might not be applied. Press F6 while the box is highlighted to change the red dashed underline to a green solid underline, which indicates that the setting is to be applied. See https://technet.microsoft.com/en-us/library/cc754299.aspx .

  5. 5.

    Recall that the administrator opened DMZ pinholes on TCP/445 and TCP/3389 from the SSH server to the domain controller (Figure 14-6).

  6. 6.

    In this example this system has the local DHCP assigned address 192.168.1.101.

  7. 7.

    Recall that mars.test allows outbound TCP/53 from all hosts (Figure 14-10).

  8. 8.

    Well, usually. Not every exploit and payload combination succeeds.

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Mike O'Leary

About this chapter

Cite this chapter

O’Leary, M. (2015). Firewalls. In: Cyber Operations. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-0457-3_14

Download citation

Publish with us

Policies and ethics