A "personal" firewall is not a firewall, after all
GeneralThis forum is for non-technical general discussion which can include both Linux and non-Linux topics. Have fun!
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Introduction to Linux - A Hands on Guide
This guide was created as an overview of the Linux Operating System, geared toward new users as an exploration tour and getting started guide, with exercises at the end of each chapter.
For more advanced trainees it can be a desktop reference, and a collection of the base knowledge needed to proceed with system and network administration. This book contains many real life examples derived from the author's experience as a Linux system and network administrator, trainer and consultant. They hope these examples will help you to get a better understanding of the Linux system and that you feel encouraged to try out things on your own.
Click Here to receive this Complete Guide absolutely free.
PLEASE NOTE: All LQ Rules apply to the General forum. Flame wars, personal attacks, hostility, insults and behavior of that nature will not be tolerated. Differing opinions are one of the things that make this site great, but to benefit from differing opinions the discourse must happen respectfully and thoughtfully... without insult and personal attack. Members who are unable or unwilling to participate in General under those parameters will not be permitted to do so. If you see behavior of this nature please report it.
The author's problem is he works at a help desk and gets annoying calls from people with IDS' who don't know how to interpret the results. If he had read the blackice documentation, for example, it would tell him that the software is comprised of two components, a firewall and an IDS. You can block or unblock any port by editing the firewall.ini file, just like any "hardware" firewall. The IDS portion blocks IP addresses when "suspicious" traffic is detected. You can choose to trust a computer however, in which case warning messages won't be generated and the IP won't ever get blocked.
A "hardware" firewall is just a software firewall with the software burned on a flash chip. Sure, not having all those other services running eliminates a lot of potential vulnerabilities, but the real advantage is ease of use IMHO. Setting up three NICs to create a DMZ is a pain in the arse. Much easier to just plug in a black box and forget about it. That's also the problem I have with black box solutions, people rarely update the software on the flash chip.
I'd say a frequently patched firewall is always better than a never patched firewall, regardless of whether it be software or hardware based.