dcsimg

Armoring Solaris


Download the authoritative guide: Data Center Guide: Optimizing Your Data Center Strategy

Download the authoritative guide: Cloud Computing: Using the Cloud for Competitive Advantage

Firewalls are one of the fastest growing technical tools in the field of information security. However, a firewall is only as secure as the operating system it resides upon. This article will take a step by step look at how you can best armor your Solar is box, both Sparc and x86. These steps can apply to any situation, however I will be using Checkpoint Firewall 1 on Solaris 2.6 as an example. At the end of this article is a script that you can download that will automate most of the armoring process, to include implementing TCP Wrappers. Firewalls are one of the fastest growing technical tools in the field of information security. However, a firewall is only as secure as the operating system it resides upon. This article will take a step by step look at how you can best armor your Solar is box, both Sparc and x86. These steps can apply to any situation, however I will be using Checkpoint Firewall 1 on Solaris 2.6 as an example. At the end of this article is a script that you can download that will automate most of the armoring process, to include implementing TCP Wrappers.

This article was originally published on Jan 13, 2001
Page 1 of 1

Thanks for your registration, follow us on our social networks to keep up-to-date