Here is the site created by the author of IPCHAINS. 
http://www.linux-firewall-tools.com/linux
 
He even has a simple macro to build your own rule set.  I also recommend getting his book "Linux Firewalls" By Robert L. Zieger.  Its published by New Riders.
 
Welcome to the dark side of the force Luke!
 

Bob Johnston
Datajockeys, Customer Support
[EMAIL PROTECTED]
http://www.datajockeys.net

-----Original Message-----
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of Justin Strittmatter
Sent: Thursday, January 27, 2000 09:39
To: Merton Campbell Crockett
Cc: Dave Laird; [EMAIL PROTECTED]
Subject: Re: LINUX Vs NT

A little off the subject but I was wondering if there was an ipchains quick reference card out there at all that i can download from somewhere

Merton Campbell Crockett wrote:

On Thu, 27 Jan 2000, Dave Laird wrote:

> Good morning,
>
> ----- Original Message -----
> From: MUDLA MADA <[EMAIL PROTECTED]>
> To: <[EMAIL PROTECTED]>
> Sent: Thursday, January 27, 2000 6:02 AM
> Subject: LINUX Vs NT
>
>
> >
> > A little of topic i no but does anyone have any comments or problems
> with either of the above >mentioned os's
>
> > As my current project require a secure system and I think linux is
> best
> > if correctly configured but some say NT
> >
> > Any takers
>
> What a lovely can of worms you have there. 8-)

And, some prefer BSD/OS.

> I do know that the super-spooks of this industry, the Department of
> Defense, once rested their entire case on NT, but in recent years have
> put nearly their entire array of NT servers behind Linux boxes running
> either secure shell <ssh> or tcpd wrappers using highly-customized
> kernel adaptations. This endeavor, done at the Bremerton naval
> facilities in Bremerton, Washington.

This is, perhaps, a distinct approach for the Bremerton Naval Facility.
The approach to security in DoD is extremely varied ranging from locations
that simply do not satisfy the basic DoD InfoSEC directives to those that
are fully-compliant with all DoD InfoSEC directives and the extensions
that are applicable to their branch of the armed services.

A lot depends on the general sensitivity of the information available at
the location or the classification level of the activities of the major
tenant of the location.  Locations with tenants involved in the DoDIIS
Community tend to be more secure than other locations and tend to use
Unix-based solutions rather than Linux or NT -based solutions.

What I consider to be one of the more secure Naval facilities uses BSD/OS
systems to implement their network and information security policies.  I'm
biased.  I am the architect of the solution and until relatively recently
have worked exclusively in the DoDIIS Community.

Merton Campbell Crockett

-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Robert Johnston.vcf

Reply via email to