Overview
The Cloaking Firewall is a hardened version (wherein subscription costs / additional charges apply) of the OPNSense firewall embedded with innovative technology that removes the ability of cyber attackers to find your network and hack it. The technology allows your network to disappear from internet wide scanning, which is an essential process that malicious actors use to identify new targets.
This firewall presents an innovative and more cost-effective cybersecurity solution, as it eliminates the potential for an attack on your network in the first place, thereby avoiding the ever-increasing costs of a cyber breach. The technology is also incorporated with a firewall, which means the cost as well as the training and implementation gaps are low during adoption.
With this network appliance, you can disappear from internet-wide scanning services such as Shodan, Censys.io, and BinaryEdge that malicious actors regularly use to find new targets with Internet 2.0 software. Appliance includes RAIDEN to take automatic blocking, which allows defense-in-depth for a shielded foundation.
Highlights
- Cloaking technology to disappear from all internet based scanners
- Hardened firewall that greatly improves on already legendary securit
Details
Typical total price
$1.17/hour
Pricing
Free trial
- ...
Instance type | Product cost/hour | EC2 cost/hour | Total/hour |
---|---|---|---|
t3.nano | $1.00 | $0.005 | $1.005 |
t3.micro AWS Free Tier | $1.00 | $0.01 | $1.01 |
t3.small | $1.00 | $0.021 | $1.021 |
t3.medium | $1.00 | $0.042 | $1.042 |
t3.large | $1.00 | $0.083 | $1.083 |
t3.xlarge | $1.00 | $0.166 | $1.166 |
t3.2xlarge | $1.00 | $0.333 | $1.333 |
t3a.nano | $1.00 | $0.005 | $1.005 |
t3a.micro | $1.00 | $0.009 | $1.009 |
t3a.small | $1.00 | $0.019 | $1.019 |
Additional AWS infrastructure costs
Type | Cost |
---|---|
EBS General Purpose SSD (gp3) volumes | $0.08/per GB/month of provisioned storage |
Vendor refund policy
To initiate a refund request, please email contact@internet2-0.com with your refund request and the amount of days since the passage of your free trial. Please also include a state reason for the request.
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
64-bit (x86) Amazon Machine Image (AMI)
Amazon Machine Image (AMI)
An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.
Version release notes
Latest Public Release
Additional details
Usage instructions
NOTE: Due to security scanning on the instance, it can take up to 2 minutes after Status Checks have passed for the WebGUI and SSH login to be available for the machine.
SSH Access:
SSH is enabled and can be accessed only via key authentication, use port 22. Password logins are available for the ec2 console and WebGUI ( use https port 2000). ex: https://123.123.123.123:2000
User Accounts
There are two user accounts:
- "root" (initially disabled)
- "ec2-cfw"
Password Format
The passwords for the accounts follow a specific format that includes the instance ID. If ever conducting a factory reset the passwords for both accounts will be reset to the original passwords as below. Please, if ever changing passwords which is recommended make a copy of the new passwords to avoid being locked out.
-
"root":
-
Password format: -=&%!INSTANCEID!%&=-
-
"ec2-cfw":
-
Password format:
-=***INSTANCEID***=-
-
Example for "ec2-cfw":
-=***i-0de16bd57d390efaf***=-
Interface Setup
To correctly set up interfaces, the "root" account will need to be enabled. Access the ec2 console to assign the interfaces appropriately. Without this step, the LAN interface might be misidentified as Optional 1 (OPT1), which can cause issues with rule configurations.
Note: While the "root" account is initially disabled, users have the option to enable it if needed (such as above). This can help in setting up interfaces correctly but should be done cautiously to avoid reducing security. Please disable root account after completing given tasks.
VPN and Security Groups
There are 2 VPN services available one for half split tunnel and one for full tunnel. For best practices with remote administration please make use one of the VPNs. Once VPN is operable, please disable direct access to the firewall via the WAN and disable the rule TCP 2000 in the security group. Also, please do same for the SSH.
Support
Vendor support
Contact support@internet2-0.com for any issues during deployment. Long term support contract information can also be requested.
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.