Simulating Access lists in a Linux Firewall Box

Posted on 2005-05-13
Medium Priority
Last Modified: 2013-11-16
We are currently using a Cisco 2600 with firewall software. We are using access lists to direct traffic to specific web servers inside of our network. We want to remove the firewall software from our Cisco Router and use a Linux box as our firewall. I need to know how to lock down everyhting inside of our network except forwhat was on our access lists in the cisco router. Can you shed some light and maybe a couple of examples on how to accomplish this.
Question by:cruzjos
LVL 12

Accepted Solution

srikrishnak earned 1000 total points
ID: 14000709
Thts a good idea..n am not sure with the firewall software in ur cisco router..have u installed any additional software(i dont think so)..
Coming to installing a firewall you can refer to the few sites..
hope this helps

Assisted Solution

CiaranDolan earned 1000 total points
ID: 14005539
Have a look at smoothwall express (www.smoothwall.org). The homebrew/customisations forum there is brilliant for this sort of stuff.

Featured Post

Keep up with what's happening at Experts Exchange!

Sign up to receive Decoded, a new monthly digest with product updates, feature release info, continuing education opportunities, and more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you are like regular user of computer nowadays, a good bet that your home computer is on right now, all exposed to world of Internet to be exploited by somebody you do not know and you never will. Internet security issues has been getting worse d…
Do you have a windows based Checkpoint SmartCenter for centralized Checkpoint management?  Have you ever backed up the firewall policy residing on the SmartCenter?  If you have then you know the hassles of connecting to the server, doing an upgrade_…
Loops Section Overview
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…
Suggested Courses
Course of the Month16 days, 22 hours left to enroll

862 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question