## Hardware Firewall ::

A Hardware Firewall is a network device that is connected upstream from a server. The Firewall blocks unwanted traffic from a server before the traffic ever reaches the server. The main advantage to having a Hardware Firewall is that a server only has to handle ‘good’ traffic and no resources are wasted dealing with the ‘bad’ traffic.

## Configure And Editing Rules of a Hardware Firewall :

Configuring a Firewall is as simple as creating a set of rules to allow access to certain ip addresses and ports from specific internet addresses.

When a Firewall is first added to a server, a set of rules is initially put in place that allows all traffic to reach the server. The rules can then be edited to control the traffic reaching the server. Rules are displayed in order with lower numbered rules having precedence over higher number rules.

From the Firewall management link, click on the ‘edit’ link for the Firewall to be configured. The page will display a block showing a tab with the current rules in effect plus several tabs containing templates customized for the server’s operating system.

At this point links are available to edit the current rules or start fresh using a template. Once the user has selected to either edit the current rules, or edit a new configuration starting with a template, a list of rules is shown with an ‘edit’ button on each line. This list of rules is known as the ‘working config’. A ‘working config’ is a set of rules that is in the process of being created but has not yet been applied to the Firewall. A user may edit, add, and delete rules until the rule set is completed and then apply the rules to the Firewall which will put the rule set into effect.

Clicking on the ‘edit’ button takes the user to a rule edit form.

The fields are:

 1.  Order – this select list controls the order in which rues are evaluated.
 2.  Action – this select list is used to ‘permit’ or ‘deny’ traffic matching this rule.
 3.  Source IP – this ip address field can be either ‘any’ or a specific ip address (must tbe an ip, not a name).
 4. Source IP Mask – this select list is used when a range of ips is required for a rule, usually set to ‘entire internet’.
 5. Destination Ports – these two fields allow selection of the port or port range for the rule (for one port, put the same port number in both fields).
6. Protocol – this select list allows the rule to only be appliced for a specific protocol (usually tcp).

## Common Ports Used by application :

FTP – 21
SSH – 22
Telnet – 23
SMTP – 25
DNS – 53
HTTP – 80
POP3 – 110
IMAP – 143
HTTPS – 443
MSSQL – 1433
MySQL – 3306
Remote Desktop – 3389
PostgreSQL – 5432
VNC Web – 5800
VNC Client – 5900
Urchin – 9999 or 10000

# Applying Rules :

Once the ‘working config’ is complete, press the ‘Apply Config’ button to have the ‘working config’ applied to the Firewall. The rules should take effect immediately.
Bypassing the Firewall

If a user wishes to have all traffic temporarily pass through the Firewall, a ‘Bypass’ button is available on many of the Firewall management pages. When a Firewall is in this mode, a rule is put in place to allow all traffic to pass through. The last set of applied rules is still stored and may be put back into effect at any time by re-applying the configuration. While in bypass mode, the status line on the Firewall management pages will display ‘bypassed’.

This is Help Full to all .….. 🙂 🙂 🙂

What is Web hosting

 

Web hosting is a service that serves your website to anyone that visits it. While it’s possible to host your own web site from a computer at your house, it’s generally better to choose a web hosting provider that stores your web site on fast servers in a data center with fast connections, that on 24/7. When you visit any website, your computer is actually connecting to another computer that sends the files to your web browser, which then renders those files into web pages that you view.

Web Hosting is like an Art Store – An Analogy.

One way to look at web hosting is that it is similar to an art store.  An art store provides you paint, brushes, canvases, and other tools you need to paint a painting, however the art store does not paint the painting for you.  You select the tools you want to use and purchase them from the art store, and then  use those tools to build your website.  Or hire a painter to paint a picture for you.

Similarly, a web hosting company, like HostGator, provides you a variety of tools that you can use to build your website, such as a server and web space where you can upload your website, control panels that make it easy for you to configure your web hosting account, and even gives you the ability to install scripts like WordPress or use one of our many site building solutions.  However, the web host does not actually build your website.  You can choose to built it yourself
using the many tools provided or hire a web designer to develop your website for you.

### There are many different types of web hosting plans, including ::

1. Shared hosting – Usually recommended for new websites, as it’s the most economical way to start a website.
 Your site is placed on a server with other websites to share the resources.

 2. VPS hosting – Recommended for more advanced users, and those needing to install specific packages or software not provided by shared hosting. Your website is placed on a server with other websites, like shared hosting, but usually there’s less websites per server. Also includes root or admin access to its own operating system installation in a visualized environment.   

  3. Dedicated servers – When you get a dedicated server, your website(s) get access to the full server, since it’s not shared with any other users. Also includes full root or admin access like a VPS. This is the recommended route for websites with lots of visitors (traffic) or custom requirements not available in a shared hosting environment.

  4. Reseller hosting – This service is geared for webmasters, or others, who want to resell their own web hosting service. It’s also a good option for those with multiple websites, as it makes it easier to manage many websites under one control panel.

 

;; I hope this is very use full to all.

Installing Software on Linux

Linux

One of the most difficult things to get used to in the Linux world is installing new software packages. In the world of Windows, every program comes with  a Setup.exe program that asks you some very easy questions and takes care of the job for you. While Linux software can be almost that easy to install, you will  sometimes find software that seems to fight every step of the way. I can’t cover all the problems you might run into, but I’ll try to give you the basics and a few pointers to help get you over the rough spots.

Software tends to come in “packages”. In the Windows world a package is a Setup.exe or a program.zip file. On a Mac a package is a program.dmg or a program.sit file.In the Linux world, there are several kinds of packages, and each distribution has its own preferred package format.
The standard Linux package format (according to the Linux Standard Base) is RPM and DEB (Debian) software package.. RPM is a packaging system originally developed by Red Hat and widely used in the Linux community. Distributions using it include Fedora, Mandriva, Red Hat and SUSE.

Note : Remember, you will need to become SuperUser to install software.

1. APT ( Debian, Ubuntu) ::

There is a broad array of tools for working with DEB packages, but the one you will commonly use is apt-get, is the easiest of Linux package management tools. apt-get is so easy because it not only keeps track of what packages are installed, but also what other packages are available. It will even download them from the Internet for you (if properly configured).

> To install software ;

apt-get install ${packagename}

> To remove software is just as easy.

apt-get remove ${packagename}

> To update the APT database:

apt-get update

> A common idiom is to update your package database, and then upgrade all the packages that have patches or security updates to install. The following command will do this all at once.

apt-get update; apt-get upgrade

2.  yum :(Fedora, Red Hat) ::

Like apt-get, yum can download and install packages from a configured repository.

> To install software ;

yum install ${packagename}

>To remove software is just as easy;

yum remove ${packagename}

> yum does not keep a local copy of your package database by default, so normally there is no need to update it. To install all available security patches and bug fixes, use this command:

You can also explicitly update a single package with:

yum update ${packagename}

;; I hope this is very use full to all.