Florin wrote:
> Randy Welch <[EMAIL PROTECTED]> writes:
>
>
>>Ok after updating to the latest cooker, I reinstalled my firewall with the
>>latest and greatest and I was able to actually go through the
>>configuration! Yippee!
>>
>>However I have a few ocmments about the new SNF...
>>1. It would be nice when doing the setup it could fetch the time
>>configuration and default route from the network config during setup.
>>
>
> Hello again,
>
> for the time configuration, this is feasable.
> I'm not sure about the default route configuration, though.
> Keep in mind that only the network configuration is updated (for the NIC
> cards, not DSP, RNIS, modem, etc)
>
> Say you have an active internet connection with a default route set by
> your ISP ... The update of such a default gateway will give strange
> results for NIC cards if your using another device for your internet
> configuration ...
>
True. I thought about that this morning and I agree with
you here.
>
>>2. When setting up the web proxy you are asked to select what you want
>>for filtering ( DansGuardian or nothing ) however in order to set things
>>up like time limits you really do have to select squidGuard for at least
>>banner filtering. I do *like/want* the time restriction provision to be
>>there by default. (If one leaves DansGuard selected how do you configure
>>it).
>>
>
> right enough ... you could check the latest packages at
> people.mandrakesoft.com/~florin/www/rpms but indeed, I have some problems
> with the dansguardian restart service. It simply doesn't want to restart
> using a script and it does restart by hand ... I'll have a closer look on that.
>
Does dan's guardian allow for time restrictions like
squidGuard? I don't want to lose that functionality.
>
>>3. The configuration of the actual firewall is not geared towards your
>>usual user. I know mandrake prides themselves on the ease of use factor,
>>which even applied to SNF. You didn't need to be a network admin to
>>setup. The 8.2 one I think you do.
>>
>
> The latest version is using a DMZ so, it has to be more advanced in some
> sort of way as you have much more configuration possibilities.
>
> But you still can use the "Add simple rules" menu and use the predefined
> list of services like in the old days (old version, sorry :o)
>
>
>>It is neither intutive or easy. The old 7.2 based SNF was fairly easy to
>>configure for basic usage. You could just select the services you wanted
>>to use by selecting the services you wanted to go through all at once,
>>instead of picking each service one at a time.
>>
>>This needs work in order to appeal to linux newbies or those who really
>>really don't want to be firewall gods.
>>
>
> any ideas are welcome ...
>
In the firewall section it would be nice to have a
easy/basic/quick setup that did the following:
1. Setup NAT
2. Perform necessary setup to allow the following services:
http/https/pop3/smtp/dns/squid ( maybe nntp/ftp/imap )
*without any further intervention from the user*.
I think with this you can give the new user up and going
without a user having to know a whole lot about the in's and
outs of firewalls. The whole firewall section could use
some really clear documentation while you are doing the
configuration so one can have a good idea as to what one is
supposed to do.
With what is currently in 8.2 I suspect you are closer
SuSE's firewall product, read the quote from the UnixReview
article on fire walls about their product:
> The setup program is GUI-based, but you still need to understand how to
> configure a firewall. If you don't know a DMZ from an ACL,
> you'll be totally lost with this product....
I think the new snf is going that way.
>
>>4. With the configuration ( which I'm not sure I've done right.. ) the
>>only way to surf the web is through squid.
>>
>
> Oh no, When you activate squid, this will add the right rules (you can
> verify that). If you only want to surf the web, you should eventually
> masquerade your private network and authorize the http (or www)
> traffic from lan to wan, add a new iptable rule that is.
>
> It's normal and intuitif, I think.
I'll have to think about that. I could not surf without
squid last night though.
>
>
>>I can't talk to my caching
>>name server and I get rejection packets when I try to access a web address
>>via ip address. ( nothing in the log though...)
>>
>
> same thing here, what caching name server are we talking about, the one
> used by the firewall ? In that case, you should authorize the 53 port from
> lan to fw (yes add another rule) or should I add this automatically when
> activating the Caching name server maybe ?
>
Yes it is the caching name server provided by the firewall.
I would recommend that you add the rule automatically
when activating the caching name server.
> One comment though:
> The major difference between the old version and the new one is its
> complexity in terms number of allowed servers, (DMZ, etc).
> In the 7.2 version the adding rules were chewed so that anyone can use it
> because there were only two sides (office and the internet). With the
> latest version, you can have an unlimited number of zones ... so, in order
> to make a service available (say a web server) you need two steps instead
> of one:
> - activate a service in a zone, say an apache (web) server and then
> - add the right iptables rule to allow the corresponding traffic
>
Agreed, however ease of use has been mandrake's hallmark.
For the SOHO market the functionalty as it was in 7.2 got
you up and going in no time. I don't think that should be
lost in the ability to support larger enterprises.
The ability to tweak the config from the gui is certainly
more fine grained than 7.2 ( Yes I tweaked my Bastille based
configs by hand ). And looks quite interesting too. Don't
change that, but don't lose the positive out of box
experience for the newbie/basic user that 7.2 had.
-randy