haqking: Thanks for that - food for thought.
I still don't really understand how a software firewall provides protection that NAT does not. For instance, if I run a couple of local services (such as SHH and NFS) on my LAN,
how are these visible to the "outside world" after going through my NAT router? eg nmap on my LAN reports:
Code:
Not shown: 997 closed ports
PORT STATE SERVICE
22/tcp open ssh
111/tcp open rpcbind
2049/tcp open nfs
but GRC ShieldsUP claims full stealth mode on all ports facing the internet.
If a NAT "firewall" cannot stop such traffic then why would a software firewall manage to do so?
I appreciate that you make your living selling security knowledge to businesses who are, presumably, running INTERNET services. In such circumstances I know that additional hardening is essential. However, for home users who generally run few, if any, servers, is a high level of hardening really desirable if configuration and maintenance of the necessary rules will make usability difficult?
I must admit that I keep thinking of "elephant powder".
Bookmarks