Skip to main content

Securing Solaris Servers Using Host-based Firewalls

This paper will cover the addition of security to several Solaris servers through the use of host-based firewall software. The servers reside on an unsecured university network. I will attempt to detail the choices that were made in the selection of the firewall software as well as its installation and configuration. I will conclude with a comparison of the vulnerability assessments from before and after. First, I'll describe the topology of the network, and then I'll describe the various servers and their roles on the network. These two pieces of information will set the stage for a discussion of the current security stance of the computers to be protected. I'll talk about the threats, risks, and vulnerabilities that face each machine. Next will be a discussion of the reasons for implementing a firewall setup. Finally, the details of the setup as well as before and after assessment of the servers will be presented.

817 (PDF, 1.80MB)

5 Sep 2002
ByWilliam Karl
Share
All papers are copyrighted

No re-posting of papers is permitted

Subscribe to GIAC’s Monthly Newsletter

Receive expert insights, priority access to certifications, essential updates on regulatory changes and industry developments.