dcsimg

Armoring Solaris

By ServerWatch Staff (Send Email)
Posted Jan 13, 2001


Firewalls are one of the fastest growing technical tools in the field of information security. However, a firewall is only as secure as the operating system it resides upon. This article will take a step by step look at how you can best armor your Solar is box, both Sparc and x86. These steps can apply to any situation, however I will be using Checkpoint Firewall 1 on Solaris 2.6 as an example. At the end of this article is a script that you can download that will automate most of the armoring process, to include implementing TCP Wrappers. Firewalls are one of the fastest growing technical tools in the field of information security. However, a firewall is only as secure as the operating system it resides upon. This article will take a step by step look at how you can best armor your Solar is box, both Sparc and x86. These steps can apply to any situation, however I will be using Checkpoint Firewall 1 on Solaris 2.6 as an example. At the end of this article is a script that you can download that will automate most of the armoring process, to include implementing TCP Wrappers.

Page 1 of 1


Comment and Contribute

Your name/nickname

Your email

(Maximum characters: 1200). You have characters left.