Building A Stealth Firewall

Posted by aweber on Jun 26, 2009 8:54 AM EDT
BeginLinux.com; By Mike Weber
Mail this story
Print this story

Stealth has an advantage of gaining access undetected. A stealth firewall provides a way to gain access to filtering Internet traffic from a position of stealth. A bridge provides stealth because it does not use an IP Address to function but rather operates at the Layer 2 of the OSI model meaning that without an IP Address the firewall is unaccessible and hidden from all would be attackers. This course will show you how to build a stealth firewall that you can drop in anywhere on your network to protect some aspect of the network.

Full Story

  Nav
» Read more about: Story Type: Tutorial; Groups: Linux

« Return to the newswire homepage

This topic does not have any threads posted yet!

You cannot post until you login.