USM Appliance Plugins List

Total Page:16

File Type:pdf, Size:1020Kb

USM Appliance Plugins List USM Appliance Plugins List The AT&T Alien Labs™ Security Research Team regularly updates the data source library to increase the extensibility of USM Appliance. These AlienApps enable your USM Appliance Sensor to process and analyze logs produced by your existing devices and applications. Note: This table shows the plugins that ship with USM Appliance as of April 13, 2021. List of Plugins Available in USM Appliance Plugin Name Plugin ID Vendor Enabled per Asset Linq2FA 1977 Innovative Solutions Yes a10-thunder-waf 1872 A10 Yes abas 1961 abas ERP Yes abs-scrooge-nxlog 2541 LimeSystems Yes accellion-kiteworks 1965 Accellion Yes actiontec 1764 Actiontec Yes adaudit-plus 1781 ManageEngine Yes aerohive-wap 1814 Aerohive Networks Yes aide 2528 AIDE Yes airlock 1641 Envault Yes airport-extreme 1805 Apple Yes aix-audit 1649 IBM Yes aladdin 1566 SafeNet Yes alcatel 1770 Alcatel Yes allot 1608 Allot Communications Yes alteonos 1684 Nortel Networks Yes amun-honeypot 1662 Amun Yes apache-ldap 1713 Apache Software Foundation Yes apache-syslog 1501 Apache Software Foundation Yes apache-tomcat 1816 Apache Software Foundation Yes USM Appliance Plugins List 1 List of Plugins Available in USM Appliance (Continued) Plugin Name Plugin ID Vendor Enabled per Asset apache 1501 Apache Software Foundation Yes aqtronix-webknight 1964 AQTRONiX Yes arista-switch 1820 Arista Yes arpalert-idm 50003 Arpalert Yes arpalert-syslog 1792 Arpalert Yes array-networks-sag 1906 Array Networks Yes artemisa 1668 Artemisa Yes artica 1775 Artica Yes artillery 1914 Binary Defense Yes aruba-6 1690 Aruba Networks Yes aruba-airwave 1784 Aruba Networks Yes aruba-clearpass 1789 Aruba Networks Yes aruba 1623 Aruba Networks Yes as400 1742 IBM Yes ascenlink 1660 Xtera Yes assp 1825 Anti-Spam SMTP Proxy Yes asterisk-voip 1736 Asterisk Yes asus-router 1855 AsusTek Yes av-nf-alert 1853 AlienVault Yes av-useractivity-syslog 1749 AlienVault Yes av-useractivity 1749 AlienVault No avast 1567 Avast Yes avaya-gateway 1881 Avaya Yes avaya-wireless 1896 Avaya Yes avaya 1774 Avaya Yes axigen-mail 1664 GeCAD Yes 2 USM Appliance Plugins List List of Plugins Available in USM Appliance (Continued) Plugin Name Plugin ID Vendor Enabled per Asset azure-atp 1982 Microsoft Yes barracuda-link-balancer 1734 Barracuda Yes barracuda-ng 1753 Barracuda Yes barracuda-spam 1709 Barracuda Yes barracuda-sslvpn 1835 Barracuda Yes barracuda-waf 1723 Barracuda Yes barracuda-webfilter 1719 Barracuda Yes baruwa 2534 Baruwa Yes bind 1577 ISC Yes bit9 1630 Carbon Black Yes bit9_v7 1696 Carbon Black Yes bitdefender-gravityzone 1991 Bitdefender Yes bitdefender-ntsa 2540 Bitdefender Yes blackboard-learn 1924 Blackboard Yes bluecoat-packetshaper 1943 Blue Coat Yes bluecoat 1642 Blue Coat Yes bomgar 1799 Bomgar Yes bro-ids 1568 Bro Yes brocade 1754 Brocade Yes bromium-vsentry 2512 Bromium Yes buffalo 1969 Buffalo Americas Yes canary-tools 1958 Canary Yes carbonblack-idm 50003 Carbon Black Yes carbonblack 1746 Carbon Black Yes cb-defense 1846 Carbon Black Yes cerberus-ftp 1797 Cerberus Yes USM Appliance Plugins List 3 List of Plugins Available in USM Appliance (Continued) Plugin Name Plugin ID Vendor Enabled per Asset checkpoint-mepp 1854 Check Point Yes cisco-3030 1657 Cisco Yes cisco-ace 1653 Cisco Yes cisco-acs-idm 50003 Cisco Yes cisco-acs 1594 Cisco Yes cisco-asa 1636 Cisco Yes cisco-asr 1670 Cisco Yes cisco-call 1768 Cisco Yes cisco-cube 1966 Cisco Yes cisco-cucm 1926 Cisco Yes cisco-esa 1752 Cisco Yes cisco-expressway 1998 Cisco Yes cisco-firepower 1782 Cisco Yes cisco-fw 1514 Cisco Yes cisco-ids 1515 Cisco Yes cisco-ips-syslog 1656 Cisco Yes cisco-ips 1597 Cisco Yes cisco-isa 1702 Cisco Yes cisco-ise 1725 Cisco Yes cisco-meraki 1695 Cisco Yes cisco-nexus-nx-os 1652 Cisco Yes cisco-ngips 1721 Cisco Yes cisco-pix 1514 Cisco Yes cisco-prime 1992 Cisco Yes cisco-router 1510 Cisco Yes cisco-rv 1868 Cisco Yes 4 USM Appliance Plugins List List of Plugins Available in USM Appliance (Continued) Plugin Name Plugin ID Vendor Enabled per Asset cisco-ucs 1793 Cisco Yes cisco-viptela 2500 Cisco Yes cisco-vpn 1527 Cisco Yes cisco-wlc 1663 Cisco Yes cisco-wsa 2535 Cisco Yes citrix-netscaler 1678 Citrix Systems Yes clamav 1555 ClamAV Yes clamwin-nxlog 1861 ClamWin Yes claroty-platform 1935 Claroty Yes clearswift 1930 Clearswift Yes cloudpassage 1729 CloudPassage Yes clurgmgr 1528 Red Hat Yes comodo-antivirus 1869 Comodo Yes contentkeeper-sig 1937 ContentKeeper Yes corero-ips 1804 Corero Yes correlog 1940 CorreLog Yes coslat-hotspot 2511 Coslat Security Systems Yes courier 1617 Courier-MTA Yes crowdstrike 1889 CrowdStrike Yes crushftp 1903 CrushFTP Yes cryptospot 1947 CRYPTTECH Yes cyberark 1791 CyberArk Yes cyberguard 1575 CyberGuard Yes cyberoam 1732 Sophos Yes cyberx-xsense 1990 CyberX Yes cylance 1744 Cylance Yes USM Appliance Plugins List 5 List of Plugins Available in USM Appliance (Continued) Plugin Name Plugin ID Vendor Enabled per Asset cyphort 1765 Cyphort Yes darktrace 1806 Darktrace Yes datto-siris 1890 Datto Yes ddi-frontline 1933 Digital Defense Incorporated Yes deepsec-agent 1862 Trend Micro Yes deepsec-manager 1720 Trend Micro Yes defender-tokengo 1865 Quest Software Yes dell-chassis 1786 Dell Yes dell-equallogic 1845 Dell Yes dell-force 1787 Dell Yes dell-idrac 1983 Dell Yes dell-secureworks 1801 Dell Yes dell-switch 1972 Dell Yes dell-xseries 2536 Dell Yes denyall-waf 1922 DenyAll Yes dhcp-nxlog 1584 Microsoft Yes dhcp 1584 Microsoft Yes digital-guardian 2518 Digital Guardian Yes dlink-des 1987 D-Link Yes dlink-firewall 1898 D-Link Yes dlink-wireless 1867 D-Link Yes dovecot 1648 Dovecot Yes dragon 1569 Enterasys Yes draytek-vigor 1842 DrayTek Yes drupal-wiki 1675 Drupal No dtex 1912 Dtex Systems (Pty) Ltd Yes 6 USM Appliance Plugins List List of Plugins Available in USM Appliance (Continued) Plugin Name Plugin ID Vendor Enabled per Asset duo-2fa 1981 Duo Yes eljefe 1634 Immunity No emc-datadomain 1963 Dell Yes emc-isilon 1819 Dell Yes emc-recoverpoint 1921 Dell Yes emc-vnxe 1818 Dell Yes emet 1794 Microsoft Yes enterasys-rmatrix 1622 Enterasys Yes eset 1706 Eset Yes exchange-nxlog 1603 Microsoft Yes exchange 1603 Microsoft Yes extrahop-reveal 2501 ExtraHop Yes extreme-nac-manager 1946 Extreme Networks Yes extreme-switch 1672 Extreme Networks Yes extreme-wireless 1673 Extreme Networks Yes f-secure 2529 F-secure Yes f5-firepass 1674 F5 Yes f5 1614 F5 Yes fail2ban 1971 Fail2ban Yes failsafe 1837 Damballa Yes falconstor 1831 FalconStor Software Yes fatpipe-mpvpn 1929 FatPipe Networks Yes fidelis 1592 IBM Yes fireeye-cm 1813 FireEye Yes fireeye-hx 1826 FireEye Yes fireeye 1707 FireEye Yes USM Appliance Plugins List 7 List of Plugins Available in USM Appliance (Continued) Plugin Name Plugin ID Vendor Enabled per Asset forcepoint-dlp 2515 Forcepoint Yes forcepoint-ngfw 2521 Forcepoint Yes forescout-nac 1874 ForeScout Yes fortiWLC 1822 Fortinet Yes fortiadc 2531 Fortinet Yes fortiauthenticator 1811 Fortinet Yes fortigate 1554 Fortinet Yes fortiguard 1621 Fortinet Yes fortimail 1692 Fortinet Yes fortinet-fortidb 2537 Fortinet Yes fortiproxy 2549 Fortinet Yes fortisandbox 2542 Fortinet Yes fortiweb 1698 Fortinet Yes freeipa 1886 FreeIPA Yes freeradius 1762 FreeRADIUS Yes fw1-alt 1590 Check Point Yes fw1-cef 1995 Check Point Yes gajproactive 2508 gajshield Yes gajshield-firewall 2525 Gajshield Yes geist-watchdog 2000 Geist Yes gfi 1530 GFI Yes glastopng 1667 Honeynet Project Yes gta-firewall 1882 Global Technology Associates Yes h3c-ap 1724 H3C Yes h3c-switch 1712 H3C Yes ha-proxy 1884 HAProxy Yes 8 USM Appliance Plugins List List of Plugins Available in USM Appliance (Continued) Plugin Name Plugin ID Vendor Enabled per Asset harpp-ddos 1852 HARPP Yes heartbeat 1523 Linux-HA Yes hitachi-hnas 1836 Hitachi Yes honeybot 1915 Atomic Software Solutions Yes honeyd 1570 Honeyd Yes hp-chassis 1870 HP Yes hp-eva 1579 HP Yes hp-msm-controller 1908 HP Yes hp-san-switch 1778 HP Yes hp-switch 1705 HP Yes hp-wireless 1708 HP Yes hpe-3par 1949 HPE Yes hpe-ilo 1932 HPE Yes hpe-nbx 2538 HPE Yes huawei-ips 1873 Huawei Yes huawei-router 1830 Huawei Yes huawei 1728 Huawei Yes hytrust-keycontrol 1941 HyTrust Yes ibm-imm 1860 IBM Yes ibm-infosphere-guardium 1939 IBM Yes ibm-tam 1838 IBM Yes ibm-websphere 1772 IBM Yes iboss 1927 IBoss Yes iis-nxlog 1502 Microsoft Yes iis 1502 Microsoft Yes illusive-honeypot 2526 Illusive Networks Yes USM Appliance Plugins List 9 List of Plugins Available in USM Appliance (Continued) Plugin Name Plugin ID Vendor Enabled per Asset imperva-securesphere 1679 Imperva Yes impravata-onesign 1758 Imprivata Yes incapsula 1777 Imperva Yes infoblox 1659 Infoblox Yes intrushield 1551 McAfee Yes ipfw 1529 FreeBSD Yes iprism 1779 Edgewave Yes iptables 1503 Suse Yes ironport 1591 Cisco Yes isa 1565 Microsoft Yes jboss 1848 Red Hat Yes juniper-ex 1759 Juniper Networks Yes juniper-idp 1693 Juniper Networks Yes juniper-mx 1700 Juniper Networks Yes juniper-nsm 1694 Juniper Networks Yes juniper-qfx 2539 Juniper Networks Yes juniper-srx 1626 Juniper Networks Yes juniper-vpn 1609 Juniper Networks Yes kaspersky-sc-db 1737 Kaspersky Yes kaspersky-sc 1737 Kaspersky Yes kaspersky 1733 Kaspersky Yes kemp 1755 Kemp Technologies Yes kerio-connect 1913 Kerio Technologies Yes kismet 1596 Kismet Yes linux-usergroupadd 1931 Linux Yes linuxdhcp-idm 50003 Linux No 10 USM Appliance Plugins List List of Plugins Available in USM Appliance (Continued) Plugin Name Plugin ID Vendor Enabled per Asset linuxdhcp 1607 Linux Yes locum-realtime-monitor 2519 Locum Yes logbinder-sp 1714 LOGbinder Yes lucent-brick 1588 Lucent Yes m0n0wall 1559 M0n0wall
Recommended publications
  • Campus Networking Best Practices Session 5: Wireless
    Campus Networking Best Practices Session 5: Wireless LAN Hervey Allen Dale Smith NSRC & University of Oregon University of Oregon & NSRC [email protected] [email protected] Wireless LAN • Provide wireless network across your campus that has the following characteristics: – Authentication – only allow your users – Roaming – allow users to start up in one section of your network, then move to another location – Runs on your campus network Firewall/ Border Traffic Shaper Router Wireless REN switch Authentication Core Gateway Router Core Servers Network Access Control (NAC) Enterprise Identity Management • Processes and Documentation of users. – Now you must deal with this. – What to use as the back-end user store? • LDAP • Active Directory • Kerberos • Other? – Will this play nice with future use? • email, student/staff information, resource access, ... Identity Management Cont. • An example of such a project can be seen here: – http://ccadmin.uoregon.edu/idm/ • This is a retrofit on to an already retrofitted system. • Learn from others and try to avoid this situation if possible. A Wireless Captive Portal The Wireless Captive Portal • Previous example was very simple. • A Captive Portal is your chance to: – Explain your Acceptable Use Policies – Decide if you must authenticate, or – Allow users on your network and monitor for problems instead (alternate solution). – Anything else? Branding? What's Happening? • remember our initial network diagrams...? • Do you think our hotel built their own solution? • Probably not... Commercial Solutions • Aruba http://www.arubanetworks.com/ • Bradford Networks – http://www.bradfordnetworks.com/ • Cisco NAC Appliance (Clean Access) – http://www.cisco.com/en/US/products/ps6128/ • Cisco Wireless LAN Controllers – http://www.cisco.com/en/US/products/hw/wireless/ • Enterasys http://www.enterasys.com/ • Vernier http://www.verniernetworks.com Open Source Solutions • CoovaChilli (morphed from Chillispot) – http://coova.org/wiki/index.php/CoovaChilli – Uses RADIUS for access and accounting.
    [Show full text]
  • Iptables with Shorewall!
    Iptables with shorewall! Table of Contents 1. Install swarmlab-sec (Home PC) . 1 2. shorewall . 1 2.1. Installation . 2 3. Basic Two-Interface Firewall. 2 4. Shorewall Concepts . 3 4.1. zones — Shorewall zone declaration file . 3 4.2. interfaces — Shorewall interfaces file. 4 4.3. policy — Shorewall policy file . 4 4.4. rules — Shorewall rules file . 4 4.5. Compile then Execute . 4 5. Three-Interface Firewall. 5 5.1. zones . 6 5.2. interfaces . 6 5.3. policy . 7 5.4. rules . 7 5.5. masq - Shorewall Masquerade/SNAT definition file . 7 5.6. snat — Shorewall SNAT/Masquerade definition file . 8 5.7. Compile and Execute . 8 1. Install swarmlab-sec (Home PC) HowTo: See http://docs.swarmlab.io/lab/sec/sec.adoc.html NOTE Assuming you’re already logged in 2. shorewall Shorewall is an open source firewall tool for Linux that builds upon the Netfilter (iptables/ipchains) system built into the Linux kernel, making it easier to manage more complex configuration schemes by providing a higher level of abstraction for describing rules using text files. More: wikipedia 1 NOTE Our docker instances have only one nic to add more nic’s: create netowrk frist docker network create --driver=bridge --subnet=192.168.0.0/16 net1 docker network create --driver=bridge --subnet=192.168.0.0/16 net2 docker network create --driver=bridge --subnet=192.168.0.0/16 net3 then connect network to container connect network created to container docker network connect net1 master docker network connect net1 worker1 docker network connect net2 master docker network connect net2 worker2 now let’s look at the following image 2.1.
    [Show full text]
  • Sentry Firewall CD HOWTO Sentry Firewall CD HOWTO Table of Contents
    Sentry Firewall CD HOWTO Sentry Firewall CD HOWTO Table of Contents Sentry Firewall CD HOWTO............................................................................................................................1 Stephen A. Zarkos, Obsid@Sentry.net....................................................................................................1 1. Introduction..........................................................................................................................................1 2. How the CD Works (Overview)..........................................................................................................1 3. Obtaining the CDROM........................................................................................................................1 4. Using the Sentry Firewall CDROM.....................................................................................................1 5. Overview of Available Configuration Directives................................................................................1 6. Setting Up a Firewall...........................................................................................................................2 7. Troubleshooting...................................................................................................................................2 8. Building a Custom Sentry CD.............................................................................................................2 9. More About the Sentry Firewall Project..............................................................................................2
    [Show full text]
  • 9 Caching Proxy Server
    webXaccelerator: Owner's Guide by Luis Soltero, Ph.D., MCS Revision 1.06 February 10, 2010 (v1.2.3.10-RELEASE) Copyright © 2010 Global Marine Networks, LLC Table of Contents 1 Quick Start..............................................................................................................................................5 2 Introduction.............................................................................................................................................8 3 Initial Installation and Configuration......................................................................................................9 3.1 Connections.....................................................................................................................................9 3.2 Power-up..........................................................................................................................................9 3.3 Power-down...................................................................................................................................10 3.4 Web Administrator........................................................................................................................10 3.5 LAN Setup.....................................................................................................................................10 3.6 WAN Setup....................................................................................................................................11 3.7 WAN2 (Backup WAN) Setup........................................................................................................13
    [Show full text]
  • Linux Networking Cookbook.Pdf
    Linux Networking Cookbook ™ Carla Schroder Beijing • Cambridge • Farnham • Köln • Paris • Sebastopol • Taipei • Tokyo Linux Networking Cookbook™ by Carla Schroder Copyright © 2008 O’Reilly Media, Inc. All rights reserved. Printed in the United States of America. Published by O’Reilly Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472. O’Reilly books may be purchased for educational, business, or sales promotional use. Online editions are also available for most titles (safari.oreilly.com). For more information, contact our corporate/institutional sales department: (800) 998-9938 or [email protected]. Editor: Mike Loukides Indexer: John Bickelhaupt Production Editor: Sumita Mukherji Cover Designer: Karen Montgomery Copyeditor: Derek Di Matteo Interior Designer: David Futato Proofreader: Sumita Mukherji Illustrator: Jessamyn Read Printing History: November 2007: First Edition. Nutshell Handbook, the Nutshell Handbook logo, and the O’Reilly logo are registered trademarks of O’Reilly Media, Inc. The Cookbook series designations, Linux Networking Cookbook, the image of a female blacksmith, and related trade dress are trademarks of O’Reilly Media, Inc. Java™ is a trademark of Sun Microsystems, Inc. .NET is a registered trademark of Microsoft Corporation. Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and O’Reilly Media, Inc. was aware of a trademark claim, the designations have been printed in caps or initial caps. While every precaution has been taken in the preparation of this book, the publisher and author assume no responsibility for errors or omissions, or for damages resulting from the use of the information contained herein.
    [Show full text]
  • Ubuntu Server Guide Ubuntu Server Guide Copyright © 2010 Canonical Ltd
    Ubuntu Server Guide Ubuntu Server Guide Copyright © 2010 Canonical Ltd. and members of the Ubuntu Documentation Project3 Abstract Welcome to the Ubuntu Server Guide! It contains information on how to install and configure various server applications on your Ubuntu system to fit your needs. It is a step-by-step, task-oriented guide for configuring and customizing your system. Credits and License This document is maintained by the Ubuntu documentation team (https://wiki.ubuntu.com/DocumentationTeam). For a list of contributors, see the contributors page1 This document is made available under the Creative Commons ShareAlike 2.5 License (CC-BY-SA). You are free to modify, extend, and improve the Ubuntu documentation source code under the terms of this license. All derivative works must be released under this license. This documentation is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE AS DESCRIBED IN THE DISCLAIMER. A copy of the license is available here: Creative Commons ShareAlike License2. 3 https://launchpad.net/~ubuntu-core-doc 1 ../../libs/C/contributors.xml 2 /usr/share/ubuntu-docs/libs/C/ccbysa.xml Table of Contents 1. Introduction ........................................................................................................................... 1 1. Support .......................................................................................................................... 2 2. Installation ............................................................................................................................
    [Show full text]
  • Papers/Openwrt on the Belkin F5D7230-4.Pdf
    WHITE PAPER OpenWRT on the Belkin F5D7230-4 Understanding the Belkin extended firmware for OpenWRT development White Paper OpenWRT on the Belkin F5D7230-4 Understanding the Belkin extended firmware for OpenWRT development CONTROL PAGE Document Approvals Approved for Publication: Author Name: Ian Latter 7 November 2004 Document Control Document Name: OpenWRT on the Belkin F5D7230-4; Understanding the Belkin extended firmware for OpenWRT development Document ID: openwrt on the belkin f5d7230-4.doc-Release-0.4(31) Distribution: Unrestricted Distribution Status: Release Disk File: C:\papers\OpenWRT on the Belkin F5D7230-4.doc Copyright: Copyright 2004, Ian Latter Version Date Release Information Author/s 0.4 07-Nov-04 Release / Unrestricted Distribution Ian Latter 0.3 26-Oct-04 Release / Unrestricted Distribution Ian Latter 0.2 24-Oct-04 Release / Unrestricted Distribution Ian Latter Distribution Version Release to 0.4 MidnightCode.org (correction of one grammatical error) 0.3 MidnightCode.org (correction of two minor errors) 0.2 MidnightCode.org Unrestricted Distribution Copyright 2004, Ian Latter Page 2 of 38 White Paper OpenWRT on the Belkin F5D7230-4 Understanding the Belkin extended firmware for OpenWRT development Table of Contents 1 OVERVIEW..................................................................................................................................4 1.1 IN BRIEF .................................................................................................................................4 1.2 HISTORY ................................................................................................................................4
    [Show full text]
  • Taxonomy of WRT54G(S) Hardware and Custom Firmware
    Edith Cowan University Research Online ECU Publications Pre. 2011 2005 Taxonomy of WRT54G(S) Hardware and Custom Firmware Marwan Al-Zarouni Edith Cowan University Follow this and additional works at: https://ro.ecu.edu.au/ecuworks Part of the Computer Sciences Commons Al-Zarouni, M. (2005). Taxonomy of WRT54G(S) hardware and custom firmware. In Proceedings of 3rd Australian Information Security Management Conference (pp. 1-10). Edith Cowan University. Available here This Conference Proceeding is posted at Research Online. https://ro.ecu.edu.au/ecuworks/2946 Taxonomy of WRT54G(S) Hardware and Custom Firmware Marwan Al-Zarouni School of Computer and Information Science Edith Cowan University E-mail: [email protected] Abstract This paper discusses the different versions of hardware and firmware currently available for the Linksys WRT54G and WRT54GS router models. It covers the advantages, disadvantages, and compatibility issues of each one of them. The paper goes further to compare firmware added features and associated filesystems and then discusses firmware installation precautions and ways to recover from a failed install. Keywords WRT54G, Embedded Linux, Wireless Routers, Custom Firmware, Wireless Networking, Firmware Hacking. BACKGROUND INFORMATION The WRT54G is a 802.11g router that combines the functionality of three different network devices; it can serve as a wireless Access Point (AP), a four-port full-duplex 10/100 switch, and a router that ties it all together (ProductReview, 2005). The WRT54G firmware was based on embedded Linux which is open source. This led to the creation of several sites and discussion forums that were dedicated to the router which in turn led to the creation of several variants of its firmware.
    [Show full text]
  • Configuracion De Un Servidor Proxy Para Filtrado De Contenidos Web En Ubuntu Linux
    Configuracion de un Servidor Proxy para Filtrado de Contenidos Web en Ubuntu Linux ¿Qué es un Proxy? «Proxy» tiene un significado muy general y al mismo tiempo ambiguo, sinónimo del concepto de «Intermediario». Se suele traducir como delegado o apoderado. Un Servidor Intermediario (Proxy) se define como una computadora o dispositivo que ofrece un servicio de red que consiste en permitir a los clientes realizar conexiones de red indirectas hacia otros servicios de red. Durante el proceso ocurre lo siguiente: -Cliente se conecta hacia un Servidor Intermediario (Proxy). -Cliente solicita una conexión, fichero u otro recurso disponible en un servidor distinto. -Servidor Intermediario (Proxy) proporciona el recurso ya sea conectándose hacia el servidor especificado o sirviendo éste desde un caché. -En algunos casos el Servidor Intermediario (Proxy) puede alterar la solicitud del cliente o bien la respuesta del servidor para diversos propósitos. Los Servidores Intermediarios (Proxies) generalmente se hacen trabajar simultáneamente como muro cortafuegos operando en el Nivel de Red, actuando como filtro de paquetes, como en el caso de IPTABLES, o bien operando en el Nivel de Aplicación, controlando diversos servicios, como es el caso de TCP Wrapper. Dependiendo del contexto, el muro cortafuegos también se conoce como BPD o Border Protection Device o simplemente filtro de paquetes. Tipos de Proxy ● Proxy de web / Proxy cache de web ● Proxies transparentes ● Reverse Proxy ● Proxy NAT (Network Address Translation) / Enmascaramiento ● Proxy Abierto ¿Que es Squid? Squid es un programa de software libre que implementa un servidor proxy y un demonio para caché de páginas web. Está especialmente diseñado para ejecutarse bajo entornos tipo Unix.
    [Show full text]
  • Introducción a Linux Equivalencias Windows En Linux Ivalencias
    No has iniciado sesión Discusión Contribuciones Crear una cuenta Acceder Página discusión Leer Editar Ver historial Buscar Introducción a Linux Equivalencias Windows en Linux Portada < Introducción a Linux Categorías de libros Equivalencias Windows en GNU/Linux es una lista de equivalencias, reemplazos y software Cam bios recientes Libro aleatorio análogo a Windows en GNU/Linux y viceversa. Ayuda Contenido [ocultar] Donaciones 1 Algunas diferencias entre los programas para Windows y GNU/Linux Comunidad 2 Redes y Conectividad Café 3 Trabajando con archivos Portal de la comunidad 4 Software de escritorio Subproyectos 5 Multimedia Recetario 5.1 Audio y reproductores de CD Wikichicos 5.2 Gráficos 5.3 Video y otros Imprimir/exportar 6 Ofimática/negocios Crear un libro 7 Juegos Descargar como PDF Versión para im primir 8 Programación y Desarrollo 9 Software para Servidores Herramientas 10 Científicos y Prog s Especiales 11 Otros Cambios relacionados 12 Enlaces externos Subir archivo 12.1 Notas Páginas especiales Enlace permanente Información de la Algunas diferencias entre los programas para Windows y y página Enlace corto GNU/Linux [ editar ] Citar esta página La mayoría de los programas de Windows son hechos con el principio de "Todo en uno" (cada Idiomas desarrollador agrega todo a su producto). De la misma forma, a este principio le llaman el Añadir enlaces "Estilo-Windows". Redes y Conectividad [ editar ] Descripción del programa, Windows GNU/Linux tareas ejecutadas Firefox (Iceweasel) Opera [NL] Internet Explorer Konqueror Netscape /
    [Show full text]
  • Securing Debian Manual
    Securing Debian Manual Javier Fernández-Sanguino Peña <[email protected]> ‘Authors’ on this page Version: 3.13, Sun, 30 Jan 2011 19:58:16 +0000 Abstract This document describes security in the Debian project and in the Debian operating system. Starting with the process of securing and hardening the default Debian GNU/Linux distribu- tion installation, it also covers some of the common tasks to set up a secure network environ- ment using Debian GNU/Linux, gives additional information on the security tools available and talks about how security is enforced in Debian by the security and audit team. Copyright Notice Copyright © 2002-2007 Javier Fernández-Sanguino Peña Copyright © 2001 Alexander Reelsen, Javier Fernández-Sanguino Peña Copyright © 2000 Alexander Reelsen Some sections are copyright © their respective authors, for details please refer to ‘Credits and thanks!’ on page 28. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU General Public License, Version 2 (http://www.gnu.org/licenses/ old-licenses/gpl-2.0.html) or any later version (http://www.gnu.org/copyleft/ gpl.html) published by the Free Software Foundation. It is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY. Permission is granted to make and distribute verbatim copies of this document provided the copyright notice and this permission notice are preserved on all copies. Permission is granted to copy and distribute modified versions of this document under the conditions for verbatim copying, provided that the entire resulting derived work is distributed under the terms of a permission notice identical to this one.
    [Show full text]
  • Inferring Higher Level Policies from Firewall Rules ∗
    Inferring Higher Level Policies from Firewall Rules ∗ Alok Tongaonkar, Niranjan Inamdar, and R. Sekar Department of Computer Science, Stony Brook University. falok, ninamdar, [email protected] June 5, 2008 Abstract Packet filtering firewall is one of the most important mechanisms used by corporations to enforce their security policy. Recent years have seen a lot of research in the area of firewall management. Typically, firewalls use a large number of low-level filtering rules which are configured using vendor-specific tools. System administrators start off by writing rules which implement the security policy of the organization. They add/delete/change order of rules as the requirements change. For example, when a new machine is added to the network, new rules might be added to the firewall to enable certain services to/from that machine. Making such changes to the low-level rules is complicated by the fact that the effect of a rule is dependent on its priority (usually determined by the position of the rule in the rule set). As the size and complexity of a rule set increase, it becomes difficult to understand the impact of a rule on the rule set. This makes management of rule sets more error prone. This is a very serious problem as errors in firewall configuration mean that the desired security policy is not enforced. Previous research in this area has focused on either building tools that generate low-level firewall rules from a given security policy or finding anomalies in the rules, i.e., verifying that the rules implement the given security pol- icy correctly.
    [Show full text]