<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Firewall on Technical Notes</title><link>http://luispa.com/en/tags/firewall/</link><description>Recent content in Firewall on Technical Notes</description><generator>Hugo -- 0.148.0</generator><language>en-US</language><lastBuildDate>Sun, 20 Jun 2021 00:00:00 +0000</lastBuildDate><atom:link href="http://luispa.com/en/tags/firewall/index.xml" rel="self" type="application/rss+xml"/><item><title>Home Pi-hole</title><link>http://luispa.com/en/posts/2021-06-20-pihole-casero/</link><pubDate>Sun, 20 Jun 2021 00:00:00 +0000</pubDate><guid>http://luispa.com/en/posts/2021-06-20-pihole-casero/</guid><description>&lt;img src="http://luispa.com/img/posts/logo-pihole.svg" alt="pihole logo" width="150px" height="150px" style="float:left; padding-right:25px" />
&lt;p>Pi-hole is a DNS (and DHCP) server that protects your devices from unwanted content, without needing to install any software on the clients in your network. &lt;strong>Its use case is to act as a sinkhole for the advertising that floods today&amp;rsquo;s networks&lt;/strong>. Yes, a small Linux PC with Pi-hole on your home network to prevent tons of ads from reaching you while you browse.&lt;/p>
&lt;br clear="left"/></description></item><item><title>OpenVPN Server</title><link>http://luispa.com/en/posts/2014-09-14-vpn-server-en-linux/</link><pubDate>Sun, 14 Sep 2014 00:00:00 +0000</pubDate><guid>http://luispa.com/en/posts/2014-09-14-vpn-server-en-linux/</guid><description>&lt;img src="http://luispa.com/img/posts/logo-openvpn.svg" alt="OpenVPN logo" width="150px" height="150px" style="float:left; padding-right:25px" />
&lt;p>In this technical post I&amp;rsquo;ll describe how to set up a home VPN Server based on &lt;a href="https://openvpn.net/">OpenVPN&lt;/a>, which remains the best solution today despite being more complex to implement. The goal is to have access to the internal services of my home network from the internet.&lt;/p>
&lt;br clear="left"/></description></item><item><title>IPtables with nflog</title><link>http://luispa.com/en/posts/2014-08-31-log-iptables/</link><pubDate>Sun, 31 Aug 2014 00:00:00 +0000</pubDate><guid>http://luispa.com/en/posts/2014-08-31-log-iptables/</guid><description>&lt;img src="http://luispa.com/img/posts/2014-08-31-log-iptables-01.jpg" alt="log logo" width="150px" style="float:left; padding-right:25px" />
&lt;p>Geek quote: &amp;ldquo;Logging what happens is wise&amp;hellip;&amp;rdquo; In the past I used &lt;code>ULOG&lt;/code> to analyze which packets were being dropped by &lt;code>iptables&lt;/code>, but since it&amp;rsquo;s been marked as deprecated I&amp;rsquo;ve switched to &lt;code>NFLOG&lt;/code>.&lt;/p>
&lt;br clear="left"/></description></item></channel></rss>