green


Group: Members
Posts: 453
Joined: Oct. 2004 |
 |
Posted: July 08 2006,04:04 |
 |
If you use a different port number, that helps a lot. Like port 222 for ssh, instead of port 22. Lots of people looking for ssh on port 22 but not 222 or something like that.
Better still is to use a dedicated firewall, like the free Smoothwall at smoothwall.org. You can use a low end box to protect your whole network, similar to low end specs for DSL..... i've used a 200mhz, 128mb ram 2gb hdd box for it and it works great. With that, you can have total control of what goes in or out and setup a DMZ for your servers and have them isolated from your LAN so nasties stay out. It offers much more functionality than a linksys type firewall/router alone. I have one of those as well, but for it's wireless capability and not it's firewalling.
|