Hardware Firewall

What is the best firewall you’re using? Please recommend me a budget hardware firewall…. | Read the rest of https://www.webhostingtalk.com/showthread.php?t=1830665&goto=newpost

linux – Can you help me with this firewall exercise?

I’m studying Linux firewall, and i have problems to resolve this exercise with command firewalld-cmd:

  1. The web server of the local host is not allowed to be accessed on Tuesdays and Fridays; the rate of new requests cannot exceed 150 per second; the web server contains demo strings that are not allowed to be accessed; the web server only allows response messages to leave the site machine;
  2. Open the ssh service of this machine to the hosts in 192.168.100.9-192.168.100.155, the rate of new request establishment shall not exceed 3 per minute; only response packets are allowed to leave the machine through its service port.
    Can you help me?

KVM virtualized firewall NIC configuration + iptables

I’m currently considering setting up a virtualized firewall on top of KVM. This virtualized firewall can be Pfsense, Opnsense, Ipfire, whatever basically, haven’t decided yet.

What I currently was thinking is: I have a physical machine with 2 physical NIC’s.
So the idea is to create one bridge per NIC, let’s call them:

  • br0 on eth0 (WAN)
  • br1 on eth1 (LAN)

The VM-firewall will have one nic assigned to br0 and one to br1.

Now I’m struggling a bit what would be the best configuration.
I’ve seen examples where people setup networking in such a way that the WAN interface of the KVM host does not get an IP and only can access the internet after going through the virtualized firewall, so the host is configured as if it’s also a system on the LAN-side only.

I’m wondering if this is really the way to go? Risk I see here is that if you do this, and the VM-firewall goes down, you can’t even connect to the internet anymore from the KVM host. I don’t know if I want to run this risk.

On the other hand, the option I see is to allow the KMV host to also directly connect to the internet.
The only reason it will use this connection will probably be to get updates for the OS (basically your apt update).
So it will use its own DNS config (e.g. the google DNS servers), not the DNS of the virtual firewall.

So my first question: what would be the best option out of those 2?

If it would be the first option, how would you do this?

  • Basically set the eth0 interface to manual mode, so it doesn’t get an IP?
  • Would I then also need to still allow IP-forwarding on this host?
  • would any iptables rules in the forwarding chain be necessary?
  • would you expect any specific iptables rules for br0? e.g. in the input chain? Since br0 will only be used by the WAN interface of the VM firewall, I guess on the host level you don’t need any br0 rules?
  • Would you still expect any iptables input rules for eth0?

If the best option is option 2: allowing the KVM host still direct access to the internet, how would this best be done?

  • I guess assigning DHCP to eth0?
  • Would I then also need to still allow IP-forwarding on this host?
  • would any iptables rules in the forwarding chain be necessary?
  • what kind of iptables rules would you expect on eth0/br0? I would think block all for eth0 in the input chain. What about the br0 interface? No rules in the INPUT chain since the WAN interface of the VM firewall is linked to br0, so this firewall handles all input restrictions?

I appreciate any feedback you can give.

MMC > Certificates > Other computers: Which firewall ports used for this?

I am having a windows firewall issue when trying to access the Certificate Store from another computer on the same domain using MMC or PowerShell. I am logged in as a domain admin. Both servers are windows server 2019.

If I disable windows firewall on the remote computer I can successfully add the snap-in and see the certificates. If I enable the firewall I cannot connect.

enter image description here

I am doing a installation of Service Fabric that comes with a pre-installation check script that also fails with an related error. It cannot access the remote certification store. If I disable the firewall this scripts also runs with success.

enter image description here

If I disable the firewalls the test succeeds.

enter image description here

Anyone knows the firewalls requirements for this?

use of firewall in a hosting business

Hi

i am a newbie in the hosting business so i apologize if my question is low quality or redundant but how is your networking setup to e… | Read the rest of https://www.webhostingtalk.com/showthread.php?t=1829630&goto=newpost

firewall – Sonicwall route setup

We have created a VPN tunnel from a remote place via Sonicwall to my Firewall and it is connected. they can not able to ping my network , but I can ping the remote place network.
I know it is a route but I am not familiar with Sonicwall and building routes. I need help on SonicWall route setup?
Note : Sonicwall TZ400

Reasons for disabling IPv6 on the firewall [closed]

My buddy disabled my ipv6 firewall. Is this so he can hack my internet?

network – What makes firewall pop up?

I am creating a file that uses Socket for exchanging data. When I use Python I have a firewall pop up where I am asked to accept the use of the application, but when my C++ program tries to do the same, the firewall doesn’t warn me. My question is what differs in both cases? Is it the language?

Should Router Firewall be deactivated when forwarding ports?

I’m trying to understand how a router’s firewall works when ports are forwarded. As an example, I have vlc running on an ubuntu server in a remote location. I’ve setup VLC to stream content from my surveillance camera in this remote location on port 8080. In my router, I have forwarded external port 4000 to 8080 (internal). The firewall on my router is set to “Standard” which by definition, “allows all outgoing connections and blocks all incoming connections”. It’s obvious that if someone is forwarding ports, you would expect incoming connections in order to be redirected to a server. Would this imply that I would have to deactivate the firewall in order for the incoming connection on port 4000 to be forwarded to the respective server? Or by default, would the firewall add all forwarded ports to the list of exceptions?

I have blocked port 80 and 443 on Windows 10 via making a new Firewall rule but I still can browse. How to I block HTTP traffic via firewall?

I have blocked port 80 and 443 on Windows 10 via making a new Firewall rule but I still can browse via Chrome. How do I block HTTP/HTTPS traffic via firewall?

This is what I did:

Firewall advanced settings –> Outbound rules

In the outbound rules I added new rule.

I choose “port”. I chose the port numbers “80, 443”. The protocol is TCP.

I choose “block the connection” and the rules is applied to “private, public and domain”. I checked too that the rule is applied to all interfaces.

But checked if it’s activated and the rule is activated. But still I can browse on Chrome. I visited websites I never visited before and I can visit them too.

Why the blocking of port 80 and 443 doesn’t block HTTP and HTTPS traffic?
My goal is to block all outgoing HTTP and HTTPS traffic.