On Friday 30 May 2003 11:54 am, Petty, Robert wrote: -snip- Just to add a few things.
> Which kernel would be best? 2.0.x, 2.2.x, or 2.4.x? MHO. Go with 2.4 and iptables (Stateless firewall), for reasons mentioned before > Should snort be running on the firewall machine or another machine? If on > another machine, should I put the firewall and IDS box on a hub as the > first hop so they both see the same traffic? The customer's router is not > manageable (linksys) and they have no budget for a Cisco Router or PIX. > > The Linux box will serve as a secondary NAT layer, any pitfalls with this? iptables handles NAT'ing between interfaces, controling of DMZ's, etc. If I understood the question right? > Should SSH go to the firewall machine or be passed through to an internal > Linux box? Through iptables, you can specify traffic on a certain interface (eth0), for a set port (22), from a certain host (1.2.3.4). Then there's tcp wrappers. > Should the NAT and Firewall rules be written and maintained on CD-R media > so a malicious attacker cannot hide rule changes? Should the firewall be > re-initialized on a schedule to ensure the live rules are those from the > read-only media? I've heard of the whole linux OS and firewall running off a CD. (Trinux has a few ISO's :) > Last, but not least, what's a good HowTo that can be used as a basis? I > would prefer one that starts off a little more strict so I can simplify > rather than have to bone up on all of the current vulnerabilities. http://www.linuxguruz.com/iptables/howto/iptables-HOWTO.html http://www.netfilter.org/documentation/tutorials/blueflux/iptables-tutorial.html > > Thanks for any replies! > > Robert np, jnorfleet