Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

Open Source FW recommendation

Posted on 2004-10-14
4
190 Views
Last Modified: 2010-04-09
Hi,

I am looking for an open source FW with IDS support built in. Will be installed on a Solaris 9 machine. Would be nice to have the options to add other modules (load balancing for example)- but not a must. The main criterion is that it should be recommended by actual users for-
1. Performance and reliability.
2. Ease if use.


Thank you
0
Comment
Question by:bobwood2000
  • 2
  • 2
4 Comments
 
LVL 23

Accepted Solution

by:
Tim Holman earned 270 total points
ID: 12306579
iptables and snort.
0
 

Author Comment

by:bobwood2000
ID: 12310631
Are there any features that iptables does not have, which would be helpful for protecting a popular web server?
0
 
LVL 23

Expert Comment

by:Tim Holman
ID: 12311109
Not really.  I would also take a look at Smoothwall:

http://www.smoothwall.org/

It's more like an iptables 'GUI'.

To protect a web server, you need a firewall that blocks everything bar port 80, and statefully inspects the port 80 session.  ALL firewalls do this.

To extend your depth of protection, you'll need to add patch management, anti-virus and host IPS to ensure your web server remains protected.

For free, your enterprise options are limited.  You usually need to pay for stuff like load balancing.
0
 

Author Comment

by:bobwood2000
ID: 12344324
Problem solved. Thanks.
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Do you have a windows based Checkpoint SmartCenter for centralized Checkpoint management?  Have you ever backed up the firewall policy residing on the SmartCenter?  If you have then you know the hassles of connecting to the server, doing an upgrade_…
The DROP (Spamhaus Don't Route Or Peer List) is a small list of IP address ranges that have been stolen or hijacked from their rightful owners. The DROP list is not a DNS based list.  It is designed to be downloaded as a file, with primary intention…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…

840 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question