Solved

Linux Firewall

Posted on 2013-06-23
4
314 Views
Last Modified: 2013-07-10
Dear Experts,
In our environment we have juniper firewall ssg 140 whose ethernet port 0/1-0/3 are damaged and we have to send this device to Juniper so they can repair and send us back. In this meanwhile I want to configure linux firewall which can do all function as juniper ssg 140 does like port forwarding, virtual ip, url filtering,etc. Is there any fireall software for linux which is easily available on internet and easy to find help when something goes wrong.
Regards.
0
Comment
Question by:ibu1
4 Comments
 
LVL 6

Assisted Solution

by:Vijay Pratap Singh
Vijay Pratap Singh earned 125 total points
ID: 39269382
Use CSF http://configserver.com/cp/csf.html free and effective
0
 
LVL 25

Assisted Solution

by:Zephyr ICT
Zephyr ICT earned 125 total points
ID: 39269458
Either pfsense or vyatta can be a nice replacement for the time being.

http://www.pfsense.org/ (free)
http://www.vyatta.com/ (free and enterprise version)
0
 
LVL 25

Assisted Solution

by:madunix
madunix earned 125 total points
ID: 39270325
If you want a full featured free firewall:
http://www.pfsense.org/ (tons of features, rock solid stable, BSD based)
http://m0n0.ch/wall/ (Stable and simple, BSD based)
http://www.ipcop.org/ (Good support, Linux based, good addons)

See others:
http//www.shorewall.net
http://www.fwbuilder.org/
http://www.smoothwall.org/
http://www.untangle.com
http://www.clearfoundation.com
0
 
LVL 77

Accepted Solution

by:
arnold earned 125 total points
ID: 39270420
To do an I place setup, you need a box with the same number of interfaces.
Linux has iptables and it is a matter of configuring the iptables rules to match what you need.
Fwbuilder is a tool that can help you with the configuration.
Check with Juniper whether they can provide you a loaner onto which you can pre-load your config.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you have a server on collocation with the super-fast CPU, that doesn't mean that you get it running at full power. Here is a preamble. When doing inventory of Linux servers, that I'm administering, I've found that some of them are running on l…
Hello EE, Today we will learn how to send all your network traffic through Tor which is useful to get around censorship and being tracked all together to a certain degree. This article assumes you will be using Linux, have a minimal knowledge of …
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
Learn how to navigate the file tree with the shell. Use pwd to print the current working directory: Use ls to list a directory's contents: Use cd to change to a new directory: Use wildcards instead of typing out long directory names: Use ../ to move…

948 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now