Tag: IPCop
Combat Virtual Threats with IPCop Firewall
This article is an introduction to the special firewall distribution, IPCop.
In today's world, dependence on the Internet has reached such a level that without...
Guard Your Network with IPCop, Part 5: Your First Site-to-Site VPN
The first article in this series discussed the basic installation and configuration of IPCop 1.4.21. Subsequent articles covered six important add-ons: Advanced Proxy, URL...
Guard Your Network with IPCop, Part 4: Configuring OpenVPN with Zerina...
The first article in this series discussed the basic installation and configuration of IPCop 1.4.21. Subsequent articles discussed five important add-ons used to enhance...
Guard Your Network with IPCop, Part 3: Block Outgoing Traffic
The first article in the series discussed IPCop 1.4.21, its basic installation and configuration. Though an excellent firewall distro, basic IPCop has limited functionality....
Guard Your Network with IPCop, Part 2: Add-ons
A basic installation of IPCop provides minimum firewall functionality such as a proxy, compatibility with various Internet connections, port forwarding, IPSec VPN, etc. To...
Guard Your Network with IPCop, Part 1: Installation Basics
The classic version of IPCop 1.4.20, which was released on July 24, 2008, was immediately upgraded to the 1.4.21 ISO installer. The much awaited...
Storage Management using Openfiler, Part 3
The first article of this series discussed basic installation and configuration; the second described some advanced Openfiler features including bonded interfaces and RAID 1...
Quick Setup Guide to Network Monitoring using Zenoss Core
Today's businesses demand 24x7 uptime of IT infrastructure. To meet this need, a number of technologies are used, which include failover, clustering, redundant devices...
Advanced Nmap: Scanning Firewalls Continued
The previous article detailed methods to scan an IPCop-based firewall in a test environment. The scan output revealed several open ports, which could lead...
Advanced Nmap: Scanning Firewalls
After four articles on Nmap , which explained a number of command-line options for scan technique specification, target specification, port specifications, host discovery, evasion...