This article is a continuation of the Armoring Solaris paper. This article focuses on
securily building a minimized Solaris 8 64-bit system specifically for CheckPoint FireWall-1
NG.
How to armor the Solaris operating system.
This article presents a systematic method to prepare for a firewall installation.
Also included is a downloadable shell script that will armor your system.
How to armor the Linux operating system. This
article presents a systematic method to prepare your system for the Internet.
The article is based on Redhat 6.0, but should apply to most distributions
of Linux.
How to implement intrusion detection for Checkpoint
Firewall 1. Also included is a downloadble script that does all IDS
functionality for you, for both Firewall-1 ver 4.1 and the latest, FW-1 NG
(Next Generation). Please give this page a minute to download, I used
several images for the page, totaling 225K. Thanks!
Stateful inspection is one of FW-1's claim
to fame. This whitepaper covers how it works, and how stateful it really
is. Included is a PERL script that helps you read and understand
your own FW-1 state table. This paper is a work in progress.
Misconfigured firewalls are one of the biggest
risks security admins face. This paper describes in a step-by-step fasion
how to build a secure firewall rulebase.
How to best leverage the network sniffer
snoop, with various command line examples. Included are examples
on how to analyze network traffic and improve your network security.
How to configure a static routing table for
a Solaris gateway. Also covers what VLSM is and how to leverage it.
Included are examples of real routing situations, to include command syntax
and routing table configuration. Also included is an excellent windows
tool to calculate all your subnetting and CIDR aggregation.
How to install, configure, and troubleshoot
your NICs for the Solaris operating system. Included are examples
of command syntax and interface configuration.
How to build and implement a simple intrusion
detection system using TCP Wrappers and other tools. Also, recommendations
on how to react and NOT react once you detect an intrusion attempt.
The result of a graduate school project, I
propose a theory on how management can apply Information Technology in
a Two Part Process. Linked to this is an interactive website demonstrating
my theory.
Access database that queries Checkpoint Firewall
1 logs. Please give this page a minute to download, I used several
images for the instructions, totaling 159K. Thanks!!
Author's
bio Lance Spitzner enjoys learning by blowing up his Unix systems at
home. Before this, he was an Officer
in the Rapid Deployment Force, where he blew up things of a different
nature. You can reach him at lance@honeynet.org
.