Setting up a network and sharing internet

Henry Spencer henry-lqW1N6Cllo0sV2N9l4h3zg at public.gmane.org
Wed Aug 24 15:24:14 UTC 2005


On Wed, 24 Aug 2005, Lennart Sorensen wrote:
> > That can be avoided by giving the eavesdropping computer two Ethernets,
> > and setting it up to act as a bridge (so it doesn't have its own IP
> > addresses etc. to mess up the picture)...
> 
> The truly transparent firewall setup relies on this.  A firewall that
> sits on the wire between two points and can filter traffic without
> either end needing to know about the existence of the firewall.

Yes, a bridging firewall is a nice trick.  Not only need there be no
knowledge of the firewall's existence among users, but it's hard for a bad
guy to attack, because he can't *see* it. 

                                                          Henry Spencer
                                                       henry-lqW1N6Cllo0sV2N9l4h3zg at public.gmane.org

--
The Toronto Linux Users Group.      Meetings: http://tlug.ss.org
TLUG requests: Linux topics, No HTML, wrap text below 80 columns
How to UNSUBSCRIBE: http://tlug.ss.org/subscribe.shtml





More information about the Legacy mailing list