Firewall PI

DISCLAIMER

Any actions and or activities related to the material contained within this Website is solely your responsibility. The misuse of the information in this website can result in criminal charges brought against the persons in question. Cyber Security Associates Limited, will not be held responsible for any criminal charges brought against any individuals misusing the information in these projects to break the law.

Please ensure you are using the latest SD Card image which is available here.

 

Learning Outcomes

  • Understand what a firewall is;

  • Configure the UFW and understand the “rules”;

  • Understand the difference between a host-based firewall and a network-based firewall.

 

Hardware Required

Component Number (Peli Case)

(Base) 4 + 5

(Base) 5

(Base) 6

(Base) 6

(Level 1) 3

(Level 1) 3

(Level 1) 5

(Level 1) 1

Component Number (Box Case)

Slot 1

Slot 11

Slot 2

Slot 11

Slot 11

Slot 11

Slot 12

Slot 13

Component

Raspberry Pi + Case

Kali SD Card

External Hard Drive

USB lead

HDMI

Wireless Keyboard

Wireless Mouse

Power Supply

 

Video Guide

 

Conclusion

Firewalls are a key technology in securing a network. They can be deployed on both a network and host level to protect the complete network traffic as well as individual devices. Ideally Firewalls should be combined with other security technologies e.g. IDS and IPS working at both network and host levels to provide holistic network protection. These technologies can also impose a significant drain on processing power and network speeds as all the traffic has to be routed through them to get into the network; hence, cost is also a factor that has to be taken into consideration. Faster physical network firewalls can be expensive and are more suited to large corporate networks. The individual who is manually configuring the firewall also has to be aware of the ports that are being used on that network and its vital services so they don’t accidentally prevent access to a vital service or part of the network.