Simulating Access lists in a Linux Firewall Box

Posted on 2005-05-13
Last Modified: 2013-11-16
We are currently using a Cisco 2600 with firewall software. We are using access lists to direct traffic to specific web servers inside of our network. We want to remove the firewall software from our Cisco Router and use a Linux box as our firewall. I need to know how to lock down everyhting inside of our network except forwhat was on our access lists in the cisco router. Can you shed some light and maybe a couple of examples on how to accomplish this.
Question by:cruzjos
    LVL 12

    Accepted Solution

    Thts a good idea..n am not sure with the firewall software in ur cisco router..have u installed any additional software(i dont think so)..
    Coming to installing a firewall you can refer to the few sites..
    hope this helps
    LVL 7

    Assisted Solution

    Have a look at smoothwall express ( The homebrew/customisations forum there is brilliant for this sort of stuff.

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    How to run any project with ease

    Manage projects of all sizes how you want. Great for personal to-do lists, project milestones, team priorities and launch plans.
    - Combine task lists, docs, spreadsheets, and chat in one
    - View and edit from mobile/offline
    - Cut down on emails

    Suggested Solutions

    Title # Comments Views Activity
    Checkpoint books 3 63
    List of Palo Alto firewall benefits and use cases needed 5 85
    firewall rules 2 61
    firewall inside of network 9 54
    Do you have a windows based Checkpoint SmartCenter for centralized Checkpoint management?  Have you ever backed up the firewall policy residing on the SmartCenter?  If you have then you know the hassles of connecting to the server, doing an upgrade_…
    The DROP (Spamhaus Don't Route Or Peer List) is a small list of IP address ranges that have been stolen or hijacked from their rightful owners. The DROP list is not a DNS based list.  It is designed to be downloaded as a file, with primary intention…
    This video is in connection to the article "The case of a missing mobile phone (". It will help one to understand clearly the steps to track a lost android phone.
    This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor ( If you're looking for how to monitor bandwidth using netflow or packet s…

    737 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    16 Experts available now in Live!

    Get 1:1 Help Now