IPFire originally started as a fork of IPCop[4] and has been rewritten on basis of Linux From Scratch since version 2.[5] It supports installation of add-ons to add server services, which can be extended into a SOHO server.[6]
In April 2015, the project became a member of the Open Invention Network.[7]
System Requirements
The basic requirements are at least a 1 GHz CPU, 1GB of RAM, and a 4GB hard drive. Two network cards are needed to connect to an Ethernet network. DSL, LTE and Wi-Fi (WLAN) are supported, too, with corresponding hardware.[8]
The required computing power to run IPFire depends on the area of application. Most commonly, x86 systems are being used, but ARM devices, such as Raspberry Pi or Banana Pi, are supported, too.[9]
IPFire can be used in virtual environments (such as KVM, VMWare, XEN, Qemu, etc.).
The basic setup of IPFire happens over a guided dialogue on the console, and the further administration takes place on the web-based management interface, such as add-ons and additional features.[10]
System Details
The project is regularly updated by the development team to maintain the security.[11] Developed as a stateful packet inspection (SPI) firewall.[12]
IPFire separates the network into different segments based on their security risk which are organised in colours. Normal clients connected to the LAN are represented as green, the Internet is represented as red, an optional DMZ is represented as orange and an optional Wireless network is represented as blue. No traffic can flow between segments unless specifically permitted through a firewall rule.[13]
IPFire's package management system, called Pakfire[14] allows to install system updates, which keep security up to date, and additional software packages for customisation to different usage scenarios and needs. The Linux system is customised for the concrete purpose of a firewall.[15]
The design is modular, making its functionalities extensible through plugins,[16] but the base comes with the following features[17]