Displaying 4 results from an estimated 4 matches for "fwsnort".
Did you mean:
fshort
2013 Feb 01
0
integrating shorewall and fwsnort
Hi,
I like shorewall and I''ve been using it for a long time.
I now have a requirement to block worms / trojans in a public free wifi
network I''m running.
fwsnort ( http://www.cipherdyne.org/fwsnort/) translates Snort rules to
iptables rules and it seems to fit my requirements.
What is the best way to integrate shorewall and fwsnort?
I tried googling for information about this subject but I couldn''t find
any.
Can anyone share experiences of integr...
2016 Jun 29
0
[CENTOS ]IPTABLES - How Secure & Best Practice
Hello Leon.
In addition to everything else mentioned in this thread, I'd recommend you a great book on the topic.
"Attack Detection and Response with iptables, psad, and fwsnort by Michael Rash"
It contains a really nice and detailed guide on iptables and most common attacks, nmap, psad and snort.
Regarding your config, I'd like to point several things:
1. You're not dropping packets in status 'INVALID' on top of your script, which is strange regardi...
2016 Jun 29
1
[CENTOS ]IPTABLES - How Secure & Best Practice
....
Kind Regards
Leon
On Wed, Jun 29, 2016 at 5:41 PM, l at avc.su <l at avc.su> wrote:
> Hello Leon.
>
> In addition to everything else mentioned in this thread, I'd recommend you
> a great book on the topic.
> "Attack Detection and Response with iptables, psad, and fwsnort by Michael
> Rash"
> It contains a really nice and detailed guide on iptables and most common
> attacks, nmap, psad and snort.
>
> Regarding your config, I'd like to point several things:
> 1. You're not dropping packets in status 'INVALID' on top of your scri...
2016 Jun 29
9
[CENTOS ]IPTABLES - How Secure & Best Practice
Dear Members
I hope you are all doing well.
I am busy teaching myself iptables and was wondering if I may get some
advise. The scenario is the following:
1. Default policy is to block all traffic
2. Allow web traffic and SSH
3. Allow other applications
I have come up with the following:
#!/bin/bash
# RESET CURRENT RULE BASE
iptables -F
service iptables save
# DEFAULT FIREWALL