Adam ♿<p>[Still haven't sorted this as of 2025-07-12]</p><p><a href="https://aus.social/tags/AskFedi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AskFedi</span></a> <a href="https://aus.social/tags/BoostsAreAppreciated" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BoostsAreAppreciated</span></a> <a href="https://aus.social/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://aus.social/tags/BSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BSD</span></a> <a href="https://aus.social/tags/Networking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Networking</span></a> <a href="https://aus.social/tags/PCAP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PCAP</span></a></p><p>I am looking for some kind of VM or system I can run to create a network that I can put an untrusted device on to and allow/deny all its connections one by one - think auditioning a new TV or IOT device rather than out-and-out hostile malware. Assume I will also dump packets for investigation.</p><p>Security Onion looks like overkill but I'd like to avoid writing my own firewall rules if possible.</p>