From the course: Complete Guide to Open Source Security
Unlock the full course today
Join today to access over 24,800 courses taught by industry experts.
The basics of firewall operation
From the course: Complete Guide to Open Source Security
The basics of firewall operation
- [Instructor] While many of today's breaches result from malware being delivered through web browsing and email accounts, direct penetration through hacking is still a significant issue. A key control to prevent this is the use of perimeter firewalls. These come in two forms, host firewalls on endpoint devices, such as Windows 11 Defender, and network firewalls, which are used to segregate the network into subnets. While their situation is different, they do operate in essentially the same way. A firewall, in its simplest form, is designed to mediate access between computers in different zones. Typical examples, being an internet user browsing the internet. Browsing to an internal intranet web server and accessing a file server. And an external user accessing a public web server, but being denied access to our internal file server and workstations. To do this, a firewall has a set of rules which instructs it to either allow or deny traffic to flow between the internal and external…
Contents
-
-
-
-
-
-
(Locked)
A survey of open source firewalls3m 6s
-
(Locked)
The basics of firewall operation1m 54s
-
(Locked)
Installing pfSense5m 6s
-
Accessing the DMZ via pfSense5m 29s
-
(Locked)
Installing the IPFire firewall5m 17s
-
(Locked)
Up and running with IPFire2m 29s
-
(Locked)
Installing NethSecurity7m 28s
-
(Locked)
Configuring the zones3m 32s
-
(Locked)
Configuring the NethSecurity lab2m 32s
-
(Locked)
Opening up the file server3m 57s
-
(Locked)
Activating the LAN DHCP1m 30s
-
(Locked)
-
-
-
-
-
-
-
-
-
-