Looking for best / easiest Linux firewall.

Ulfwald

Moderator Emeritus<br>Elite Member
May 27, 2000
8,646
0
76
Hey, I have messed around with freesco, even got it to copy to the hdd and boot from there. But what I am looking for is a good firewall, will run on a celeron 800, 256 mb ram, 20 gig hdd. 2 nic cards. I suck at command line, so a gui based one is for me at this point.
 

Platypus

Lifer
Apr 26, 2001
31,053
321
136
iptables configs can be generated from any number of free gui tools. I would recommend spending some time learning iptables, definitely worth the time investment.

other options are m0n0wall and offshoots of that

Don't be afraid of the cli, the power of UNIX lies there.
 

mc866

Golden Member
Dec 15, 2005
1,410
0
0
Pfsense or Monowall? Both are freeBSD based. I'm running Pfsense, pretty straight forward to get setup.
 
Last edited:

Fallen Kell

Diamond Member
Oct 9, 1999
6,063
437
126
Another pfsense vote here... If you want better control, I would say IP Tables, but that requires a lot of knowledge and good scripting abilities of the admin to do things like add dynamic blocks to threats (I have one setup which is scanning the log files looking for repeated access failures, port probes, etc., and automatically blocking the IP address and once a threshold has been reached, does a reverse lookup to determine the ISP and does a lookup of all IPs owned by that ISP and blocks them as well).
 

mxnerd

Diamond Member
Jul 6, 2007
6,799
1,101
126
Another vote for Endian.

Endian is a port of IPCop, but has much better UI and integrated a lot of add-ons (proxy, rule-based webfilter, antivirus, traffic log, system reports), the installation is painless.

Highly recommended.
 
Last edited:

Brazen

Diamond Member
Jul 14, 2000
4,259
0
0
I've tried them all and definately liked pfsense the best. I've been using it for a year and couldn't be happier with it. Technically, though, it's not a Linux but it is a *nix.
 

bugi_man

Junior Member
May 17, 2012
2
0
0
Another pfsense vote here... If you want better control, I would say IP Tables, but that requires a lot of knowledge and good scripting abilities of the admin to do things like add dynamic blocks to threats (I have one setup which is scanning the log files looking for repeated access failures, port probes, etc., and automatically blocking the IP address and once a threshold has been reached, does a reverse lookup to determine the ISP and does a lookup of all IPs owned by that ISP and blocks them as well).
I wanted to ask you if you would be so kind to share with me this "Know how" and for what I would be very thankful. Wish you all the best friend and I`ll be expecting your answer soon! ))
 

PCTC2

Diamond Member
Feb 18, 2007
3,892
33
91
Clarkconnect is now ClearOS and very good.

Beat me to it. They just released ClearOS Community 6.1 and it's pretty good. I used to use ClearOS 5.x, switched to Zentyal and realized ClearOS was better.


I wanted to ask you if you would be so kind to share with me this "Know how" and for what I would be very thankful. Wish you all the best friend and I`ll be expecting your answer soon! ))

I do something similar, but just for ssh.

I have a line in /etc/pam.d/sshd that says
Code:
auth [default=ignore] pam_exec.so /usr/local/bin/ssh_lockout

/usr/local/bin/ssh_lockout looks like this:
Code:
#!/usr/local/bin/ruby

ip_format = /(\d+\.){3}\d+/
today = %x[date | awk '{printf "%s %s %s",$1,$2,$3}']
failed_ips = %x[lastb -i | grep "#{today}"].split(/\n/).collect{|line| line.split(/\s+/).select{|substr| substr =~ ip_format} rescue nil}.compact
last_failed_ip = %x[lastb -i -n 1].split(/\s+/).select{|ip| ip =~ ip_format}.first
if failed_ips.count(last_failed_ip) > 5
  if %x[grep #{last_failed_ip} /etc/hosts].empty?
     %x[echo "sshd : #{last_failed_ip} : deny" >> /etc/hosts.deny]
     %x[echo "#{last_failed_ip} has been blocked at #{Time.now}" >> /var/log/ssh_lock]
  end
end

So every day, if an IP gets more than 5 incorrect login attempts, it gets added to /etc/hosts.deny for sshd.
I do it on a daily basis in case I'm having a bad day.
 

TheRyuu

Diamond Member
Dec 3, 2005
5,479
14
81
I do something similar, but just for ssh.

I have a line in /etc/pam.d/sshd that says
Code:
auth [default=ignore] pam_exec.so /usr/local/bin/ssh_lockout

/usr/local/bin/ssh_lockout looks like this:
Code:
#!/usr/local/bin/ruby

ip_format = /(\d+\.){3}\d+/
today = %x[date | awk '{printf "%s %s %s",$1,$2,$3}']
failed_ips = %x[lastb -i | grep "#{today}"].split(/\n/).collect{|line| line.split(/\s+/).select{|substr| substr =~ ip_format} rescue nil}.compact
last_failed_ip = %x[lastb -i -n 1].split(/\s+/).select{|ip| ip =~ ip_format}.first
if failed_ips.count(last_failed_ip) > 5
  if %x[grep #{last_failed_ip} /etc/hosts].empty?
     %x[echo "sshd : #{last_failed_ip} : deny" >> /etc/hosts.deny]
     %x[echo "#{last_failed_ip} has been blocked at #{Time.now}" >> /var/log/ssh_lock]
  end
end

So every day, if an IP gets more than 5 incorrect login attempts, it gets added to /etc/hosts.deny for sshd.
I do it on a daily basis in case I'm having a bad day.

Isn't this basically the same as doing:
Code:
sudo apt-get install fail2ban

Edit:
I may have written that without really reading (or thinking for that matter) so it may actually not be applicable to the thread (although it just might... ).
 
Last edited:

PCTC2

Diamond Member
Feb 18, 2007
3,892
33
91
Yeah, probably the same as fail2ban, but I just write my own scripts anyway.
 

LCTSI

Member
Aug 17, 2010
93
0
66
Clarkconnect is now ClearOS and very good.

I was really impressed by this. I ended up building my router from SL6, but ClearOS surprised me, and I was just testing 5.2.

I like that you have the GUI, but you can drop to a console and run "yum install nmap"
 

Alyx

Golden Member
Apr 28, 2007
1,181
0
0
I've used pfSense in a few environments, and also vote for it. And PCTC2, that script is pretty awesome. I'm going to play with it on my rails servers, and maybe tie it into Capistrano so I can push the ban list across all my hosts.
 
sale-70-410-exam    | Exam-200-125-pdf    | we-sale-70-410-exam    | hot-sale-70-410-exam    | Latest-exam-700-603-Dumps    | Dumps-98-363-exams-date    | Certs-200-125-date    | Dumps-300-075-exams-date    | hot-sale-book-C8010-726-book    | Hot-Sale-200-310-Exam    | Exam-Description-200-310-dumps?    | hot-sale-book-200-125-book    | Latest-Updated-300-209-Exam    | Dumps-210-260-exams-date    | Download-200-125-Exam-PDF    | Exam-Description-300-101-dumps    | Certs-300-101-date    | Hot-Sale-300-075-Exam    | Latest-exam-200-125-Dumps    | Exam-Description-200-125-dumps    | Latest-Updated-300-075-Exam    | hot-sale-book-210-260-book    | Dumps-200-901-exams-date    | Certs-200-901-date    | Latest-exam-1Z0-062-Dumps    | Hot-Sale-1Z0-062-Exam    | Certs-CSSLP-date    | 100%-Pass-70-383-Exams    | Latest-JN0-360-real-exam-questions    | 100%-Pass-4A0-100-Real-Exam-Questions    | Dumps-300-135-exams-date    | Passed-200-105-Tech-Exams    | Latest-Updated-200-310-Exam    | Download-300-070-Exam-PDF    | Hot-Sale-JN0-360-Exam    | 100%-Pass-JN0-360-Exams    | 100%-Pass-JN0-360-Real-Exam-Questions    | Dumps-JN0-360-exams-date    | Exam-Description-1Z0-876-dumps    | Latest-exam-1Z0-876-Dumps    | Dumps-HPE0-Y53-exams-date    | 2017-Latest-HPE0-Y53-Exam    | 100%-Pass-HPE0-Y53-Real-Exam-Questions    | Pass-4A0-100-Exam    | Latest-4A0-100-Questions    | Dumps-98-365-exams-date    | 2017-Latest-98-365-Exam    | 100%-Pass-VCS-254-Exams    | 2017-Latest-VCS-273-Exam    | Dumps-200-355-exams-date    | 2017-Latest-300-320-Exam    | Pass-300-101-Exam    | 100%-Pass-300-115-Exams    |
http://www.portvapes.co.uk/    | http://www.portvapes.co.uk/    |