Home Tags IPCop

Tag: IPCop

Combat Virtual Threats with IPCop Firewall

0
  This article is an introduction to the special firewall distribution, IPCop. In today's world, dependence on the Internet has reached such a level that without...

Guard Your Network with IPCop, Part 5: Your First Site-to-Site VPN

1
The first article in this series discussed the basic installation and configuration of IPCop 1.4.21. Subsequent articles covered six important add-ons: Advanced Proxy, URL...

Guard Your Network with IPCop, Part 4: Configuring OpenVPN with Zerina...

0
The first article in this series discussed the basic installation and configuration of IPCop 1.4.21. Subsequent articles discussed five important add-ons used to enhance...

Guard Your Network with IPCop, Part 3: Block Outgoing Traffic

9
The first article in the series discussed IPCop 1.4.21, its basic installation and configuration. Though an excellent firewall distro, basic IPCop has limited functionality....

Guard Your Network with IPCop, Part 2: Add-ons

7
A basic installation of IPCop provides minimum firewall functionality such as a proxy, compatibility with various Internet connections, port forwarding, IPSec VPN, etc. To...

Guard Your Network with IPCop, Part 1: Installation Basics

4
The classic version of IPCop 1.4.20, which was released on July 24, 2008, was immediately upgraded to the 1.4.21 ISO installer. The much awaited...

Storage Management using Openfiler, Part 3

0
The first article of this series discussed basic installation and configuration; the second described some advanced Openfiler features including bonded interfaces and RAID 1...

Quick Setup Guide to Network Monitoring using Zenoss Core

3
Today's businesses demand 24x7 uptime of IT infrastructure. To meet this need, a number of technologies are used, which include failover, clustering, redundant devices...

Advanced Nmap: Scanning Firewalls Continued

2
The previous article detailed methods to scan an IPCop-based firewall in a test environment. The scan output revealed several open ports, which could lead...

Advanced Nmap: Scanning Firewalls

1
After four articles on Nmap , which explained a number of command-line options for scan technique specification, target specification, port specifications, host discovery, evasion...