SlideShare a Scribd company logo
1 of 5
Download to read offline
Firewalls

  Presented by:
Mohammed I. Farrah
  m.farrah.it@gmail.com



                          26-10-2011
What is a Firewall?
A firewall is a device or set of devices designed
to permit or deny network transmissions based
upon a set of rules. (wikipedia)
IpCop Firewall
IPCop is a Linux distribution
which aims to provide a
simple-to-manage firewall
appliance based on PC
hardware.
IPCop is a stateful firewall
built on the Linux netfilter
framework.
DEMO
Questions?




Thanks for listening.

More Related Content

What's hot

CCNA Security 010-configuring cisco asa
CCNA Security 010-configuring cisco asaCCNA Security 010-configuring cisco asa
CCNA Security 010-configuring cisco asaAhmed Habib
 
Cisco rv110 w wireless n vpn firewall
Cisco rv110 w wireless n vpn firewallCisco rv110 w wireless n vpn firewall
Cisco rv110 w wireless n vpn firewallIT Tech
 
Sigfox Makers Tour - Copenhagen
Sigfox Makers Tour - CopenhagenSigfox Makers Tour - Copenhagen
Sigfox Makers Tour - CopenhagenNicolas Lesconnec
 
Configuring linksys wireless router
Configuring linksys wireless routerConfiguring linksys wireless router
Configuring linksys wireless routeranku3
 
Mr. Vivek Ramachandran - Advanced Wi-­Fi Security Penetration Testing
Mr. Vivek Ramachandran - Advanced Wi-­Fi Security Penetration TestingMr. Vivek Ramachandran - Advanced Wi-­Fi Security Penetration Testing
Mr. Vivek Ramachandran - Advanced Wi-­Fi Security Penetration Testingnooralmousa
 
How to hack a telecommunication company and stay alive. Sergey Gordeychik
How to hack a telecommunication company and stay alive. Sergey GordeychikHow to hack a telecommunication company and stay alive. Sergey Gordeychik
How to hack a telecommunication company and stay alive. Sergey GordeychikPositive Hack Days
 
Scenatio based hacking - enterprise wireless security (Vivek Ramachandran)
Scenatio based hacking - enterprise wireless security (Vivek Ramachandran)Scenatio based hacking - enterprise wireless security (Vivek Ramachandran)
Scenatio based hacking - enterprise wireless security (Vivek Ramachandran)ClubHack
 
Stentofon VOIP
Stentofon VOIPStentofon VOIP
Stentofon VOIPkerryorr
 
Introduction - what is Askozia?
Introduction - what is Askozia?Introduction - what is Askozia?
Introduction - what is Askozia?Askozia
 
CCNA RS_ITN - Chapter 9
CCNA RS_ITN - Chapter 9CCNA RS_ITN - Chapter 9
CCNA RS_ITN - Chapter 9Irsandi Hasan
 
Sigfox Makers Tour - Bratislava
Sigfox Makers Tour - BratislavaSigfox Makers Tour - Bratislava
Sigfox Makers Tour - BratislavaNicolas Lesconnec
 

What's hot (19)

CCNA Security 010-configuring cisco asa
CCNA Security 010-configuring cisco asaCCNA Security 010-configuring cisco asa
CCNA Security 010-configuring cisco asa
 
Wi-Fi Module
Wi-Fi ModuleWi-Fi Module
Wi-Fi Module
 
Cisco rv110 w wireless n vpn firewall
Cisco rv110 w wireless n vpn firewallCisco rv110 w wireless n vpn firewall
Cisco rv110 w wireless n vpn firewall
 
Sigfox Makers Tour - Copenhagen
Sigfox Makers Tour - CopenhagenSigfox Makers Tour - Copenhagen
Sigfox Makers Tour - Copenhagen
 
Wi fi
Wi fiWi fi
Wi fi
 
Configuring linksys wireless router
Configuring linksys wireless routerConfiguring linksys wireless router
Configuring linksys wireless router
 
Ieee 802.11 wlan
Ieee 802.11 wlanIeee 802.11 wlan
Ieee 802.11 wlan
 
Mr. Vivek Ramachandran - Advanced Wi-­Fi Security Penetration Testing
Mr. Vivek Ramachandran - Advanced Wi-­Fi Security Penetration TestingMr. Vivek Ramachandran - Advanced Wi-­Fi Security Penetration Testing
Mr. Vivek Ramachandran - Advanced Wi-­Fi Security Penetration Testing
 
How to hack a telecommunication company and stay alive. Sergey Gordeychik
How to hack a telecommunication company and stay alive. Sergey GordeychikHow to hack a telecommunication company and stay alive. Sergey Gordeychik
How to hack a telecommunication company and stay alive. Sergey Gordeychik
 
Scenatio based hacking - enterprise wireless security (Vivek Ramachandran)
Scenatio based hacking - enterprise wireless security (Vivek Ramachandran)Scenatio based hacking - enterprise wireless security (Vivek Ramachandran)
Scenatio based hacking - enterprise wireless security (Vivek Ramachandran)
 
Wardriving
WardrivingWardriving
Wardriving
 
Firewall
FirewallFirewall
Firewall
 
Stentofon VOIP
Stentofon VOIPStentofon VOIP
Stentofon VOIP
 
Introduction - what is Askozia?
Introduction - what is Askozia?Introduction - what is Askozia?
Introduction - what is Askozia?
 
TekIVR Datasheet
TekIVR DatasheetTekIVR Datasheet
TekIVR Datasheet
 
End user
End userEnd user
End user
 
CCNA RS_ITN - Chapter 9
CCNA RS_ITN - Chapter 9CCNA RS_ITN - Chapter 9
CCNA RS_ITN - Chapter 9
 
Wifi- technology_moni
Wifi- technology_moniWifi- technology_moni
Wifi- technology_moni
 
Sigfox Makers Tour - Bratislava
Sigfox Makers Tour - BratislavaSigfox Makers Tour - Bratislava
Sigfox Makers Tour - Bratislava
 

Viewers also liked

Firewall - IPCop
Firewall - IPCopFirewall - IPCop
Firewall - IPCopFaniMR
 
Comparativa Firewall: IPCop vs. pfSense
Comparativa Firewall: IPCop vs. pfSenseComparativa Firewall: IPCop vs. pfSense
Comparativa Firewall: IPCop vs. pfSenseIrontec
 
Portal cautivo usando Easy Hotspot
Portal cautivo usando Easy HotspotPortal cautivo usando Easy Hotspot
Portal cautivo usando Easy HotspotCésar Lorenzo
 
Vlans con una tarjeta de red en pfsense
Vlans con una tarjeta de red en pfsenseVlans con una tarjeta de red en pfsense
Vlans con una tarjeta de red en pfsenseEdgar Guth
 
Seguridad pfsense
Seguridad pfsenseSeguridad pfsense
Seguridad pfsenseJOSE Flores
 
PfSense VLAN sobre una sola interfaz de red.
PfSense VLAN sobre una sola interfaz de red.PfSense VLAN sobre una sola interfaz de red.
PfSense VLAN sobre una sola interfaz de red.gabo_rojo
 
Investigación 3 -pc zombie, spim, ransomware, spam, phishing y scam
Investigación 3 -pc zombie, spim, ransomware, spam, phishing y scamInvestigación 3 -pc zombie, spim, ransomware, spam, phishing y scam
Investigación 3 -pc zombie, spim, ransomware, spam, phishing y scamDeb1985
 
Pfsense: securizando tu infraestructura
Pfsense: securizando tu infraestructuraPfsense: securizando tu infraestructura
Pfsense: securizando tu infraestructuraAlex Casanova
 
53458737 manual-de-usuario-de-pfsense-firewall
53458737 manual-de-usuario-de-pfsense-firewall53458737 manual-de-usuario-de-pfsense-firewall
53458737 manual-de-usuario-de-pfsense-firewallSebastian Berrios Vasquez
 
Implementación de NAT/PAT en routers Cisco
Implementación de NAT/PAT en routers CiscoImplementación de NAT/PAT en routers Cisco
Implementación de NAT/PAT en routers CiscoPaulo Colomés
 
Instalación y Configuración de Exchange 2013 en Windows Server 2012 R2
Instalación y Configuración de Exchange 2013 en Windows Server 2012 R2Instalación y Configuración de Exchange 2013 en Windows Server 2012 R2
Instalación y Configuración de Exchange 2013 en Windows Server 2012 R2cyberleon95
 

Viewers also liked (20)

Firewall - IPCop
Firewall - IPCopFirewall - IPCop
Firewall - IPCop
 
Ipco ppre
Ipco ppreIpco ppre
Ipco ppre
 
Comparativa Firewall: IPCop vs. pfSense
Comparativa Firewall: IPCop vs. pfSenseComparativa Firewall: IPCop vs. pfSense
Comparativa Firewall: IPCop vs. pfSense
 
Tesis1
Tesis1Tesis1
Tesis1
 
Portal cautivo usando Easy Hotspot
Portal cautivo usando Easy HotspotPortal cautivo usando Easy Hotspot
Portal cautivo usando Easy Hotspot
 
Vlans con una tarjeta de red en pfsense
Vlans con una tarjeta de red en pfsenseVlans con una tarjeta de red en pfsense
Vlans con una tarjeta de red en pfsense
 
Seguridad pfsense
Seguridad pfsenseSeguridad pfsense
Seguridad pfsense
 
PfSense VLAN sobre una sola interfaz de red.
PfSense VLAN sobre una sola interfaz de red.PfSense VLAN sobre una sola interfaz de red.
PfSense VLAN sobre una sola interfaz de red.
 
Packet Sniffing
Packet SniffingPacket Sniffing
Packet Sniffing
 
Pfsense
PfsensePfsense
Pfsense
 
Portal Cautivo - PfSense
Portal Cautivo - PfSensePortal Cautivo - PfSense
Portal Cautivo - PfSense
 
Investigación 3 -pc zombie, spim, ransomware, spam, phishing y scam
Investigación 3 -pc zombie, spim, ransomware, spam, phishing y scamInvestigación 3 -pc zombie, spim, ransomware, spam, phishing y scam
Investigación 3 -pc zombie, spim, ransomware, spam, phishing y scam
 
Tesis1
Tesis1Tesis1
Tesis1
 
Cómo crear un portal cautivo con easyhotspot
Cómo crear un  portal cautivo con easyhotspotCómo crear un  portal cautivo con easyhotspot
Cómo crear un portal cautivo con easyhotspot
 
Pfsense: securizando tu infraestructura
Pfsense: securizando tu infraestructuraPfsense: securizando tu infraestructura
Pfsense: securizando tu infraestructura
 
53458737 manual-de-usuario-de-pfsense-firewall
53458737 manual-de-usuario-de-pfsense-firewall53458737 manual-de-usuario-de-pfsense-firewall
53458737 manual-de-usuario-de-pfsense-firewall
 
Implementación de NAT/PAT en routers Cisco
Implementación de NAT/PAT en routers CiscoImplementación de NAT/PAT en routers Cisco
Implementación de NAT/PAT en routers Cisco
 
Instalación y Configuración de Exchange 2013 en Windows Server 2012 R2
Instalación y Configuración de Exchange 2013 en Windows Server 2012 R2Instalación y Configuración de Exchange 2013 en Windows Server 2012 R2
Instalación y Configuración de Exchange 2013 en Windows Server 2012 R2
 
Entendiendo el ransomware
Entendiendo el ransomwareEntendiendo el ransomware
Entendiendo el ransomware
 
Introduction to SNMP
Introduction to SNMPIntroduction to SNMP
Introduction to SNMP
 

IPCop Firewall

  • 1. Firewalls Presented by: Mohammed I. Farrah m.farrah.it@gmail.com 26-10-2011
  • 2. What is a Firewall? A firewall is a device or set of devices designed to permit or deny network transmissions based upon a set of rules. (wikipedia)
  • 3. IpCop Firewall IPCop is a Linux distribution which aims to provide a simple-to-manage firewall appliance based on PC hardware. IPCop is a stateful firewall built on the Linux netfilter framework.