Creating a Virtualized Gateway and Routing Your Traffic Through It Peter Mceldowney

Total Page:16

File Type:pdf, Size:1020Kb

Creating a Virtualized Gateway and Routing Your Traffic Through It Peter Mceldowney Creating a Virtualized Gateway and Routing your traffic through it Peter McEldowney Needed: Basic Networking Understanding A software based firewall (such as Endian, Pfsense, Smoothwall, Untangle, IPcop, etc) Hyper-V (or equivalent hypervisor) [This means a Virtualization compatible CPU] 2 NICs [3 if you want a separate DMZ with Endian Firewall (EFW)] 1. Draw a quick diagram of how you want to organize your network. This will help you understand the flow of traffic in your network and will also simplify future troubleshooting. Example: In your diagram, be sure to label your inside and outside interfaces Inside (Private IP scheme , NAT local) Outside (Public IP scheme , NAT global) Green Red Take note that you are not assigning any IP addresses on the physical machine; it is only a vessel for the virtual machine. This means that hardening the network adapter of the physical machine would be a good idea (covered in step 7). 2. Download the Firewall of your choice. Many trials are available online but if you want a fully functional firewall that will not expire, go open source. This lab demonstrates setting up Endian FireWall (EFW), available here: http://www.endian.com/us/community/ In a production environment, many corporations will opt to go with a paid firewall (or firewall specialist) to ensure that product support is available. Open source is an excellent versatile learning experience. 3. [OPTIONAL ] Installing Hyper-V through Powershell Virtualization must be enabled in your BIOS for this part. This can be done through the GUI and is self-explanatory when doing so. To install Hyper-V through Powershell, open an elevated powershell terminal on use the servermanager module to add the Hyper-V role and the management tools. Another cool feature of Powershell is the get-help cmdlet. Feel free to explore with it. As well, check out the get-windowsfeature to view currently installed and available roles. Since I already had Hyper-V installed, it says that there is no restart needed. This is never the case when installing Hyper-V as it must make changes to system files currently in use. 4. Create your Virtual Machine. Native support for Hyper- V is included with the Microsoft Windows Server environment as a role and also Windows 8, which also provides the ability to boot from a VHD (Virtual Hard Disk). New Virtual Machine… (Creating a New Hard Disk and then using it for your Virtual Machine gives you a higher degree of configurability). When creating your Virtual Machine, do not connect it to any network adaptors yet. This needs to be done separately for this part to ensure Linux compatibility with your VM 5. Create your Virtual Switches through the Virtual Switch Manager… In the Virtual Switch Manager, you will need to create 2 Virtual Switches (vSwitch). They are both configured exactly the same. You will want to create External switches. Create another External vSwitch for your other adapter, name it appropriately, and apply the settings. [NOTE: For a DMZ, you will need to create 3 Virtual Switches] 6. Go into your VM settings and change the following: a. Add the ISO for the Firewall you chose. b. Add 2 Legacy Network Adapters [3 for a DMZ] [The next step is optional but recommended. This will minimize the possibility of unused protocols being used maliciously.] 7. To harden your network adapters, run ncpa.cpl (Network Control Panel Applet). This should bring up your network adapters and virtual switches that were previously created. Right click on the actual Network Adapter and go into the properties (not the vEthernet adapters) (you will be doing this for however many virtual switches that you have). Disable all Protocols except for the Hyper-V Extensible Virtual Switch . Only having the Hyper-V protocol enabled means that only traffic from hyper-v will be able to traverse this link. This disallows any traffic that is originated from other machines using this protocol to enumerate information about this virtual switch For more information about the disabled protocol, check out this article from TechRepublic: http://www.techrepublic.com/blog/networ king/what-do-the-new-windows- networking-protocols-do/2342 Do this for your other network adapter(s) as well. 8. Start your VM and begin your Firewall installation. The screen will guide you through the installation. Setup will prompt you for GREEN adapter IP addresses. This is where your initial diagram comes in use. This is the default gateway for your DHCP server (or static addressing). Setup will then prompt to remove the disk from the drive, accessed from the Media menu. Your firewall is now installed. You may want to set your passwords to access the web GUI. Access the GUI through the IP address now listed on the screen. In my case, it is http://10.10.10.1:10443 9. From your web interface, you can now begin configuring your firewall. The first thing you are going to want to do is configure your Network. For most connections, you will want ETHERNET STATIC or ETHERNET DHCP (i.e. connection to a modem) On the next screen, you can select DMZ zone or WIFI zone. WIFI is only available in the paid version. On the next screen, you will be prompted to configure you GREEN interface. You can check the MAC addresses of your virtual adapters in your VM Settings. Note: You can configure multiple IP addresses for your Interfaces. On the next screen, configure your RED interface. Make sure that you use the proper Gateway address for your RED interface or your internet will not work. After you have configured your interfaces, you can enter the DNS settings of your choice. Apply your settings and your gateway should be able to function properly if settings are correct. 10. Your last step is to configure DHCP on your virtual network. This can be done by through the Services menu. Once this is complete, you have a fully functioning network routed through a firewall. Explore settings, configure NAT, and check your logs. .
Recommended publications
  • The Pfsense Book Release
    The pfSense Book Release The pfSense Team May 10, 2017 CONTENTS 1 Preface 1 1.1 Acknowledgements...........................................1 1.2 Feedback.................................................3 1.3 Typographic Conventions........................................3 1.4 Authors..................................................4 2 Foreword 7 3 Introduction 9 3.1 What does pfSense stand for/mean?...................................9 3.2 Why FreeBSD?..............................................9 3.3 Common Deployments.......................................... 10 3.4 Interface Naming Terminology..................................... 11 3.5 Finding Information and Getting Help.................................. 12 3.6 Project Inception............................................. 13 4 Networking Concepts 15 4.1 Understanding Public and Private IP Addresses............................. 15 4.2 IP Subnetting Concepts......................................... 16 4.3 IP Address, Subnet and Gateway Configuration............................. 16 4.4 Understanding CIDR Subnet Mask Notation.............................. 17 4.5 CIDR Summarization.......................................... 18 4.6 Broadcast Domains............................................ 19 4.7 IPv6.................................................... 19 4.8 Brief introduction to OSI Model Layers................................. 32 5 Hardware 33 5.1 Minimum Hardware Requirements................................... 33 5.2 Hardware Selection........................................... 33
    [Show full text]
  • PC-BSD 9 Turns a New Page
    CONTENTS Dear Readers, Here is the November issue. We are happy that we didn’t make you wait for it as long as for October one. Thanks to contributors and supporters we are back and ready to give you some usefull piece of knowledge. We hope you will Editor in Chief: Patrycja Przybyłowicz enjoy it as much as we did by creating the magazine. [email protected] The opening text will tell you What’s New in BSD world. It’s a review of PC-BSD 9 by Mark VonFange. Good reading, Contributing: especially for PC-BSD users. Next in section Get Started you Mark VonFange, Toby Richards, Kris Moore, Lars R. Noldan, will �nd a great piece for novice – A Beginner’s Guide To PF Rob Somerville, Erwin Kooi, Paul McMath, Bill Harris, Jeroen van Nieuwenhuizen by Toby Richards. In Developers Corner Kris Moore will teach you how to set up and maintain your own repository on a Proofreaders: FreeBSD system. It’s a must read for eager learners. Tristan Karstens, Barry Grumbine, Zander Hill, The How To section in this issue is for those who enjoy Christopher J. Umina experimenting. Speed Daemons by Lars R Noldan is a very good and practical text. By reading it you can learn Special Thanks: how to build a highly available web application server Denise Ebery with advanced networking mechanisms in FreeBSD. The Art Director: following article is the �nal one of our GIS series. The author Ireneusz Pogroszewski will explain how to successfully manage and commission a DTP: complex GIS project.
    [Show full text]
  • MNHO-068 DATASHEET Intel® J1900 4 LAN 1 COM Wifi 4G Firewall Router Mini Server
    MNHO-068 DATASHEET Intel® J1900 4 LAN 1 COM WiFi 4G Firewall Router Mini Server https://www.pondesk.com/product/MNHO-068 Features ● Small Security Gateway, Firewall Router, Mini Server ● Intel® Celeron® J1900 Quad Core Processor ● 4 Threads, 2M Cache, up to 2.42 GHz ● Four Intel 82574L Gigabit Ethernet ● Support Network wake-up/PXE ● RJ45-DB9 COM (Cisco Standard) ● Support WiFi, 3G/4G WWAN Networks (optional) ● Watchdog (L256, 0~255 seconds) ● Support up to 8GB DDR3L Memory ● Support Dual Storage (mSATA SSD & 2.5" SATA SSD/HDD) ● VGA Display, USB 2.0 ● Intel® HD Graphics ● Energy Efficient 10W (idle) Low Power Consumption ● Ready for IoT - Simply Connected Using 3G/4G LTE via Mini PCIe ● Support Windows/Linux/Unix/MikroTik/Firewalls etc. ● Can be configured as a Firewall, LAN/WAN Router, VPN, DNS Server, DHCP Server ● Perfect for Security Gateway, Server, VPN and Firewall such as pfSense, Untangle, ● Sophos, Smoothwall, ClearOS, m0n0wall etc. Specifications Dimensions Processor Advanced Technologies Intel® Celeron® Processor J1900 Intel® Virtualization Technology (VT-x) 4 Core, 4 Threads Intel® 64 2M Cache, up to 2.42 GHz Enhanced Intel SpeedStep® Technology Memory Onboard I/O Support up to 8GB 1 x JVGA1 (2*12pin) W DDR3L SODIMM 1.35V Low Voltage 1 x SYS FAN (1*3pin) Single Sided non-ECC Memory 1 x CPU FAN (1*4pin) One Memory Slot 1 x ATX_4P +12V 1 x COM (2*5pin) Storage 1 x SATA2.0 Support 1 x mSATA SSD 1 x JLAN_LED (2*8pin) L H Support 1 x 2.5" SATA SSD/HDD 1 x Full height mini PCIe (For WiFi & 3G module) LAN 1 x mSATA (For SSD) 197mm
    [Show full text]
  • Endian UTM Virtual Appliance
    Secure everyThing www.endian.com Endian UTM Virtual Appliance Endian UTM Virtual Appliance Prebuilt VMware appliance Support für Xen und Prebuilt Microsoft Hyper-V Support für RedHat für ESX or ESXi Citrix XenServer appliance KVM hypervisor Endian UTM Virtual Appliance: Sichern und schützen Sie Ihre virtuelle Infrastruktur Ob Sie Ihre interne virtuelle Geschäftsumgebung absichern, eine erstklassige Hosting- oder Housing-Einrichtung betrei- ben oder Cloud-Services anbieten möchten – die Endian UTM Virtual Appliance bietet Ihnen überlegene Netzwerksicher- heit, um Ihre virtuelle Infrastruktur vor möglichen Bedrohungen zu schützen. Einfach und Effektiv Mit einfachen und effektiven Netzwerksicherheitslösungen unterstützt Endian Unternehmen dabei, virtuelle und Cloud-Technologien sicher einzusetzen. Endian UTM Virtual Appliance: • Sichert die gesamte virtuelle Infrastruktur (intern und extern) • Integriert sich nahtlos in vorhandene virtuelle Plattformen sowie Management-Tools (Invesitionsschutz) • Zeit- und Aufwandsersparnis (d. h. Kosten) mit Endians zentralen Management- und Support-Tools • Sichere Anbindung der gesamten virtuellen oder gehosteten Infrastruktur an Ihren Standort durch VPN • Überwachung und Verhinderung des Zugangs auf und von virtuellen Systemen nach bzw. von außen • Schutz aller - inter-virtuellen, internen und externen Netzwerkverbindungen All diese Ziele und noch mehr erreichen Sie mit der Endian UTM Virtual Appliance. Endian - Vorteile Die Endian UTM Virtual Applaince bietet eine intuitive Sicherheitslösung die die wichtigsten Hypervisor unterstützt. Sie bietet unter anderem: • Unterstützung die virtuellen Umgebungen VMware, Xen, Hyper-V und KVM • Einheitliche und intuitive Benutzer-Oberfläche, einheitlich über alle Plattformen – Hardware, Software und virtuell • Extrem effizienter und skalierbarer Ressourcen-Bedarf • Volle Unterstützung für verfügbare virtuelle Infrastruktur Werkzeuge Zusätzlich können Sie die umfangreichen Funktionen nutzen, welche in allen Produkten der Endian UTM Familie integriert sind.
    [Show full text]
  • Kratka Povijest Unixa Od Unicsa Do Freebsda I Linuxa
    Kratka povijest UNIXa Od UNICSa do FreeBSDa i Linuxa 1 Autor: Hrvoje Horvat Naslov: Kratka povijest UNIXa - Od UNICSa do FreeBSDa i Linuxa Licenca i prava korištenja: Svi imaju pravo koristiti, mijenjati, kopirati i štampati (printati) knjigu, prema pravilima GNU GPL licence. Mjesto i godina izdavanja: Osijek, 2017 ISBN: 978-953-59438-0-8 (PDF-online) URL publikacije (PDF): https://www.opensource-osijek.org/knjige/Kratka povijest UNIXa - Od UNICSa do FreeBSDa i Linuxa.pdf ISBN: 978-953- 59438-1- 5 (HTML-online) DokuWiki URL (HTML): https://www.opensource-osijek.org/dokuwiki/wiki:knjige:kratka-povijest- unixa Verzija publikacije : 1.0 Nakalada : Vlastita naklada Uz pravo svakoga na vlastito štampanje (printanje), prema pravilima GNU GPL licence. Ova knjiga je napisana unutar inicijative Open Source Osijek: https://www.opensource-osijek.org Inicijativa Open Source Osijek je član udruge Osijek Software City: http://softwarecity.hr/ UNIX je registrirano i zaštićeno ime od strane tvrtke X/Open (Open Group). FreeBSD i FreeBSD logo su registrirani i zaštićeni od strane FreeBSD Foundation. Imena i logo : Apple, Mac, Macintosh, iOS i Mac OS su registrirani i zaštićeni od strane tvrtke Apple Computer. Ime i logo IBM i AIX su registrirani i zaštićeni od strane tvrtke International Business Machines Corporation. IEEE, POSIX i 802 registrirani i zaštićeni od strane instituta Institute of Electrical and Electronics Engineers. Ime Linux je registrirano i zaštićeno od strane Linusa Torvaldsa u Sjedinjenim Američkim Državama. Ime i logo : Sun, Sun Microsystems, SunOS, Solaris i Java su registrirani i zaštićeni od strane tvrtke Sun Microsystems, sada u vlasništvu tvrtke Oracle. Ime i logo Oracle su u vlasništvu tvrtke Oracle.
    [Show full text]
  • Allegato Proposta Rete Aziendale
    Soluzione Open Source per PMI Servizi di Consulenza : prof.Soluzione Giuseppe per l'integrazione di Windows Sportelli con Linux per PMI e Pubbliche Amministrazioni Uno scenario tipico ! ● 10-100 Client Windows connessi a Internet con router ADSL/HDSL/ATM ● Nessuna politica di Backup o solo su supporti removibili CD-ROM/DVD/Nastri prof.● Gestione Giuseppe Posta Elettronica in modo Sportelli sparso vari client Outlook Express/Windows Live ● Navigazione Internet libera ● Software proprietari con storage solo lato client La proposta lato server ● Introdurre un server Gnu/LInux in ufficio con i seguenti compiti – Server di dominio gestione utenti e gruppi – gestione cartelle condivise prof.– Backup Giuseppe dei file utente del client su SportelliServer – Gestione dell'accesso a Internet con Web Proxy con filtraggio contenuti e antivirus in modalità trasparente (nessuna configurazione richiesta sul Browser) – Gestione mail esterne via Webmail su Server Locale – Accesso remoto alle cartelle via sito crittografato – Servizio di replica (opzionale in cloud) Proposta lato client ● Installazione su client Windows di software Open Source per migrare da Microsoft Office a Libreoffice o OpenOffice ● Utilizzo dei programmi Mozilla Firefox e prof.Thunderbird Giuseppe sui client Windows Sportelli ● Utilizzo profili di roaming per l'accesso da qualunque stazione ai dati degli utenti Assistenza e Formazione ● Istruzione del personale sull'uso del software e sulle procedure di manutenzione creazione utenze, riavvio del server – piccole operazioni di backup prof.● Istruzione Giuseppe sull'utilizzo dei nuovi Sportelli programmi Open Source per l'automazione di ufficio. Tutela della Privacy degli utenti e dell'azienda ● Tutti gli utenti e le password saranno gestite dal server di dominio PDC con particolare riguardo alla protezione dei dati sensibili degli utenti prof.● Le cartelle Giuseppe e i files riservati dell'azienda Sportelli saranno racchiusi in condivisioni protetti da password e comunque inaccessibili da Internet Schema dell'infrastruttura scelta prof.
    [Show full text]
  • Endian UTM Mini 10 Die Neue Generation Von UTM Hardware Appliances
    Secure everyThing www.endian.com Endian UTM Mini 10 Die neue Generation von UTM Hardware Appliances Mini 10 ist das neue UTM-Einstiegsgerät von Endian, das sich sowohl für Kleinunternehmen als auch das Homeoffice Performance Mini 10 eignet, mit dem aber auch große Projekte perfekt ergänzt Firewall Durchsatz 1 Gbit/s werden können. VPN Durchsatz (IPsec & SSL) 50 Mbit/s Die Mini 10 Appliance ist das ideale Gerät für Netzwerksicher- IPS Durchsatz 120 Mbit/s heit bei Betrieben mit einer begrenzten Anzahl an Mitarbeitern. Antivirus Durchsatz (Proxy) 90 Mbit/s Das Gerät garantiert alle zum Schutz des IT-Umfelds erforder- Web Security Durchsatz 250 Mbit/s lichen Features zu einem kostengünstigen Preis. Gleichzeitige Verbindungen 300.000 Mini 10 lässt sich aber auch hervorragend im Rahmen von großen und umfassenden Projekten einsetzen, in welchen neben einem Hardware Mini 10 zentralen Unified Threat Management (UTM) Gerät auch die Notwendigkeit besteht, weitere verbundene Niederlassungen Gehäuseart Desktop durch kleinere Geräte zu schützen. Maße 44mm x 232mm x 153mm Highlights Gewicht 1,1 kg 4 Ethernet Ports Arbeitsspeicher 2 GB 2 GB RAM Festplatte 8 GB 8 GB CFast Flash Speicher Networking 4x Gigabit Ethernet Desktop Lösung LAN Bypass - WiFi Upgrade verfügbar Netzteil 40W External Cooling Fans LCD Display - VGA - Hardwaregarantie included in maintenance Zertifizierungen FCC/CE/RoHS Endian UTM Mini 10 www.endian.com Endian UTM Features Network Security Virtual Private Networking BYOD / Hotspot* Bridging • Stateful packet firewall IPsec • Configurable
    [Show full text]
  • Introduzione Al Mondo Freebsd Corso Avanzato
    Introduzione al mondo FreeBSD corso Avanzato •Struttura •Installazione •Configurazione •I ports •Gestione •Netstudent http://netstudent.polito.it •E.Richiardone [email protected] •Novembre 2012 •CC-by http://creativecommons.org/licenses/by/3.0/it/ The FreeBSD project - 1 • E` un progetto software open • Lo scopo e` mantenere e sviluppare il sistema operativo FreeBSD • Nasce su CDROM come FreeBSD 1.0 nel 1993 • Deriva da un patchkit per 386BSD, eredita codice da UNIX versione Berkeley 1977 • Per problemi legali subisce un rallentamento, release 2.0 nel 1995 con codice royalty-free • Dalla release 4.0 (2000) assume la struttura che ha oggi • Disponibile per x86 32 e 64bit, ia64, MIPS, ppc, sparc... • La mascotte (Beastie) nasce nel 1984 The FreeBSD project - 2 • Erede di 4.4BSD (e` la stessa gente...) • Sistema stabile; sviluppo uniforme; codice molto chiaro, ordinato e ben commentato • Documentazione ufficiale ben curata • Licenza molto permissiva, spesso attrae aziende per progetti commerciali: • saltuariamente progetti collaborano con implementazioni ex-novo (i.e. Intel, GEOM, NDISwrapper, ZFS, GNU/Linux emulation) • Semplificazione di molte caratteristiche tradizionali UNIX Di cosa si tratta Il progetto FreeBSD include: • Un sistema base • Bootloader, kernel, moduli, librerie di base, comandi e utility di base, servizi tradizionali • Sorgenti completi in /usr/src (~500MB) • E` gia` completo (i.e. ipfw, ppp, bind, ...) • Un sistema di gestione per software aggiuntivo • Ports e packages • Documentazione, canali di assistenza, strumenti
    [Show full text]
  • Manual Install Endian Firewall
    Manual quick install Endian 1 firewall Endian Firewall คือ Endian Firewall เป็น "turn-key" linux security distribution ที่ ได้พัฒนาบนฐานของ IpCop ที่เน้นในเรื่องของระบบความปลอดภัย ซึ่งซอร์ฟแวร์ของ Endian Firewall ได้ออกแบบให้สามารถใช้งาน และติดตั้งได้ง่าย และมีความยืดหย่่นในการจัดการลักษณะสำาคัญ ความสามารถของ Endian Firewall ประกอบด้วย stateful packet inspection firewall, application-level proxies for various protocols (HTTP, POP3, SMTP) with antivirus support, virus and spam filtering for email traffic (POP and SMTP), content filtering of Web traffic and a "hassle free" VPN solution (based on OpenVPN) ข้อดีของ Endian Firewall ก็คือเป็น Open Source ความสามารถทั่วไปของ Endian Firewall ความสามารถหรือค่ณลักษณะโดยทั่วไปของ Endian Firewall จะคล้ายกัน IPCop มากคือจะนำามาใช้งานสำาหรับการทำา Firewall นั่ นคือ Endian Firewall จะออกแบบมาให้ประย่กต์ใช้งานกับ Server ที่ มี 4 Network Interface คือ Red, Blue, Green, และ Orange ดังนี้ - RED Network Interface เครือข่ายส่วนนี้ เป็น Internet หรือ Untrusted Network - GREEN Network Interface อินเตอร์เฟสนี้เชื่อมต่อกับ คอมพิวเตอร์ภายใน Create by komson promchot Manual quick install Endian 2 firewall - BLUE Network เครือข่ายส่วนนี้ให้ผ้้ใช้เชื่อมต่อกับอ่ปกรณ์ที่ เป็น Wireless - ORANGE Network เครือข่ายส่วนนี้เป็นส่วนของ DMZ ซึ่ง จะเป็นพื้นที่ของ Server ชนิดต่าง ๆ แต่ถ้า Server มี Network ไม่ถึง 4 ก็สามารถประย่กต์ไช้งานได้ เช่นกัน ซึ่งในตัวของ Firewall เองจะมี Proxy และ NAT ให้สามารถ ใช้งานโดยสะดวก สำาหรับวิธีการคอนฟิกการใช้งาน จะใช้ผ่าน Web Browser ทั้งหมด การใช้งานที่เพิ่มเข้ามาอีกอย่างคือการเก็บ Log ได้ตาม
    [Show full text]
  • Virtual Router Performance
    SOFTWARE DEFINED NETWORKING: VIRTUAL ROUTER PERFORMANCE Bachelor Degree Project in Network and System Administration Level ECTS Spring term 2016 Björn Svantesson Supervisor: Jianguo Ding Examiner: Manfred Jeusfeld Table of Contents 1Introduction..........................................................................................................................................1 2Background...........................................................................................................................................2 2.1Virtualization................................................................................................................................2 2.2Hypervisors...................................................................................................................................2 2.3VMware ESXi................................................................................................................................2 2.4Software defined networking.......................................................................................................3 2.5The split of the data and control plane........................................................................................3 2.6Centralization of network control................................................................................................4 2.7Network virtualization..................................................................................................................4 2.8Software routers..........................................................................................................................6
    [Show full text]
  • A Survey on Network Firewall Solutions
    A Survey on Network Firewall Solutions Nahid Kausar Shaikh Poonam Dhawale Asst. Prof., Department of Information Technology Asst. Prof., Department of Information Technology A.P. Shah Institute of Technology, A.P. Shah Institute of Technology, Thane, Maharashtra, India Thane, Maharashtra, India [email protected] [email protected] Shruti Agrawal Asst. Prof., Department of Computer Engineering A.P. Shah Institute of Technology, Thane, Maharashtra, India [email protected] Abstract — Today, as the number of online users increasing be a hardware device or a software program running on a rapidly resulting in complex networks and increase in network computer. Independent of the type of firewall, it must have at threats. Firewalls are an essential part of any information least two networks interfaces. One of its interfaces is connected security system being the first defense line against security to the private network and other is connected to the public attacks. Firewall is one of the most important parts of the network. network system which provides security in both the direction. It monitors both incoming and outgoing traffic and the specified Classification of the network firewall can be based on action. Firewalls can be categorized on the basis of usage and different parameters. features. There are a number of paid solutions present in the market but are expensive. As a result, Free or open source 1.1.1 Classification based on Firewall Usage firewall solutions can alternative to the paid solutions. Pfsense is 1.1.2 Classification based on Firewall Features free or open source firewall based on Free-BSD. Endian Firewall Community (EFW) is also free, open source network firewall 1.1.1 Classification based on Firewall Usage which is based on Linux.
    [Show full text]
  • Virtualization Netsec-4.Pdf
    HOLCZER et al. VIRTUALIZATION-ASSISTED TESTING OF NETWORK SECURITY SYSTEMS FOR NPPS T. HOLCZER CrySyS Lab, BME Budapest, Hungary Email: [email protected] G. BERMAN CNEA Buenos Aires, Argentina S. M. DARRICADES CNEA Buenos Aires, Argentina P. GYÖRGY CrySyS Lab, BME Budapest, Hungary G. LÁDI CrySyS Lab, BME Budapest, Hungary Abstract Nuclear power plants use different digital assets to control the processes. These assets are normally connected by computer networks, and are targets of potential cyber-attacks. To avoid or mitigate the effect of such an attack, different security controls are used in accordance with the guidelines. Before deploying a new cyber security control, it must be tested thoroughly. The paper proposes virtual testbeds made of virtual computers and networks for these tests and shows how three widely used open source firewalls perform in such a test. 1. INTRODUCTION The operation of a Nuclear Power Plant is based on controlling some physical processes and keeping the process values between some desired limits. This can be achieved by analogue controllers; however, digital controllers are also commonly used [1]. These sensitive digital assets (SDAs) are commonly connected to a network, where the management and the operation of the devices can be done remotely. The devices are normally distributed between systems and zones and are categorized into security levels [2][3]. The boundaries of the security levels are separated by security controls such as firewalls, but inside the levels and zones many other security controls must be used to achieve the desired level of security. Before deploying any new system to a production environment it must be tested.
    [Show full text]