O'Reilly logo

Configuring IPCop Firewalls by James Eaton-Lee, Barrie Dempster

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Advanced Hardening

By this point, we are aware of two large changes we can make to our operations and setup of IPCop, to make it more secure. The first, auditing open ports, allows us to cut down the exposure that our firewalls and systems have to the Internet. The second, utilizing some form of intrusion detection or after-the-fact scanning system such as tripwire and chkrootkit, gives us a higher chance of detecting anyone who does happen to break through our defenses.

Hardening our host, however, is a lot more comprehensive a task than simply installing a service or running some port scanning software. Maintaining a hardened system involves removing any functionality that we don't need as well as making well thought-out changes to our system's ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required