Home Tags IPCop

Tag: IPCop

Combat Virtual Threats with IPCop Firewall

  This article is an introduction to the special firewall distribution, IPCop. In today's world, dependence on the Internet has reached such a level that without...

Guard Your Network with IPCop, Part 5: Your First Site-to-Site VPN

The first article in this series discussed the basic installation and configuration of IPCop 1.4.21. Subsequent articles covered six important add-ons: Advanced Proxy, URL...
Advertisement

Guard Your Network with IPCop, Part 4: Configuring OpenVPN with Zerina...

The first article in this series discussed the basic installation and configuration of IPCop 1.4.21. Subsequent articles discussed five important add-ons used to enhance...

Guard Your Network with IPCop, Part 3: Block Outgoing Traffic

The first article in the series discussed IPCop 1.4.21, its basic installation and configuration. Though an excellent firewall distro, basic IPCop has limited functionality....

Guard Your Network with IPCop, Part 2: Add-ons

A basic installation of IPCop provides minimum firewall functionality such as a proxy, compatibility with various Internet connections, port forwarding, IPSec VPN, etc. To...

Guard Your Network with IPCop, Part 1: Installation Basics

The classic version of IPCop 1.4.20, which was released on July 24, 2008, was immediately upgraded to the 1.4.21 ISO installer. The much awaited...
Advertisement

Storage Management using Openfiler, Part 3

The first article of this series discussed basic installation and configuration; the second described some advanced Openfiler features including bonded interfaces and RAID 1...

Quick Setup Guide to Network Monitoring using Zenoss Core

Today's businesses demand 24x7 uptime of IT infrastructure. To meet this need, a number of technologies are used, which include failover, clustering, redundant devices...

Advanced Nmap: Scanning Firewalls Continued

The previous article detailed methods to scan an IPCop-based firewall in a test environment. The scan output revealed several open ports, which could lead...

Advanced Nmap: Scanning Firewalls

After four articles on Nmap , which explained a number of command-line options for scan technique specification, target specification, port specifications, host discovery, evasion...
Advertisement

Block title