


Configuring IPCop Firewalls 114
Ravi writes "IPCop is a GPLed firewall solution targeted at Small Office/Home Office network. It is favored by many for its ease of configuration and setup and its support for a variety of features that you would expect to have in a modern firewall. IPCop is famed for letting users setup a sophisticated firewall for ones network without ever having to write an iptables rule themselves." Read the rest of Ravi's review.
Configuring IPCOP Firewalls - Closing borders with Open Source | |
author | Barrie Dempster and James Eaton-Lee |
pages | 230 |
publisher | Packt Publishing |
rating | 8.5 |
reviewer | Ravi |
ISBN | 1-904811-36-1 |
summary | A practical book that takes a hands on approach in setting up and configuring IPCop firewall on ones network |
Configuring IPCop Firewalls published by Packt Publishing is authored by two people Barrie Dempster and James Eaton-Lee and is divided into 11 chapters. The first chapter gives a brief introduction to firewalls and explains technical concepts such as OSI reference model, an introduction to TCP/IP and a brief outline of the parts that comprise a network. Even though I did not find anything new in this chapter, I realized that this is meant for people who are new to the world of computer networks and aims to bring them up to date with the various technologies associated with it. A network administrator intending to pick up skills in configuring and setting up IPCop, can circumvent this chapter and go to the second chapter which gives an introduction to IPCop and its different features. The authors have explained the concepts in an easily understood way with the aid of necessary screen-shots. One of the salient features of IPCop is its web based interface which allows one to configure all aspects of it from a remote location. In fact, IPCop is designed to be controlled from a remote location and serves all its configuration parameters via the Apache web server.
In the second chapter, one gets to know all the features of IPCOP including the different services it offer. One thing that struck me while going through this book was that the authors are fully immersed in explaining the configuration aspects of IPCop which is done entirely via the web interface. Other than the first, third, and 10th chapter, where the readers are made to digest some theory, the rest of the book is as a how-to. I found this to be ideally suited for people who are the least bothered about theory and just want to set up IPCop and get on with what they were doing.
In the third chapter, we are introduced to the unique feature used by IPCop to segregate the network depending upon its vulnerability. And in the succeeding chapter, the authors walk one through installing IPCop. Here each and every installation step is explained with the help of a screenshot which makes understanding the procedure much more intuitive.
The chapter titled "Basic IPCop Usage" gives a good introduction to the web interface provided by IPCop. Reading this chapter, I was able to get a good feel for the IPCop interface. More specifically, you learn how to configure IPCop to provide different services such as DHCP server, support for Dynamic DNS, editing the hosts file and so on. The IPCop interface is quite rich in functionality even providing options to reboot or shutdown the machine remotely. In this chapter, apart from the introduction to the web interface, the authors have also provided a few tips related to logging in to the remote machine running IPCop using SSH.
Put in simple terms, IPCop is a specialized Linux distribution which contain a collection of tools which revolve around providing robust firewall capabilities. The tools bundled with IPCop range from the ubiquitous iptables, services such as DNS, and DHCP, to tools which specialize in intrusion detection such as snort.
The sixth chapter titled "Intrusion Detection with IPCop" explains the concept of intrusion detection and how one can use snort IDS bundled with IPCop to effectively find out what is passing through our network and thus isolate any harmful packets.
The book moves on to explain how to use IPCop to set up a virtual private network (VPN). By way of an example, the authors explain how to setup a VPN between two remote networks with each end having a IPCop firewall in place. This chapter covers different VPN scenarios such as host to net, net to net connections as well as configuring IPCop to detect the Certifying Authority certificates.
The 8th chapter is a rather short one which explains how to effectively use proxying and caching solutions available in IPCop to manage the bandwidth.
One of the biggest advantages of IPCop is that it is possible to extend it to provide additional features by way of add-ons. Add-ons are generally developed by third parties and are usually developed with an aim to provide a feature that the developers of IPCop have missed. There are a whole lot of add-ons available for IPCop. The 9th chapter introduces the most popular add-ons available for IPCop such as SquidGuard — a content filtering add-on, LogSend — an add-on which send the IPCop logs to remote email accounts, AntiSpam, integrating ClamAV anti virus solution and more. The authors have also explained how to install and enable these add-ons using the IPCop web interface.
The tenth chapter titled "Testing, Auditing and Hardening IPCop" has more of a theoretical disposition where the authors list some of the common attributes towards security and patch management and also some of the security risks and a few common security and auditing tools and tests.
One thing I really like about this book is the practical approach taken by the authors in explaining how to accomplish a certain task. Each section is accompanied by the relevant screenshots of the web interface with a brief explanation of the options available. The book is well designed with a number of tips provided in each section highlighted in big square brackets which makes it quite eye catching. Even though I found the book a bit short on theory, it is an ideal resource which provides a hands on approach to people who are more interested in installing and setting up IPCop firewall solutions in ones network rather than pondering about the theoretical concepts of the same.
Ravi Kumar likes to share his thoughts on all things related to GNU/Linux, Open Source and Free Software through his blog on Linux.
You can purchase Configuring IPCOP Firewalls - Closing borders with Open Source from bn.com. Slashdot welcomes readers' book reviews -- to see your own review here, read the book review guidelines, then visit the submission page.
Find it here (Score:5, Informative)
A "solution"? It's a distro. (Score:3, Insightful)
Reading the review, I thought that it was some new packet filtering system, like an actual replacement/alternative to iptables that I'd just never heard about.
The review's introduction called it a "solution" which is a generic term for 'anything that does anything, somehow.' Not very descriptive.
Re: (Score:2)
Re: (Score:1)
Re: (Score:2)
Personally I would prefer a PIX over a linux firewall.
Re: (Score:1)
Re: (Score:3, Informative)
Well, if you can afford it, and don't mind learning IOS, great. Reading the replies thus far, it seems the home-user would prefer something else, although that something else seems to include everything but the kitchen sink.
Maybe it's me, but my idea of firewall is something that I manage over a serial cable that isn't doing anything else but handling traffic, and perhaps logging to an external box. A web server, DNS, DHCP, ClamAV, SquidGuard, etc. etc
Re: (Score:2)
I pretty much agree with the way you sorted your chart of firewall uberness, but not everybody has the expertise to set up and use OpenBSD with PF. And as much as I wanted to run OpenBSD on my old PowerMac G4 router, the hardware support just wasn't there.
Linux might not make the most badass packet filter in the world or have OpenBSD's extreme security features, but as an all-around solution – taking into account ease of administration, hardware support, simplicity of installation, and performance
Re: (Score:2)
Re: (Score:2)
PFsense is a good way to get an easy PF-based firewall, but the OS isn't based on OpenBSD and so lacks the rest of OpenBSD's famous security features and code auditing track record. Which by no means is any reason not to use PFsense; my point is only that, no, PFsense isn't "for" an easy way to use OpenBSD instead of Linux on your home or small business router.
Re: (Score:1)
Update on the link (Score:1, Informative)
Re: (Score:1, Offtopic)
Re: (Score:1)
$35.50
Bookpool: Configuring IPCop Firewalls: Closing Borders with Open Source
http://www.bookpool.com/sm/1904811361 [bookpool.com]
$39.99
Amazon.com: Configuring IPCop Firewalls: Closing Borders with Open Source: Books: Barrie, Dempster,James, Eaton-Lee
http://www.amazon.com/Configuring-IPCop-Firewalls- Closing-Borders/dp/1904811361 [amazon.com]
$41.99
Buy.com - Configuring Ipcop Firewalls: Closing Borders with Open Source : Barrie Dempster : ISBN 1904811361
http://www.buy.com/prod/configuring-ipcop-firewall s-closing-borde [buy.com]
Re: (Score:2)
http://www.bookpool.com/ss?qs=Configuring+IPCop+F
Moo (Score:1, Insightful)
It is "one's" not "ones". And, it would have been better to say "for their network".
Is *any* editting done?
Re: (Score:2, Insightful)
Re: (Score:1)
Re: (Score:2)
If you read Slashdot... (Score:5, Informative)
Re: (Score:1)
Baring in mind this was my second only Linux install, my first being RedHat on a Dell laptop, and I'm far from a computer nerd, I would agree that this book is only for the
Re: (Score:1)
I don't want a box that just deflects outside attacks, I want a box that limits the type of connections coming from inside the network going to the outside world. (To only allow web access for the machines on the internal network.) I tinkered with Smoothwall and IPCop 3 years ago when I had Internet access at home, but never really dug into it and don't remember if it had the option to close down outgoing conne
IPCop versus SmoothWall (Score:3, Interesting)
Advantages/Disadvantages? Pros/Cons?
Re:IPCop versus SmoothWall (Score:5, Interesting)
Re: (Score:2, Informative)
I was a paying user of Smoothwall, and the founder was still a total douchebag to me. I was reselling the product to some clients, having had such a good experience with the product in house (my small company of 6 people). There was quite a bit of angst trying to get him to take care of some relatively simple things in the ordering chain...like provide an actual physical product to the client.
Yes, I know it was downloadable. Yes, I know the point of open source/pseudo open source s
Re: (Score:2)
Re: (Score:2)
Fortunately, I did hear some time ago that he left the project. Don't judge today's SmoothWall on yesterday's... douchebag.
Damn, I just love the word douchebag. It needs more usage.
Re: (Score:1)
--Dennis
Re: (Score:2, Informative)
Re:IPCop versus SmoothWall (Score:4, Informative)
In terms of hardware, I was using a Pentium-166, which had *tons* of horsepower for this application (either IPCop or SmoothWall). The only thing was that it was older hardware, and about once a month it would sporadically die
SmoothWall was a compacted Linux distribution, which allowed for the usual Linux apps to be added. Want to your your own ntpd for your home-LAN? No problem. Perhaps some fancy dchp-configuration options - again, no problem.
-sparkyradar
Other options (Score:3, Interesting)
What does IPCop offer that other options (m0n0wall, Smoothwall) don't?
What is the most barebones setup you can manage with it? By that I mean the smallest system requirements to get decent performance?
Re: (Score:3, Informative)
As for hardware config, I'm running a 1GHz P3 that I swiped out of a friend's PC that he was upgrading (long ago - a socket 370). It's got 256MB of RAM, and a 4GB disk, as well. This setup is *way* more than enough to run IPCop. One of it's advantages is a small system footpr
Re: (Score:2, Informative)
Currently I run two at our private school, one is an old ibm e-series celeron 800 and the other is a p3-450. I moved up in processor speed because the current two machines fit in my rack better.
Both perform flawlessly and continuous uptime would be over a year if we didn't have a long power-outtage a couple months ago. I just checked the cpu
Re: (Score:3, Informative)
If, however, you want to do any kind of proxying (Squid for example) or run larger services off of the firewall and you have some old spare machine
Re: (Score:2)
I do not just use IPCop, I also test the LOW end.
Chapter 1 (Score:1)
Preface (Score:2)
Snort and Firewall on Same Box? (Score:2)
For example, there was this http://www.kb.cert.org/vuls/id/175500 [cert.org] compromise from last year. I don't know the status, but it just seems to me this isn't such a good idea.
I can think of a few other reasons why taking the Microsoft approach to a firewall distro isn't good. Most of which boil down to Linux's current status as "more secure" is easily discredited.
An analogy would be all of the features/applications are a long rope with which the distro hangs itself.
I'm thinking t
I've deployed IPcop extensively (Score:4, Interesting)
Most of the IPcop firewalls in the sattelite offices are running on PII or less machines, with the main office on a P4 1.4ghz. Freeswan VPN's are setup between all the office.
Not much more to say than that. Other than a few upgrades (easily done through the web interface) my ipcop boxes have had uptimes around 2 years. Very awesome, reliable firewall.
I'm a fan but ... (Score:2)
IPCop vs DD-WRT (Score:2, Interesting)
IPCop will permenantly dominate if someone manages to port it to the WRT54G. If I could have the amazing power of
Re: (Score:1, Informative)
IPCop vs Firestarter? (Score:1)
Anyone?
Re: (Score:2)
But for home or business use, I would definitely use a dedicated solution like ipcop. I have two internal networks, one wireless for the laptops and another for my linu
Copfilter... (Score:3, Informative)
I'm using IPCop and Copfilter on a LinITX PC for a client and so far he's very happy with the results. LinITX is a mini-ITX PC slightly larger than a Linksys "blue box" router with built-in video/USB/AT (so you don't have to configure it via serial console!), three Ethernet ports, a flash disk slot, room for a 2.5" HDD internally, and 2 on-board IDE controllers - you can even temporarily hook up a generic internal CD-ROM drive for install purposes.
-b.
my only knock on IPCop (Score:2)
But the only knock I have is roadwarrior VPN's & windows. Now I'm sure that part of the problem lies with trying to integrate the two. Net-to-net VPN's are ungodly easy and rock solid. I've tried jumping through the hoops to get a roadwarrior going with no luck, and the most common piece of advice I've seen is to use a third-party add on such as zerina. Dam
Re: (Score:2)
Re: (Score:2)
Yes, there sure is. I mentioned zerina in my post.
Why can't i just go ahead and use the built-in VPN component? That's a usability area IPCop needs to improve. Net-to-net VPN's are simple. Roadwarrior VPN's....not so much.
Re: (Score:1)
Drop me an e-mail if you want to discuss what I did.
imho (Score:2, Informative)
I personally vastly prefer PfSense over any of them for nearly all applications. http://pfsense.com/ [pfsense.com]
Re: (Score:1, Interesting)
If the above were not an issue, I'd probably run IPcop since I found it a bit faster to set up.
As a long-time user of IPCOP (Score:2)
I'm one of those people midway between clueless AOL users and people who actually know what they're doing: I run all linux but don't actually know how to configure ipchains or the like. So I have an old (fanless 486) headless IPCop box downstairs, acting as a firewall and NAT. I got it set up and it's been running for six years, doing what I wanted, without me having to deal with it at all. Nobody (to the best of my knowledge) has ever gotten through it, and I do check
pfSense (Score:2, Insightful)
Re: (Score:1, Informative)
I use both and never experienced a breach on one of them so I cannot give first person experience accounts on their security level. From a sysadmin point of view pfSense looks to me more stable and less prone to update failures, while ipCop supports more devices (I had problems with some wireless NICs under pfSense) but lacks multiple DMZs and other sometimes useful features.
Form a user point of view the IpCop folks should seriously consider grabbing some ideas from the ext
Re: (Score:2)
uptime (Score:2, Informative)
SOHO is the target audience? (Score:2)
Seeing that the average SOHO user is not a computer geek, why would they be the target audience? I ask this because I can go to any online store and buy a $25 hardware firewall that has DHCP, SPI, DynDNS, etc. all built in and ready to go as soon as I plug it in. For IPCop, I would need another PC besides my business PC and make sure I didn't set it up incorrectly and accidentally expose any holes. Then if something goes wron
$0 is less than $25 (Score:2)
In response to your last question, they make images for the Soekris boards which are supposed to be used on CF cards.
Re: (Score:2)
The short asnwer is, because the comparable Cisco would cost you 10x as much. And, being a SOHO you probably can't even consider buying a Cisco.
Is there an advantage for the SOHO person to use IPCop vs. a small hardware firewall for their SOHO?
$25 HW firewall will work, but if you want _any_ other feature not present when you opened the box, you're stuck. With IPCop, you install a plugin or edit a file, and you h
pf please (Score:2, Informative)
But if your firewalls need to have multiple nic's and such, running carp and pfsync, doing all sorts of funky stuff on each, then the web based things suck. The best ive seen is pfsense, but it still suffers from the whole concept of internal/external nic's instead of just letting me sort that shit out.
I use FreeBSD for all my firewalls now, with the exception of one pair of f
Been using IPCop for a while... (Score:2, Informative)
OpenVPN AddOn (Score:1, Informative)
Astaro whoops IPCop (Score:1)
Re: (Score:2)
Seems to me the value-add provided by slashdot, by giving us a review of the book, to me is worth a "kickback". But of course, in any endeavor where the costs are only paid by those willing to do so, there will always be those who not just only take from it, but who do so while pretending they're somehow superior for doing so. (shrug) Whatever.
Re: (Score:2)
Re: (Score:2)
No, slashdot gets money from advertisements only if those advertisements perform for the people running the ads. How many times have you clicked those ads and then followed up by doing some business with one of the advertisers? Affiliate links to places like B&N or other vendors are just part of the wider revenue-generating efforts, and all of the techniques have g
Re:Stop the Ubuntuization of Linux! (Score:5, Interesting)
I am an experienced Linux user and do pretty much everything from the command line. But I find there is a lot to like about the new GUI utilities like gnome-system-tools, especially compared to their MS Windows counterparts.
One of the great things about most Linux GUI configuration utilities is that they use the *same* configuration files that you could edit by hand, and generally try to modify them in a human-readable way. For example, under Debian or Ubuntu, you can edit your
Contrast this with Windows where a lot of things can ONLY be configured with the GUI utilities, which often write their changes to impenetrable, undocumented binary registry keys... very hard to track down. If you try to configure things from the command line in Windows, you'll run into inconsistencies. For example, Windows XP actually has an
So I see the gnome-system-tools style of GUI configuration tools to be a Very Good Thing. These utilities make configuration easier for many people, without preventing them from accessing the underlying configuration in a comprehensive manner, and without leaving the system in an inconsistent state.
Re: (Score:1)
I should add that I don't do any real admin anymore. Most of slashdot would have assumed that the second I mentioned using a GUI.
Re: (Score:2)
GUIs done right, as front-ends for command-line programs or configuration files, can be very powerful and useful tools.
Re: (Score:1)
Re: (Score:1)
Re: (Score:2)
So you want Linux to only be used by "geeks" and have *less* market penetration?
-b.
Re: (Score:3, Insightful)
Nah, he just doesn't want his "1337ness" to go away as people realize that these things really aren't as difficult as they seem
Re:Stop the Ubuntuization of Linux! (Score:5, Insightful)
Spoken like a true computer scientist. I know, I used to be one. You see, the problem is you're spending too much time getting excited about the solution and not enough time looking at the problem.
It certainly doesn't hurt to have an understanding of the underlying mechanics of Linux based firewalls, but it shouldn't have to be a prerequisite of solving your problem. I've been a Linux user for 10+ years and I use IPCop at home. I'm familiar enough with iptables to solve any problems I might encounter, but I'm not interested in any more than that. I actually want to use my computers as tools, rather than spending all my time figuring out how to do something which should be easy.
Would you recommend every motorist should be able to strip their engine down and rebuild it? It just isn't feasible, or sensible.
Well said (Score:2)
Re: (Score:1)
iptables has *always* confused the hell out of me because of its syntax. I can completely dig networks, routing, NAT etc. and all that kind of stuff but I find iptables extremely opaque and counter-intuitive - the last bastion of extreme geekhood - the kind of geek that shouts "RTFM!" at you without a second thought before geeking out some more
As a disclaimer, I've been working as a sysadmin for about the last 7 years and would count myself as a fairly proficient on
Return those Linksys routers! (Score:2)
Re: (Score:1)
Actually I think only wrt54gl uses linux, all of they routers are using vxworks lately.