Announcement

Collapse
No announcement yet.

Hardware Firewalls

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • Hardware Firewalls

    Over the last couple of weeks I've been gathering opinions and experiences about hardware firewalls, but have still yet to reach a final conclusion. The question.. Is it actually worthwhile running a hardware firewall?

    Some history; I run a small network at home, with five CLI Gentoo boxes and ADSL. One box runs limited services (apache, ssh) and the rest are clients/workhorses that require no incoming requests from the outside world (and to my knowledge do a rather fine job of ignoring such things).

    From feedback I've received so far, there are some good opinions for running a hardware firewall...
    • Makes up for having a shite ADSL router i.e. logs, activity/bandwidth reporting, and so on
    • Probably provides some form of security against the most common attacks
    • Provides said form of security between networks (e.g. wired, wireless)


    And also some bad opinions...
    • It complicates the network, opening more security holes than it prevents
    • On a badly configured network, it's the equivelant of taking a rust-ridden car into the paint shop and asking for a "quick touch-up"
    • And the funniest one I've heard yet, "Are you kidding me?". He WAS wearing a trenchcoat though.


    I've searched the DefCon forums and found some vaguely relevant discussions (namely here and here), Skroo's recommendation of the Cisco Pix 501 is burnt into my retinas, and I now have a whole list of topics that need further research before choosing a firewall. Assuming I make the right one, the question still remains. Is it worth running one?

    Opinions/experiences appreciated.
    "There are those who do the work and those who take the credit. I try to be in the first group, there is less competition there." -- Gandhi

  • #2
    Well, you do get a speed and performance boost running some hardware firewalls.
    What have you looked at besides PIX?

    I work in the corporate world, so I have to eval this type of stuff all the time. I can probably provide some insight.

    I return whatever i wish . Its called FREEDOWM OF RANDOMNESS IN A HECK . CLUSTERED DEFEATED CORn FORUM . Welcome to me

    Comment


    • #3
      From an economic standpoint, I think IPCop and other variants do a very nice job for a home network. I have also been testing others as suggested by other members.
      PFSense looks to be very promising for a home network and possibly even larger.
      In a world without walls and fences, who needs Windows and Gates?

      Comment


      • #4
        Originally posted by Spanners
        Opinions/experiences appreciated.

        I would definitely recommend a hardware firewall.

        With that being said, whats your price range? My other big question beyond that is, are you willing to build and configure your own Firewall (like OpenBSd with Pf) or would you rather by one from a vendor?

        Originally posted by stringslayer
        From an economic standpoint, I think IPCop and other variants do a very nice job for a home network. I have also been testing others as suggested by other members.
        PFSense looks to be very promising for a home network and possibly even larger.
        I have a running PFsense box, and at this current time I would definitely recommend people staying away from it. Once the developers get to the point where they will lockdown the features and move towards a beta then perhaps I will recommend it. But at this time it's still too flakey a project to recommend deploying it in any type of semi-hostile environment.

        Comment


        • #5
          Originally posted by Spanners
          The question.. Is it actually worthwhile running a hardware firewall?
          Yes. Consider that a firewall based on <insert major OS here> is ultimately dependent on that OS remaining invulnerable to itself remain invulnerable, and you've got a good argument for external firewalling. Of course, that doesn't mean that there won't be vulnerabilities in hardware routers' firmware... But the instances of that tend to be much lower.

          Some history; I run a small network at home, with five CLI Gentoo boxes and ADSL. One box runs limited services (apache, ssh) and the rest are clients/workhorses that require no incoming requests from the outside world (and to my knowledge do a rather fine job of ignoring such things).
          Honestly, if this is the environment you're intending to protect you'd probably do fine with something like a Linksys WRT54G. Out of the box it supports port forwarding, one DMZ, external logging, PPPoE, and also provides DHCP for the internal network. There are also a LOT of options in terms of third-party firmware for them that add extra functionality; generic Google search is here. I've had one for over two years now and love it, though I do admit that it's no longer my border router/firewall.

          From feedback I've received so far, there are some good opinions for running a hardware firewall...
          • Makes up for having a shite ADSL router i.e. logs, activity/bandwidth reporting, and so on
          • Probably provides some form of security against the most common attacks
          • Provides said form of security between networks (e.g. wired, wireless)
          These are all correct. The security they provide against attacks is obviously only as good as their configuration (and that of any machines they may be in front of), but they're certainly a major improvement over nothing at all.

          And also some bad opinions...
          • It complicates the network, opening more security holes than it prevents
          • On a badly configured network, it's the equivelant of taking a rust-ridden car into the paint shop and asking for a "quick touch-up"
          • And the funniest one I've heard yet, "Are you kidding me?". He WAS wearing a trenchcoat though.
          Taking the points in order:

          1) Whoever told you this should be shot. The whole point of a firewall is to *reduce* the number of holes in a network, not introduce them. Yes, a misconfigured firewall can be worse than none at all, but the generalisation doesn't hold.

          2) Maybe. If it's deployed as shoddily as the rest of the network, sure. See 1) above.

          3) Rocket scientist.

          Assuming I make the right one, the question still remains. Is it worth running one?
          Yes, just don't go overboard if we're only talking domestic use.

          Comment


          • #6
            I know it isn't important to most people, but you should also consider that hardware firewalls tend to use far less power than a full-blown PC. If you are worried about configurability, skroo's suggestion of the WRT54G is a good one because of the open-source firmware projects available.

            Comment


            • #7
              That was going to be my point.
              In the standard home situation, having a dedicated machine on 24/7 is:

              * expensive (if its an old computer it will probably use a resonable amount of electricity)

              * hot...well it will probably produce some heat...might be relevant/important in some situations

              * take up space - seriously...its got to go somewhere...if its just a coverted old computer the case could be relatively large (compared to just a small router). People in small houses may just not have enough room.

              * noise - computer fans can be noisy...maybe a problem?

              Those are all just enrivonmental issues really, that in a coporate situation would just be overlooked as it would be put in a dedicated server room anyway probably.
              In a coporate environment i would without a doubt go for a dedicated machine as the pros outway the cons by a large proportion in my mind.

              At home though, I don't think I would bother. The routers suggested and other ones available off the shelf are much better I think. I have one and they are pretty cool.
              Twigman

              Comment


              • #8
                Just stay away from anything linksys, netgear, d-link, etc's Home-grade stuff. Most of these companies have business class routers and are not that expensive either. Security is a joke for most of these -$100 routers.
                Delicious Poison:

                The difference between a nerd and a geek? Well a nerd does not wear Spider Man butt huggers.

                Comment


                • #9
                  Originally posted by Twigman
                  That was going to be my point.
                  In the standard home situation, having a dedicated machine on 24/7 is:

                  * expensive (if its an old computer it will probably use a resonable amount of electricity)

                  * hot...well it will probably produce some heat...might be relevant/important in some situations

                  * take up space - seriously...its got to go somewhere...if its just a coverted old computer the case could be relatively large (compared to just a small router). People in small houses may just not have enough room.

                  * noise - computer fans can be noisy...maybe a problem?

                  Those are all just enrivonmental issues really, that in a coporate situation would just be overlooked as it would be put in a dedicated server room anyway probably.
                  In a coporate environment i would without a doubt go for a dedicated machine as the pros outway the cons by a large proportion in my mind.

                  At home though, I don't think I would bother. The routers suggested and other ones available off the shelf are much better I think. I have one and they are pretty cool.
                  I agree with that with one exception.
                  If he is indeed running a web server out of his home as stated, he should probably move the site to a hosting service if going the Linksys route. Just my opinion.
                  That is the main reason I recommended the IPCop variant.
                  In a world without walls and fences, who needs Windows and Gates?

                  Comment


                  • #10
                    Originally posted by Twigman
                    In a coporate environment i would without a doubt go for a dedicated machine as the pros outway the cons by a large proportion in my mind.
                    Hang on... Hardware firewalls are dedicated devices - so unless I've missed something here, are you suggesting that corporate environments should run dedicated PCs (for example) as firewalls?

                    Originally posted by klepto
                    Just stay away from anything linksys, netgear, d-link, etc's Home-grade stuff.
                    Disagreed. For home use, these devices work fine for 99.9% of users - and, more importantly, can actually be configured by home users. While it's true that out of the box they're fairly insecure, once configured and deployed they generally aren't much of a problem.

                    Most of these companies have business class routers and are not that expensive either. Security is a joke for most of these -$100 routers.
                    On a similar note, I would never, ever put any of these companies' 'business-class' stuff in a production environment; it's way too rinky-dink. Actually, I'll make one exception to that: Cisco owns Linksys, and I do use Cisco's enterprise-class hardware on a daily basis.

                    Comment


                    • #11
                      Originally posted by skroo
                      Disagreed. For home use, these devices work fine for 99.9% of users - and, more importantly, can actually be configured by home users. While it's true that out of the box they're fairly insecure, once configured and deployed they generally aren't much of a problem.
                      the .1% is hackers. -100 routers dont have ingress filtering which is very important to tech/hacker nerds & geeks. Your basic netgear will protect you from those stupid script kiddies who do port range scanning to find if netbios is up on any of the nodes, but if your attacker knows your IP address. Then you might as well throw it out, its useless. Dlink and Netgear's configuration I believe, you have to play with it a little and lock it down. Linksys is the better of the bunch with everything disabled.

                      Business grade routers do have the option for egress/ingress filtering and that's why I recommended it.

                      On a similar note, I would never, ever put any of these companies' 'business-class' stuff in a production environment; it's way too rinky-dink. Actually, I'll make one exception to that: Cisco owns Linksys, and I do use Cisco's enterprise-class hardware on a daily basis.
                      I meant to state that he should use the 'business-class' stuff for home use. If you want REAL business grade stuff, then go for Juniper or F5
                      Delicious Poison:

                      The difference between a nerd and a geek? Well a nerd does not wear Spider Man butt huggers.

                      Comment


                      • #12
                        Originally posted by klepto
                        Dlink and Netgear's configuration I believe, you have to play with it a little and lock it down. Linksys is the better of the bunch with everything disabled.
                        Mmmm... The Linksys units are still in need of some TLC out of the box, same as the others. As for egress/ingress filtering, this is where the ability to change to a 3rd-party firmware comes in.

                        Business grade routers do have the option for egress/ingress filtering and that's why I recommended it.
                        True, but not everyone has the budgetary constraints to run that hardware.

                        I meant to state that he should use the 'business-class' stuff for home use. If you want REAL business grade stuff, then go for Juniper or F5
                        *Shrug* if wishes we're horses, I'd have some Maseratis and a helicopter.

                        Comment


                        • #13
                          Originally posted by skroo
                          Mmmm... The Linksys units are still in need of some TLC out of the box, same as the others. As for egress/ingress filtering, this is where the ability to change to a 3rd-party firmware comes in.
                          Not much 3rd party firmware, most are WAP or WIFI-Router hacks.

                          True, but not everyone has the budgetary constraints to run that hardware.
                          Depends, You can get a linksys rv042 for about 150 bucks if you look hard. and since the thread starter has a network, and doesn't use the router/switch unit, then I assume he/she is using a standalone switch. buy that linksys router for 150 bucks and slap on the switch since he has 5 nodes, Router only handles 4 direct links. The router handles ingress/filtering and many other options. US robotics also has a pretty decent unit that can offer the same protection/options with around the same price if not a lil bit higher.
                          Delicious Poison:

                          The difference between a nerd and a geek? Well a nerd does not wear Spider Man butt huggers.

                          Comment


                          • #14
                            Originally posted by Twigman
                            That was going to be my point.
                            In the standard home situation, having a dedicated machine on 24/7 is:

                            Listen, if you're replying to a post that is not the parent poster it's consider bad taste and confusing to not quote it. The reason for this is, I don't know if you're replying to my post in this thread or someone elses.

                            Comment


                            • #15
                              Originally posted by noid
                              What have you looked at besides PIX?
                              I've looked at very little in the vendor world to be honest, your advice would be invaluable. Random homebrew research has suggested IPCop, Smoothwall, Devil or just self-tweaked 2.6.x kernel stuff if time and motivation permitted.

                              Originally posted by highwizard
                              price range? .. configure your own .. or .. vendor?
                              No particular budget but being frugal helps me sleep at night. No preferences between homebrew/vendor, but I assume a homebrew solution gives a lot more control.

                              Originally posted by skroo
                              something like a Linksys WRT54G .. There are also a LOT of options in terms of third-party Firmware
                              Thanks Skroo, some of the third-party firmware looks excellent. What made you change your setup from the WRT54G out of interest?

                              Sorry for starting a firewall war! My initial question is answered - Yes I should use a hardware firewall.
                              "There are those who do the work and those who take the credit. I try to be in the first group, there is less competition there." -- Gandhi

                              Comment

                              Working...
                              X