[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[no subject]



That's funny.  I've been looking for good lawn service...


On Monday 05 July 2004 11:16 pm, Christopher Fowler wrote:
&gt; <a  rel="nofollow" href="http://www.hotbrick.com/vpn1200.html";>http://www.hotbrick.com/vpn1200.html</a>
&gt;
&gt; Try that one out.
&gt;
&gt; I know I'll draw flames bit I tend to see two mindsets in this list
&gt; group.
&gt;
&gt; The first one is those who want to reinvent the wheel to learn the
&gt; internals. The others are those who value their money far more than their
&gt; time.
&gt;
&gt; When you start doing consultgin you realize that your time could
&gt; be valuable.  You start doing crazy stuff like paying other people
&gt; to cut your grass.
&gt;
&gt; On Mon, Jul 05, 2004 at 11:01:07PM -0400, David Hamm wrote:
&gt; &gt; Chris,
&gt; &gt;
&gt; &gt; &gt; Sub $100 is a good target but might not have all the features.
&gt; &gt;
&gt; &gt; Your right and that's why I posed the question to the group.  The unit I
&gt; &gt; am considering is this one.
&gt; &gt;
&gt; &gt; <a  rel="nofollow" href="http://www.netgear.com/products/details/FVL328.php?view=sb";>http://www.netgear.com/products/details/FVL328.php?view=sb</a>
&gt; &gt;
&gt; &gt; It sells for around $400.00 but doesn't support OSPF.  I was hoping
&gt; &gt; someone on the list had experience some other vendor and could suggest a
&gt; &gt; firewall that did support OSPF  Recently I installed a layer 3 switch
&gt; &gt; from D-Link the price was much less than expected, it worked great and
&gt; &gt; was easy to set up.  I'd hoped to get a simlar experience from on this
&gt; &gt; firewall
&gt; &gt;
&gt; &gt; Thanks for your suggestions.  I seem to remember something about a &quot;hot?
&gt; &gt; brick&quot; firewall too.
&gt; &gt;
&gt; &gt; On Monday 05 July 2004 09:41 pm, Christopher Fowler wrote:
&gt; &gt; &gt; Honestly though what I do at home is different that what I would
&gt; &gt; &gt; reccomend a commercail outfit.  I would never ask one of my customers
&gt; &gt; &gt; to go to BestBuy and purchase a firewall for their corporation.
&gt; &gt; &gt;
&gt; &gt; &gt; I've seen a sub $500 product that also looked good.  It was called a
&gt; &gt; &gt; Hot Brick. I believe the 12 port unit was $600 and the 6 port was under
&gt; &gt; &gt; 5.  In reality all I need for my firewall device is a Wan port and Lan
&gt; &gt; &gt; port. Cisco switches can make up for the rest.
&gt; &gt; &gt;
&gt; &gt; &gt; I have a habit of buying cheap switches from Micro Center that have
&gt; &gt; &gt; rebates. For me that is okay.  I have many on the network and it seems
&gt; &gt; &gt; that they just do not like to work very well together.  I have to place
&gt; &gt; &gt; my laptop on an old 10mb hub because SMB traffic fails on these
&gt; &gt; &gt; switches. Everything else works great.  It could be Zinc Whiskers or
&gt; &gt; &gt; the fact these are cheap products that are geared for the end user at
&gt; &gt; &gt; home.
&gt; &gt; &gt;
&gt; &gt; &gt; On Mon, Jul 05, 2004 at 05:36:16PM -0400, David Hamm wrote:
&gt; &gt; &gt; &gt; On Monday 05 July 2004 11:13 am, James P. Kinney III wrote:
&gt; &gt; &gt; &gt; &gt; There is a series of firewall products whose name brand escapes me
&gt; &gt; &gt; &gt; &gt; (search on slashdot) that has a backdoor password that was
&gt; &gt; &gt; &gt; &gt; embedded. The patch was a flash upgrade that turned off the
&gt; &gt; &gt; &gt; &gt; password use from the outside connection. Further study showed the
&gt; &gt; &gt; &gt; &gt; power reset would revert back to the default allow remote login
&gt; &gt; &gt; &gt; &gt; with backdoor password.
&gt; &gt; &gt; &gt;
&gt; &gt; &gt; &gt; The units you are speaking of are Linksys's WRT54G and NetGear's
&gt; &gt; &gt; &gt; WG602. They are both both wireless gateways and I didn't find similar
&gt; &gt; &gt; &gt; problems with other products from these manufacturers.
&gt; &gt; &gt; &gt;
&gt; &gt; &gt; &gt; &gt; see above. If I get the time today, I'll dig up the references I
&gt; &gt; &gt; &gt; &gt; was reading on this. It's about 2 months old (or so)
&gt; &gt; &gt; &gt; &gt;
&gt; &gt; &gt; &gt; &gt; The VPN in many off the shelf devices is PPtP which has numerous,
&gt; &gt; &gt; &gt; &gt; well known vulnerabilities. PPtP is used often as it is easy to do
&gt; &gt; &gt; &gt; &gt; and older M$ machines support it easily with little support needed
&gt; &gt; &gt; &gt; &gt; to set it up.
&gt; &gt; &gt; &gt; &gt;
&gt; &gt; &gt; &gt; &gt; When I think of a VPN, I'm thinking IPSec with pre-shared keys.
&gt; &gt; &gt; &gt; &gt; There are many firewall boxes that support IPSec with pre-shared
&gt; &gt; &gt; &gt; &gt; keys. None are in the $100 range. All require additional license
&gt; &gt; &gt; &gt; &gt; purchase for multiple VPN client access.
&gt; &gt; &gt; &gt; &gt;
&gt; &gt; &gt; &gt; &gt; A _real_ VPN server can act as the end point for the VPN tunnel.
&gt; &gt; &gt; &gt; &gt; Most of the firewall devices out there _support_ VPN by merely
&gt; &gt; &gt; &gt; &gt; passing IPSec datagrams freely. They do not act as a VPN server or
&gt; &gt; &gt; &gt; &gt; client.
&gt; &gt; &gt; &gt;
&gt; &gt; &gt; &gt; Take a look at this.  If you still don't believe they do IPSec we can
&gt; &gt; &gt; &gt; have a VNC session and you can watch me set up a couple of tunnels if
&gt; &gt; &gt; &gt; you still don't believe it.
&gt; &gt; &gt; &gt;
&gt; &gt; &gt; &gt; <a  rel="nofollow" href="http://netgear.com/products/prod_details.php?prodID=129&amp;view=sb";>http://netgear.com/products/prod_details.php?prodID=129&amp;view=sb</a>
&gt; &gt; &gt; &gt;
&gt; &gt; &gt; &gt; &gt; **NOTE** I don't regularly check all the stats on new network
&gt; &gt; &gt; &gt; &gt; hardware that does in silicon what I prefer to do in RAM. The last
&gt; &gt; &gt; &gt; &gt; sweep of firewall technology I did was Feb. 2004 and that was of
&gt; &gt; &gt; &gt; &gt; corporate firewall products that support IPSec. None of those was
&gt; &gt; &gt; &gt; &gt; less than $1500.
&gt; &gt; &gt; &gt; &gt;
&gt; &gt; &gt; &gt; &gt; &gt; &gt; All of the off-the-shelf firewall devices are generic boxes
&gt; &gt; &gt; &gt; &gt; &gt; &gt; that are cookie cutter rule sets for a limited set of
&gt; &gt; &gt; &gt; &gt; &gt; &gt; protection scenarios. The ability to ssh into the firewall and
&gt; &gt; &gt; &gt; &gt; &gt; &gt; adjust as needed is absolutely priceless.
&gt; &gt; &gt; &gt; &gt; &gt;
&gt; &gt; &gt; &gt; &gt; &gt; Yes, I like ssh and IPtables too but this isn't a problem for
&gt; &gt; &gt; &gt; &gt; &gt; that solution.
&gt; &gt; &gt; &gt; &gt;
&gt; &gt; &gt; &gt; &gt; Then have the client spend the $100 for &quot;The Emperors New Clothes&quot;
&gt; &gt; &gt; &gt; &gt; firewall product. Make sure you get a release of liability document
&gt; &gt; &gt; &gt; &gt; signed before you put it in. If it is a product that _you_
&gt; &gt; &gt; &gt; &gt; recommend, you WILL be the first person called on a problem. I have
&gt; &gt; &gt; &gt; &gt; found supporting products that I don't have complete and full
&gt; &gt; &gt; &gt; &gt; access to difficult at best and impossible at worst. I don't like
&gt; &gt; &gt; &gt; &gt; being in the position of having the responsibility for a situation
&gt; &gt; &gt; &gt; &gt; but not the authority to do what I see is best to make the solution
&gt; &gt; &gt; &gt; &gt; happen.
&gt; &gt; &gt; &gt;
&gt; &gt; &gt; &gt; I'm sorry, this discussion has ended as far as I am concerned.  The
&gt; &gt; &gt; &gt; only real help I got was from Chris suggesting I look at a new
&gt; &gt; &gt; &gt; vendor.  The above comments don't posses and characteristics of
&gt; &gt; &gt; &gt; prductive dialog and could easily be detrimental to some.
&gt; &gt; &gt; &gt;
&gt; &gt; &gt; &gt; &gt; &gt; On Sunday 04 July 2004 08:31 pm, James P. Kinney III wrote:
&gt; &gt; &gt; &gt; &gt; &gt; &gt; On Sun, 2004-07-04 at 16:15, David Hamm wrote:
&gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; Thanks for the links and suggestions but this firewall is for
&gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; a client and building a custom firewall will not be price
&gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; competitive; Especially if you consider the ease of use
&gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; available for $100 from Netgear and D-Link.
&gt; &gt; &gt; &gt; &gt; &gt; &gt;
&gt; &gt; &gt; &gt; &gt; &gt; &gt; Both of those have known security issues. Neither support VPN
&gt; &gt; &gt; &gt; &gt; &gt; &gt; connections directly. Having a hardware device that has had a
&gt; &gt; &gt; &gt; &gt; &gt; &gt; backdoor password that is HARDCODED into the silicon and well
&gt; &gt; &gt; &gt; &gt; &gt; &gt; published is a waste of cash. One the power blinks, they go
&gt; &gt; &gt; &gt; &gt; &gt; &gt; back to the default backdoor settings.
&gt; &gt; &gt; &gt; &gt; &gt; &gt;
&gt; &gt; &gt; &gt; &gt; &gt; &gt; The upfront cost of buying a supportable setup is negligible
&gt; &gt; &gt; &gt; &gt; &gt; &gt; compared to the replacement cost over time of upgrading the
&gt; &gt; &gt; &gt; &gt; &gt; &gt; firewall hardware system everytime a new feature to stop a new
&gt; &gt; &gt; &gt; &gt; &gt; &gt; style of attack is not upgradeable by a flash of the bios.
&gt; &gt; &gt; &gt; &gt; &gt; &gt;
&gt; &gt; &gt; &gt; &gt; &gt; &gt; All of the off-the-shelf firewall devices are generic boxes
&gt; &gt; &gt; &gt; &gt; &gt; &gt; that are cookie cutter rule sets for a limited set of
&gt; &gt; &gt; &gt; &gt; &gt; &gt; protection scenarios. The ability to ssh into the firewall and
&gt; &gt; &gt; &gt; &gt; &gt; &gt; adjust as needed is absolutely priceless.
&gt; &gt; &gt; &gt; &gt; &gt; &gt;
&gt; &gt; &gt; &gt; &gt; &gt; &gt; Besides, how else are you going to run Bob's ruleset?!
&gt; &gt; &gt; &gt; &gt; &gt; &gt;
&gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; On Sunday 04 July 2004 03:40 pm, Dow Hurst wrote:
&gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; David Hamm wrote:
&gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; Hi,
&gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt;
&gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; I'm looking for a firewall that supports IPSEC for VPN
&gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; and OSPF. Netgear has
&gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; stuff I found attractive but with no OSPF support. Moving
&gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; parts (ie fans and
&gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; disks ), and user licensing are out. Anyone have any
&gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; suggestions?
&gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt;
&gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; Thanks.
&gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; _______________________________________________
&gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; Ale mailing list
&gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; Ale at ale.org
&gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; <a  rel="nofollow" href="http://www.ale.org/mailman/listinfo/ale";>http://www.ale.org/mailman/listinfo/ale</a>
&gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt;
&gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; Look at building it yourself using Slackware, Bob Toxen's
&gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; second edition of his book, and a Epia based fanless
&gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; supersmall machine with dual builtin NICs.  His book has
&gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; drop in iptables rules that are excellent. Once you get
&gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; that far then going thru the IPSEC Howto is not too
&gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; difficult.  Just involves a kernel module compile and
&gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; insertion.
&gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt;
&gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt;
&gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt;
&gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; Links:
&gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; <a  rel="nofollow" href="http://www.tldp.org/HOWTO/VPN-Masquerade-HOWTO.html#toc3";>http://www.tldp.org/HOWTO/VPN-Masquerade-HOWTO.html#toc3</a>
&gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; <a  rel="nofollow" href="http://www.impsec.org/linux/masquerade/ip_masq_vpn.html";>http://www.impsec.org/linux/masquerade/ip_masq_vpn.html</a>
&gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; <a  rel="nofollow" href="http://www.onlamp.com/pub/a/bsd/2004/03/11/Big_Scary_Daemon";>http://www.onlamp.com/pub/a/bsd/2004/03/11/Big_Scary_Daemon</a>
&gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt;s.ht ml (this is one idea)
&gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt;
&gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt;
&gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; _______________________________________________
&gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; Ale mailing list
&gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; Ale at ale.org
&gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; <a  rel="nofollow" href="http://www.ale.org/mailman/listinfo/ale";>http://www.ale.org/mailman/listinfo/ale</a>
&gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt;
&gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; _______________________________________________
&gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; Ale mailing list
&gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; Ale at ale.org
&gt; &gt; &gt; &gt; &gt; &gt; &gt; &gt; <a  rel="nofollow" href="http://www.ale.org/mailman/listinfo/ale";>http://www.ale.org/mailman/listinfo/ale</a>
&gt; &gt; &gt; &gt; &gt; &gt;
&gt; &gt; &gt; &gt; &gt; &gt; _______________________________________________
&gt; &gt; &gt; &gt; &gt; &gt; Ale mailing list
&gt; &gt; &gt; &gt; &gt; &gt; Ale at ale.org
&gt; &gt; &gt; &gt; &gt; &gt; <a  rel="nofollow" href="http://www.ale.org/mailman/listinfo/ale";>http://www.ale.org/mailman/listinfo/ale</a>
&gt; &gt; &gt; &gt; &gt; &gt;
&gt; &gt; &gt; &gt; &gt; &gt; !DSPAM:40e8cd85313746117867552!
&gt; &gt; &gt; &gt;
&gt; &gt; &gt; &gt; _______________________________________________
&gt; &gt; &gt; &gt; Ale mailing list
&gt; &gt; &gt; &gt; Ale at ale.org
&gt; &gt; &gt; &gt; <a  rel="nofollow" href="http://www.ale.org/mailman/listinfo/ale";>http://www.ale.org/mailman/listinfo/ale</a>
&gt; &gt; &gt;
&gt; &gt; &gt; _______________________________________________
&gt; &gt; &gt; Ale mailing list
&gt; &gt; &gt; Ale at ale.org
&gt; &gt; &gt; <a  rel="nofollow" href="http://www.ale.org/mailman/listinfo/ale";>http://www.ale.org/mailman/listinfo/ale</a>
&gt; &gt;
&gt; &gt; _______________________________________________
&gt; &gt; Ale mailing list
&gt; &gt; Ale at ale.org
&gt; &gt; <a  rel="nofollow" href="http://www.ale.org/mailman/listinfo/ale";>http://www.ale.org/mailman/listinfo/ale</a>
&gt;
&gt; _______________________________________________
&gt; Ale mailing list
&gt; Ale at ale.org
&gt; <a  rel="nofollow" href="http://www.ale.org/mailman/listinfo/ale";>http://www.ale.org/mailman/listinfo/ale</a>


</pre>
<!--X-Body-of-Message-End-->
<!--X-MsgBody-End-->
<!--X-Follow-Ups-->
<hr>
<ul><li><strong>Follow-Ups</strong>:
<ul>
<li><strong><a name="00168" href="msg00168.html">[ale] OT: Firewall purchase</a></strong>
<ul><li><em>From:</em> vf5 at plm.gatech.edu (Vincent Fox)</li></ul></li>
</ul></li></ul>
<!--X-Follow-Ups-End-->
<!--X-References-->
<ul><li><strong>References</strong>:
<ul>
<li><strong><a name="00073" href="msg00073.html">[ale] OT: Firewall purchase</a></strong>
<ul><li><em>From:</em> ale at spinnerdog.com (David Hamm)</li></ul></li>
<li><strong><a name="00138" href="msg00138.html">[ale] OT: Firewall purchase</a></strong>
<ul><li><em>From:</em> ale at spinnerdog.com (David Hamm)</li></ul></li>
<li><strong><a name="00139" href="msg00139.html">[ale] OT: Firewall purchase</a></strong>
<ul><li><em>From:</em> cfowler at outpostsentinel.com (Christopher Fowler)</li></ul></li>
</ul></li></ul>
<!--X-References-End-->
<!--X-BotPNI-->
<ul>
<li>Prev by Date:
<strong><a href="msg00141.html">[ale] Q: Should Linux swap space depend on number of users?</a></strong>
</li>
<li>Next by Date:
<strong><a href="msg00143.html">[ale] quick USB storage device question</a></strong>
</li>
<li>Previous by thread:
<strong><a href="msg00139.html">[ale] OT: Firewall purchase</a></strong>
</li>
<li>Next by thread:
<strong><a href="msg00168.html">[ale] OT: Firewall purchase</a></strong>
</li>
<li>Index(es):
<ul>
<li><a href="maillist.html#00142"><strong>Date</strong></a></li>
<li><a href="threads.html#00142"><strong>Thread</strong></a></li>
</ul>
</li>
</ul>

<!--X-BotPNI-End-->
<!--X-User-Footer-->
<!--X-User-Footer-End-->
</body>
</html>