Any actions and or activities related to the material contained within this Website is solely your responsibility. The misuse of the information in this website can result in criminal charges brought against the persons in question. Cyber Security Associates Limited, will not be held responsible for any criminal charges brought against any individuals misusing the information in these projects to break the law.
Please ensure you are using the latest SD Card image which is available here.
Understand what a firewall is;
Configure the UFW and understand the “rules”;
Understand the difference between a host-based firewall and a network-based firewall.
Component Number (Box Case)
Raspberry Pi + Case
Kali SD Card
External Hard Drive
Firewalls are a key technology in securing a network. They can be deployed on both a network and host level to protect the complete network traffic as well as individual devices. Ideally Firewalls should be combined with other security technologies e.g. IDS and IPS working at both network and host levels to provide holistic network protection. These technologies can also impose a significant drain on processing power and network speeds as all the traffic has to be routed through them to get into the network; hence, cost is also a factor that has to be taken into consideration. Faster physical network firewalls can be expensive and are more suited to large corporate networks. The individual who is manually configuring the firewall also has to be aware of the ports that are being used on that network and its vital services so they don’t accidentally prevent access to a vital service or part of the network.