Firewall: The Perimeter Sentry
The Instructor's Perspective
Why use it?
- Perimeter Security: Blocking the noise of the internet.
- Segmentation: Keeping your IoT “smart bulbs” away from your hypervisor and storage.
- Visibility: Logging what is trying to get in (and what is trying to “phone home”).
Firewall Reliability (The PACE Plan)
Connectivity Discipline
P (Primary): Dedicated hardware appliance (e.g., pfSense/OPNsense on a low-power PC). A (Alternate): Virtualized Firewall instance on your Hypervisor (e.g., Proxmox). C (Contingency): Secondary “Cold-Standby” hardware or a basic router with strict ACLs. E (Emergency): Direct connection with host-based firewalls (UFW/Firewalld) active on all critical nodes.
Standard Operating Procedure (SOP) Best Practices
- Default Deny: Start by blocking everything. Only open what is strictly necessary.
- Egress Filtering: Control what your devices can reach on the internet.
- Log & Review: A firewall you don’t monitor is just a “manageable mess” waiting to happen. Use Grafana or NtopNG to see what’s happening.
Check for Understanding
- Why is a virtualized firewall (Alternate) generally less reliable than a physical one (Primary)?
- If you have to “Emergency” bypass your firewall, what host-level security must be in place?