> How should I protect these systems from outside hack attacks? Use Bridging http://metalab.unc.edu/LDP/HOWTO/mini/Bridge.html http://metalab.unc.edu/LDP/HOWTO/mini/Bridge+Firewall.html and IPChains http://metalab.unc.edu/LDP/HOWTO/IPCHAINS-HOWTO.html > If I add a second network card to the linux system and set it up as a > firewall, will I still use the ISP assigned IP address or will it be > wasted? This is possible.
> What is the best way to configure the Samba services so it isn't a > security leak via the gateway? Don't allow SMB to get through your firewall. :) Will -------------------------------------------------------------------------- | [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED] | | http://www.cis.udel.edu/~lowe/ | | PGP Public Key: http://www.cis.udel.edu/~lowe/index.html#pgpkey | -------------------------------------------------------------------------- | You think you're so smart, but I've seen you naked | | and I'll prob'ly see you naked again ... | | --The Barenaked Ladies, "Blame It On Me" | --------------------------------------------------------------------------