Setup Idea Setup a hardware IPS for less than $30

Last updated
Aug 21, 2025
How it's used?
For home and private use
Operating system
Other
On-device encryption
N/A
Log-in security
    • Basic account password (insecure)
Security updates
Allow security updates and latest features
Update channels
Allow stable updates only
User Access Control
N/A - Linux / Mac / Other operating system
Smart App Control
N/A - Linux / Mac / Other operating system
Network firewall
Enabled
About WiFi router
This is a firewall router
Real-time security
N/A
Firewall security
Built-in Firewall for Mac/Linux
About custom security
N/A
Periodic malware scanners
N/A
Malware sample testing
I do not participate in malware testing
Environment for malware testing
N/A
Browser(s) and extensions
N/A
Secure DNS
You can choose your favorite
Desktop VPN
N/A
Password manager
N/A
Maintenance tools
N/A
File and Photo backup
N./A
System recovery
Has a backup option where you can generate an ISO file, as well as downloading only the config.
Risk factors
    • Browsing to popular websites
Computer specs
Any old pc
Recommended for
  1. All types of users

Victor M

Level 24
Thread author
Verified
Top Poster
Well-known
Oct 3, 2022
1,328
4,602
2,269
Today I am going to help you setup a ipfire network IPS and firewall.


Having a network hardware fIPS and irewall is good because it can stop attacks centrally at the gate to your LAN. The ipfire machine is your gate.

A network IPS and firewall is essential because your Windows firewall is not as honest as it seems. Numerous sorts of traffic bypasses it without any firewall rules, like base-telemetry, windows update, remote management, push to install, RPC, delivery optimization, pc-sync, and network time service. Where you have unchecked inputs like these, it is very difficult to lock down security. You sometimes do not know whether it is tcp or udp, you do not know the ports and you don’t know what ip addresses are involved because MS does not disclose them. Therefore, a network IPS and firewall that stops traffic at the gate is needed. It can stop network exploits BEFORE it touches your pc's.

Ipfire is very simple to configure. If you have explored your router settings you will find similar sections.

And if you have children, you can set time limits and block unwanted material.

What you need is a old pc, and add a $15 2nd network card and a $12 dumb switch. Then install ipfire on it and it will act as a hardware IPS and firewall. Beats buying a hardware appliance at $2XX.

1system-menu.jpg


2status-menu.jpg


3network-menu.jpg


4services-menu.jpg


5firewll-menu.jpg


6log-menu.jpg


You download the iso and use Rufus to write it to a USB stick, or if your old pc is too old to boot from USB, then you right click and Burn to DVD disc. Machines as old as Core-2-Duo’s with 4GB RAM will suffice as a firewall doesn’t use much cpu power. The suricata IPS just needs RAM ( and 4 gb is plenty, minimum just 1 gb ).

When it boots up, it will ask you to select which network card you want to use for your WAN (red) and LAN (green). Don’t worry if you get it wrong, you can always switch the Ethernet wires. Then it asks for two passwords; one for root which you won’t use much, and the admin; which you use to login to the web panel. And then you decide what ip address to give it.

Then you surf over to xxx.xxx.xxx.xxx:444 . Note the :444, because ipfire does not use https 443.

Lets talk about the Intrusion Prevention System.

7IPS.jpg



First click on the Add Provider button and add each of the free rules providers. The ones that say Pro Rules and Registered Users are not free.

8IPS-rules.jpg


Now click on Customize Ruleset button and pick the rules that matter to you. For example you won’t be needing ‘emerging activex rules’ since we no longer use Internet Explorer. (IE).

Next, next click on Firewall Rules

firewall-rules.jpg


The rules defaults to Outbound Allow as policy. That’s why you can surf immediately when you hook up the wires.

firewall-rules-edir.jpg


You can trash the Block 25 smtp rule, that’s just for demonstration. I made a rule (using New Rule button) that Drops all incoming on the Red WAN interface and selected the option to Enable SYN flood protection, that is a denial of service attack. The source is ‘standard networks : any’ and the destination is “standard networks : red”. (You can’t see the Source option in the screenshot because I scrolled the screen down.)

firewall-options.jpg


Here I am showing you the Firewall Options. Where the default Outgoing Allow setting is set. Set the Forward to Block, since we are not forwarding any network traffic to somewhere.

ip-blocklist.jpg


Using IP Address Blocklist you can download various blocklists.

location-block.jpg


Location Block is where you can block various countries

dns.jpg


At the DNS screen you can set up your preferred DNS provider. Note you have to wait a little for the entire screen to show up as ipfire tries to verify the addresses as the screen loads.

And finally lets look at updates:

update-accerlerator.jpg


You checkmark the 2 boxes as above to enable automatic updates.


There are other configuration options are you can see on the first few screen shots, but I have chosen the most common screens to configure for us security focused MT users.
 
Last edited:
Note: for the road warriors, you can setup a VPN to connect back to home using the Services>OpenVPN menu. The set up is a little involved, but the instructions are easy to follow. It also supports 2FA. The buttons are not labeled to show you that it is a wizard. See the documentation here: Client configuration

And there are lots of add-ons available thru the ipfire>Pakfire menu. Add-ons
 
Last edited:
So I don't pay as much attention to offensive security tools as I should. But then that sort of thing are the duties of the red team. Just went for a casual stroll a few days ago and found this site: Tools | Black Hat Ethical Hacking . Page after page of hacking toolkits, it makes you wonder; if there aren't many script kiddies then who are these hackers making these tools for ? I think they made a mistake with the page title, the words "black hat" and "ethical" don't mix.

A word of warning before you try some of them out. Hackers don't have much sense of right and wrong, and hackers are known to hack other hackers - after all they made the tools and it is justifiable to want a piece of the action. Most hackers lurk, and as long as they don't set off any alarm bells, they will continue to lurk and watch you. So if you do want to try some of them out, treat it as malware testing and run it in a vm.
 
Last edited:
  • Like
Reactions: Sorrento
Today I am going to help you setup a ipfire network IPS and firewall.


Having a network hardware fIPS and irewall is good because it can stop attacks centrally at the gate to your LAN. The ipfire machine is your gate.

A network IPS and firewall is essential because your Windows firewall is not as honest as it seems. Numerous sorts of traffic bypasses it without any firewall rules, like base-telemetry, windows update, remote management, push to install, RPC, delivery optimization, pc-sync, and network time service. Where you have unchecked inputs like these, it is very difficult to lock down security. You sometimes do not know whether it is tcp or udp, you do not know the ports and you don’t know what ip addresses are involved because MS does not disclose them. Therefore, a network IPS and firewall that stops traffic at the gate is needed. It can stop network exploits BEFORE it touches your pc's.

Ipfire is very simple to configure. If you have explored your router settings you will find similar sections.

And if you have children, you can set time limits and block unwanted material.

What you need is a old pc, and add a $15 2nd network card and a $12 dumb switch. Then install ipfire on it and it will act as a hardware IPS and firewall. Beats buying a hardware appliance at $2XX.

View attachment 290378

View attachment 290379

View attachment 290380

View attachment 290381

View attachment 290382

View attachment 290383

You download the iso and use Rufus to write it to a USB stick, or if your old pc is too old to boot from USB, then you right click and Burn to DVD disc. Machines as old as Core-2-Duo’s with 4GB RAM will suffice as a firewall doesn’t use much cpu power. The suricata IPS just needs RAM ( and 4 gb is plenty, minimum just 1 gb ).

When it boots up, it will ask you to select which network card you want to use for your WAN (red) and LAN (green). Don’t worry if you get it wrong, you can always switch the Ethernet wires. Then it asks for two passwords; one for root which you won’t use much, and the admin; which you use to login to the web panel. And then you decide what ip address to give it.

Then you surf over to xxx.xxx.xxx.xxx:444 . Note the :444, because ipfire does not use https 443.

Lets talk about the Intrusion Prevention System.

View attachment 290384


First click on the Add Provider button and add each of the free rules providers. The ones that say Pro Rules and Registered Users are not free.

View attachment 290385

Now click on Customize Ruleset button and pick the rules that matter to you. For example you won’t be needing ‘emerging activex rules’ since we no longer use Internet Explorer. (IE).

Next, next click on Firewall Rules

View attachment 290386

The rules defaults to Outbound Allow as policy. That’s why you can surf immediately when you hook up the wires.

View attachment 290387

You can trash the Block 25 smtp rule, that’s just for demonstration. I made a rule (using New Rule button) that Drops all incoming on the Red WAN interface and selected the option to Enable SYN flood protection, that is a denial of service attack. The source is ‘standard networks : any’ and the destination is “standard networks : red”. (You can’t see the Source option in the screenshot because I scrolled the screen down.)

View attachment 290388

Here I am showing you the Firewall Options. Where the default Outgoing Allow setting is set. Set the Forward to Block, since we are not forwarding any network traffic to somewhere.

View attachment 290389

Using IP Address Blocklist you can download various blocklists.

View attachment 290390

Location Block is where you can block various countries

View attachment 290391

At the DNS screen you can set up your preferred DNS provider. Note you have to wait a little for the entire screen to show up as ipfire tries to verify the addresses as the screen loads.

And finally lets look at updates:

View attachment 290392

You checkmark the 2 boxes as above to enable automatic updates.


There are other configuration options are you can see on the first few screen shots, but I have chosen the most common screens to configure for us security focused MT users.
How does it compare to Sophos Home NextGen firewall? (Sadly untangle home is kaput)
 
  • Like
Reactions: Sorrento
I think ipfire is better. The sophos firewall IPS uses their own rules and ipfire uses a whole set of rules from the community including some security orgs.. More contributors are better. Where sophos excels is at it's layer 7 filtering. It has all sorts of classifications and can block selected contents. Just going from memory as I don't have sophos installed right now. What I don't like about sophos is that it has its own mail server - larger attack surface.

EDIT: chatGPT says sophos uses the open source snort IPS engine and can accept rule creation in snort syntax. But it cannot ingest snort rule files.
 
Last edited:
  • Like
Reactions: cartaphilus
I think ipfire is better. The sophos firewall IPS uses their own rules and ipfire uses a whole set of rules from the community including some security orgs.. More contributors are better. Where sophos excels is at it's layer 7 filtering. It has all sorts of classifications and can block selected contents. Just going from memory as I don't have sophos installed right now. What I don't like about sophos is that it has its own mail server - larger attack surface.

EDIT: chatGPT says sophos uses the open source snort IPS engine and can accept rule creation in snort syntax. But it cannot ingest snort rule files.
yeah when SOPHOS acquired Astaro UTM which was SNORTed
 
Last edited:
  • Like
Reactions: Victor M