LinuxQuestions.org
Welcome to the most active Linux Forum on the web.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Networking
User Name
Password
Linux - Networking This forum is for any issue related to networks or networking.
Routing, network cards, OSI, etc. Anything is fair game.

Notices


Reply
  Search this Thread
Old 04-28-2018, 12:54 PM   #16
jefro
Moderator
 
Registered: Mar 2008
Posts: 21,987

Rep: Reputation: 3626Reputation: 3626Reputation: 3626Reputation: 3626Reputation: 3626Reputation: 3626Reputation: 3626Reputation: 3626Reputation: 3626Reputation: 3626Reputation: 3626

You could be way more secure with an advanced firewall from some big name company. A router/modem sort of gizmo isn't usually able to do what you really need.

If you want you can start with a soho wrt type opensource install.

You can consider a real or virtual firewall OS distro. Untangle comes to mine but there are more out there.

Pfsense has and OS and a micro appliance too that could be considered.

Security is a collection of tasks.
 
Old 04-28-2018, 02:05 PM   #17
SteelCitySteve
Member
 
Registered: Sep 2017
Location: Western PA
Posts: 39

Original Poster
Rep: Reputation: 0
Quote:
Originally Posted by jefro View Post
You could be way more secure with an advanced firewall from some big name company. A router/modem sort of gizmo isn't usually able to do what you really need.
So you think there is extra value in having something like a Cisco firewall or router/switch?

Any other brands that can be considered "professional"?

Seems like you are in the minority, because from what I have read and others have said, it seems like a lot of people feel that Cisco is no more secure than Linksys, and that I should go the OpenWRT route...


Quote:
Originally Posted by jefro View Post
If you want you can start with a soho wrt type opensource install.
Do all routers/switches in 2018 still require 120V power, or can you buy/build one that is powered off of USB?

Also, could I buy/built a router/switch that would be more like a solid-state device that would run OpenWRT? (When people mention turning a computer into a router/switch, that becomes a space/energy/mobility issue for me!! But if I could get a small device where I could load OpenWRT onto it, and better power it by USB, then that would be a small enough foot-print for my mobile needs.)


Quote:
Originally Posted by jefro View Post
You can consider a real or virtual firewall OS distro. Untangle comes to mine but there are more out there.
I assume a hardware firewall would be better, right? (Or can software firewalls do just as much?)


Quote:
Originally Posted by jefro View Post
Pfsense has and OS and a micro appliance too that could be considered.

Security is a collection of tasks.
OpenWRT is not a firewall, right?

If so, then what software firewalls are the best?

And what are your recommendations for brands of hardware firewalls?

Thanks!
 
Old 04-30-2018, 01:08 PM   #18
jefro
Moderator
 
Registered: Mar 2008
Posts: 21,987

Rep: Reputation: 3626Reputation: 3626Reputation: 3626Reputation: 3626Reputation: 3626Reputation: 3626Reputation: 3626Reputation: 3626Reputation: 3626Reputation: 3626Reputation: 3626
Almost every big company runs a perimeter firewall of some big name brand.

There are travel routers that might support both usb and wrt. I think rosewill has one. May be others that can use usb power or battery.

Dedicated professional router/firewall appliances come in two forms really. One is a dedicated hardware device designed to be up to wire speed. The other is a dedicated software hardware combo that performs what they call Unified Threat management.

There are a number of open UTM's that could be looked at. Some require payment for extra plug in's or support. I recommend what is called a layer 7+ type that can look into packets and restrict based on some command.

In all this there is a few terms that are world wide poorly used. A router is not a router in the text book sense. Modern routers are smart switches for most soho devices. They have features above routing. One common program added is iptables or similar to track ip addresses and ports. It alone is not a full UTM.

Openwrt is not a fireall but yet it is. A firewall is another poorly used word. Firewall can mean anything from minimal to very strict. Is a poor firewall a fireall? Yes. Would you wish to use a poor firewall? Maybe, maybe not. Most home modem/routers have a poor firewall that fools users into thinking they have some form of protection.

I'm not saying others are wrong on this thread by the way. Opinions based on 1000 miles away differ always. We don't consider all variables in your house or work.
 
Old 05-03-2018, 01:11 PM   #19
MikeDeltaBrown
Member
 
Registered: Apr 2013
Location: Arlington, WA
Distribution: Slackware
Posts: 96

Rep: Reputation: 10
I recommend buying a book on linux firewalls like Packt Publishing's "Designing and Implementing Linux Firewalls and QoS using netfilter, iproute2, NAT and l7-filter".

Any old computer with 2 interfaces can act as a secure router/firewall....even a Raspberry Pi using VLANs in a "Router-on-a-stick" configuration will work. If you're just looking for lab-style learning, setup a few VMs and go crazy.
 
Old 05-04-2018, 08:58 PM   #20
SteelCitySteve
Member
 
Registered: Sep 2017
Location: Western PA
Posts: 39

Original Poster
Rep: Reputation: 0
Quote:
Originally Posted by jefro View Post
Almost every big company runs a perimeter firewall of some big name brand.
How does something like pfSense compare to a Cisco firewall?



Quote:
Originally Posted by jefro View Post
There are travel routers that might support both usb and wrt. I think rosewill has one. May be others that can use usb power or battery.
Have links? I can't find any that are usb powered.


Quote:
Originally Posted by jefro View Post
Dedicated professional router/firewall appliances come in two forms really. One is a dedicated hardware device designed to be up to wire speed. The other is a dedicated software hardware combo that performs what they call Unified Threat management.
Some say UTM's are not as secure as dedicated appliances...


Quote:
Originally Posted by jefro View Post
Openwrt is not a fireall but yet it is.
What is the difference between pfSense and OpenWRT?
 
Old 05-04-2018, 10:15 PM   #21
scasey
LQ Veteran
 
Registered: Feb 2013
Location: Tucson, AZ, USA
Distribution: CentOS 7.9.2009
Posts: 5,727

Rep: Reputation: 2211Reputation: 2211Reputation: 2211Reputation: 2211Reputation: 2211Reputation: 2211Reputation: 2211Reputation: 2211Reputation: 2211Reputation: 2211Reputation: 2211
Isn't Linksys == Cisco?
 
Old 05-07-2018, 01:06 PM   #22
jefro
Moderator
 
Registered: Mar 2008
Posts: 21,987

Rep: Reputation: 3626Reputation: 3626Reputation: 3626Reputation: 3626Reputation: 3626Reputation: 3626Reputation: 3626Reputation: 3626Reputation: 3626Reputation: 3626Reputation: 3626
Cisco and other commercial products have a wide range of offering in security. pfsense in my opinion would not fair well against the top perimeter firewall products. pfsense is a good start and a few companies offer hardware plus plug ins to compete in the range but pfsense is only a distro. https://www.techinformant.in/how-to-...configuration/ give some good examples on how one has to configure it to make it secure. In many cases the commercial products are provided as secure and offer tech support and constant updates.

Travel routers usually are powered by usb. I suspect something like this will be. https://www.newegg.com/Product/Produ...0164-_-Product

Configuration and luck seem to be the reason a system is secure.

pfsense is or wasn't designed to be used on soho routers. Openwrt is.

Yes, cisco bought linksys but they maintain separate target customers.
 
Old 05-07-2018, 08:09 PM   #23
SteelCitySteve
Member
 
Registered: Sep 2017
Location: Western PA
Posts: 39

Original Poster
Rep: Reputation: 0
Quote:
Originally Posted by jefro View Post
Cisco and other commercial products have a wide range of offering in security. pfsense in my opinion would not fair well against the top perimeter firewall products. pfsense is a good start and a few companies offer hardware plus plug ins to compete in the range but pfsense is only a distro. https://www.techinformant.in/how-to-...configuration/ give some good examples on how one has to configure it to make it secure. In many cases the commercial products are provided as secure and offer tech support and constant updates.
That is disheartening... :-(

When I looked at all of the things you can do with pfSense, it seems pretty sophisticated to me...

I also like that it is open-source - I'm suspicious of proprietary, big enterprise solution because they are often over-priced and not much better for the actual need.




Quote:
Originally Posted by jefro View Post
Configuration and luck seem to be the reason a system is secure.
Then by that pfSense should be able to be set up in such a way to provide adequate perimeter security for small-to-medium business, no?


Quote:
Originally Posted by jefro View Post
pfsense is or wasn't designed to be used on soho routers. Openwrt is.
But Netgate sells hardware appliances that come pre-loaded with pfSense, and I assumed those would be a great start for a firewall.

This looks like a nice offering of products to me...

https://www.netgate.com/solutions/pfsense/#on-premises


P.S. In order to try out one of the above hardware firewalls, I need help figuring out how to grab a Wi-Fi signal at my hotel using a router so I can then plug in the above Netgate pfSense firewalls.

Any ideas on how to do that?

https://www.linuxquestions.org/quest...ot-4175629084/

Last edited by SteelCitySteve; 05-07-2018 at 08:15 PM.
 
Old 05-08-2018, 07:44 PM   #24
jefro
Moderator
 
Registered: Mar 2008
Posts: 21,987

Rep: Reputation: 3626Reputation: 3626Reputation: 3626Reputation: 3626Reputation: 3626Reputation: 3626Reputation: 3626Reputation: 3626Reputation: 3626Reputation: 3626Reputation: 3626
Many admins use pfsense or other similar distro to protect their lan. It is not configured secure by default is more what I meant. I respect both pfsense and netgate. (wish they'd let me have a micro appliance to play with)

I think the smallest netgate arm gizmo has a few issues with maybe iptables or something I forget. Maybe??

You can run a VM or a used computer to start on this project. A virtual machine is free and easy and you just point lan to the green side of the vm. Red side of vm goes to wan.

You could look at firewallbuilder FWbuilder is a great project to help build firewall rules.

Almost every router can be used to connect to a wifi signal and then relay it in some manner. The doc's at dd-wrt are some of the ones I'd use for hints or examples. There are at least two common ways to connect to the wifi. The terms used in some routers have to be watched. One router may call the task different name than another.

Last edited by jefro; 05-08-2018 at 07:46 PM.
 
Old 05-08-2018, 08:01 PM   #25
SteelCitySteve
Member
 
Registered: Sep 2017
Location: Western PA
Posts: 39

Original Poster
Rep: Reputation: 0
Quote:
Originally Posted by jefro View Post
Many admins use pfsense or other similar distro to protect their lan. It is not configured secure by default is more what I meant. I respect both pfsense and netgate. (wish they'd let me have a micro appliance to play with)
But I am here to learn, so as long as Netgate w pfSecure has the *potential* to be secure, then that should be good enough, right?

Or is Cisco superior still?


Quote:
Originally Posted by jefro View Post
I think the smallest netgate arm gizmo has a few issues with maybe iptables or something I forget. Maybe??
How so? A bug?

I looked at the tiniest Netgate appliance that is a small as a bar of soap, and it is only $150, and it looks like pfSense can do a boatload of cool security stuff from Firewall to Intrusion Detection...



Quote:
Originally Posted by jefro View Post
You can run a VM or a used computer to start on this project. A virtual machine is free and easy and you just point lan to the green side of the vm. Red side of vm goes to wan.

You could look at firewallbuilder FWbuilder is a great project to help build firewall rules.

Almost every router can be used to connect to a wifi signal and then relay it in some manner. The doc's at dd-wrt are some of the ones I'd use for hints or examples. There are at least two common ways to connect to the wifi. The terms used in some routers have to be watched. One router may call the task different name than another.
Here is what I need help doing...

I am in a hotel that has WiFi. They have a log in page. I know if I call tech support they can add my laptops - via IP and MAC - and give me unlimited 30 day access.

My hope was to buy some cheaper Linksys Router, write down the IP and MAC addresses, call the help desk, have them add the wireless router, and then have Internet access via the wireless router.

To be clear, what I want is a way to convert the hotel's Wi-Fi signal and turn that wireless connecting into a WIRED connection coming out of the router. That way I can get a short Cat5 cable, and plug in some Netgate with pfSense firewall device and thus have the makings of a really secure "home" network in my hotel room.

If I can do that, then I can add a switch too!


Does that make sense?

So can you give me some more specifics of how I can capture the hotel's WiFi and find some router - presumably wireless - that will let me turn that radio signal into a signal coming out an ethernet port on the back of the router so I can build a WIRED NETWORK in my hotel??
 
Old 05-08-2018, 08:51 PM   #26
michaelk
Moderator
 
Registered: Aug 2002
Posts: 25,708

Rep: Reputation: 5899Reputation: 5899Reputation: 5899Reputation: 5899Reputation: 5899Reputation: 5899Reputation: 5899Reputation: 5899Reputation: 5899Reputation: 5899Reputation: 5899
As posted in your other thread a wifi bridge might work like the following. You will need to add both the extender and the firewall MACs to the hotel WiFi.


https://www.newegg.com/Product/Produ...82E16833122674

This also looks like it will work for you too.

https://www.amazon.com/TP-Link-Wirel...SIN=B00TQEX8BO
 
Old 05-09-2018, 03:06 PM   #27
jefro
Moderator
 
Registered: Mar 2008
Posts: 21,987

Rep: Reputation: 3626Reputation: 3626Reputation: 3626Reputation: 3626Reputation: 3626Reputation: 3626Reputation: 3626Reputation: 3626Reputation: 3626Reputation: 3626Reputation: 3626
Is something way more secure I can't answer. Large companies offer managed and unmanaged UTM products. I say unified because they are a vast number of features. If some company pre-loads or remotely loads updates and set's conditions I'd think it more secure than a first time user might configure. Basically there is not a clean reply to what is more secure. If one had the skill and time, I believe they could secure their system as well as the big name ones for the most part. Do you need all the features just working from a hotel? Maybe, they are known to be sore spots for security.

The Netgate arm based device is another part of this number of questions you have. I looked at buying that product one time and I just don't recall exactly if it did support all the plug in's. Contact Netgate for it's full features compared to other intel based devices.

I can't say how this hotel provides you with service. I can say that almost every router you buy can be set into a mode to take wifi and then allow lan wired connections. Look at the dd-wrt help for how do do that.

Part of that issue contains a secondary issue. That being the small travel routers use a micro version of dd-wrt usually. They can't support huge iptables or other flaws due to the very minimal specs.

Most full DD-WRT devices won't run off a usb. They have a wall wart.

You can take this wifi connected computer and run a VM of untangle firewall or other and then use it's nic to switch/hub on other computers.
 
Old 05-09-2018, 07:41 PM   #28
SteelCitySteve
Member
 
Registered: Sep 2017
Location: Western PA
Posts: 39

Original Poster
Rep: Reputation: 0
Quote:
Originally Posted by michaelk View Post
As posted in your other thread a wifi bridge might work like the following. You will need to add both the extender and the firewall MACs to the hotel WiFi.


https://www.newegg.com/Product/Produ...82E16833122674

This also looks like it will work for you too.

https://www.amazon.com/TP-Link-Wirel...SIN=B00TQEX8BO
I don't understand what these are supposed to do to help me out.

One looks like it "amplifies" a weak Wi-Fi signal - not my issue.

The other one almost looks like it takes a wired Internet connection and creates a wireless network - also not what I want.
 
Old 05-09-2018, 07:47 PM   #29
SteelCitySteve
Member
 
Registered: Sep 2017
Location: Western PA
Posts: 39

Original Poster
Rep: Reputation: 0
Quote:
Originally Posted by jefro View Post
Is something way more secure I can't answer. Large companies offer managed and unmanaged UTM products. I say unified because they are a vast number of features. If some company pre-loads or remotely loads updates and set's conditions I'd think it more secure than a first time user might configure. Basically there is not a clean reply to what is more secure. If one had the skill and time, I believe they could secure their system as well as the big name ones for the most part. Do you need all the features just working from a hotel? Maybe, they are known to be sore spots for security.
You're missing the point...

I am trying to convert the hotel's WI-Fi into a wired signal so I can play around with normal wired network components to start learning networking.

My Macintosh is secure enough as is even using the hotel's Wi-Fi.

And I prefer not connection a laptop to the hotel's Wi-Fi and then somehow using that as my Internet source for fear it will complicate the network and possible confuse my learning.

I am seeking a way to convert the Wi-Fi to a simple and pure wired Internet connection so I have the same thing I'd have coming out of a modem plugged into a phone line at home.



Quote:
Originally Posted by jefro View Post
I can't say how this hotel provides you with service. I can say that almost every router you buy can be set into a mode to take wifi and then allow lan wired connections. Look at the dd-wrt help for how do do that.
Why do I need DD-WRT to do that?

And whoever mentioned the router bridge mode or whatever, can you please help explain that more to me?



Quote:
Originally Posted by jefro View Post
Part of that issue contains a secondary issue. That being the small travel routers use a micro version of dd-wrt usually. They can't support huge iptables or other flaws due to the very minimal specs.

Most full DD-WRT devices won't run off a usb. They have a wall wart.
Forget the travel component.

I would be happy right now being able to plug into some device providing me raw Internet from my hotel room.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
how to down grade LT72884 Linux - Newbie 19 09-02-2013 09:16 PM
Linux barriers to consumer-grade status... ideas? Raveolution Linux - General 23 02-10-2011 07:26 AM
Router recommendations? (Consumer) Rotwang Linux - Hardware 5 10-19-2009 05:52 AM
up grade firefox Maurice Arthur MEPIS 16 03-10-2008 04:08 PM
build grade from source @ngelot Linux - Software 2 11-26-2005 04:01 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Networking

All times are GMT -5. The time now is 06:20 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration