Hardware Embedded Router , Firewall

Posted on 2009-05-23
Medium Priority
Last Modified: 2012-05-07
Hello ,
I need to know what exactly i should do to embeds a linux system to work as a router/firewall with a nano device or hardware box like cisco firewalls , juniper and so on
what about the specs and the detailed tech specs i should use for series
like 1000 concurrent connection series
100,000+ concurrent connections
should i use mini-itx?
or what exactly i should do
also where i can find a factory that fit my needs
they manufacture the hardware and i embedd my system on it

Question by:hbb4ever
  • 2
  • 2

Author Comment

ID: 24462443
nobody here?
LVL 32

Expert Comment

by:Kamran Arshad
ID: 24464799

Please elaborate your query further. What do you want to accomplish?

Author Comment

ID: 24466743
A hardware Firewall
LVL 32

Accepted Solution

Kamran Arshad earned 2000 total points
ID: 24470886

Well you can make your own hardware firewall or UTM box. You need to 1st decide whether you will do the software processing or FPGA based processing. In case it is software processing then you need a standard machine with something like Zebra, Quagga or even Vyatta. The chassis can be bought so. Every component can be bought.


Featured Post

We Need Your Input!

WatchGuard is currently running a beta program for our new macOS Host Sensor for our Threat Detection and Response service. We're looking for more macOS users to help provide insight and feedback to help us make the product even better. Please sign up for our beta program today!

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

This article will show how Aten was able to supply easy management and control for Artear's video walls and wide range display configurations of their newsroom.
In computing, Vulnerability assessment and penetration testing are used to assess systems in light of the organization's security posture, but they have different purposes.
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…

624 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question