Table Of ContentForeword. Preface. Acknowledgments. Part I: The Network Security Context. Chapter 1: What's a Firewall? Chapter 2: TCP/IP Quick Start. Chapter 3: Threats and Principles of Defense. Chapter 4: Internet Services. Part II: Firewall Design and Implementation. Chapter 5: Firewall Architecture. Chapter 6: Firewall Design. Chapter 7: IPChains Firewalls. Chapter 8: The IPTables Facility. Chapter 9: IPTables Firewall Implementation. Chapter 10: Advanced IPTables Firewall Implementation. Part III: Firewall Operation. Chapter 11: Bastion Host Implementation. Chapter 12: Testing and Troubleshooting a Firewall. Chapter 13: Administering a Firewall. Glossary. Appendix A: Firewall and Security Web Sites. Appendix B: Protocol Numbers. Appendix C: Ports and Services. Appendix D: ICMP Types and Codes. Appendix E: Sample Firewall Scripts. Appendix F: Virtual Private Networks (VPNs). Index.
SynopsisReviewed and approved by the experts at Red Hat, this comprehensive reference guide gives readers all the tools to construct firewalls on a Red Hat server that will lock out intruders and defend a network against attacks., Your Official Red Hat Linux Guide to Firewalls Reviewed and approved by the experts at Red Hat, this comprehensive reference guide gives you all the tools to construct firewalls on a Red Hat server that will lock out intruders and defend your network against attacks. Red Hat Linux expert and IT professor Bill McCarty begins by giving you a solid foundation in security technology and philosophy. You'll examine the importance of perimeter security and the central role packet-filtering firewalls play, understand the network traffic patterns associated with common Internet services, and explore ways to develop firewall policies that permit, prohibit, or restrict use. With this groundwork in place, you then discover how to cost-justify, design, implement, test, and operate packet-filtering firewalls constructed with Red Hat Linux. You'll also gain valuable information about related topics, such as implementing bastion hosts and detecting network intrusion. This guidebook arms you with everything you need to secure your Red Hat Linux system with state-of-the-art firewalls. Proven Security Solutions with Red Hat Linux Firewalls Examine the migration from ipchains in earlier releases of Red Hat Linux to the iptables in Red Hat Linux 8 Manage iptable log files Customize firewalls produced with lokkit Learn how to use Red Hat Linux with the traditional bastion host firewall setup Discover IP masquerading, network address translation, and other advanced Red Hat firewall features Study firewalls and firewall administration techniques that work "out of the box" on Red Hat Linux systems Gain a working knowledge of firewall design, implementation, and administration "Learn how to protect your network from evil attackers, and from yourself, by making a firewall using Red Hat Linux and other open source software." -Mark J. Cox, Senior Director of Engineering, Red Hat, * Everything readers need to construct firewalls that protect computer networks from attacks and intrusions * Covers the migration from ipchains and how to mange iptable log files * Reviews the customization of firewalls, the Red Hat firewall tool, the firewall setup, and advanced firewall features * Includes numerous examples of firewalls and firewall administration techniques that work on Red Hat Linux systems * Explains how to cost-justify, implement, test, and operate packet filtering firewalls constructed using Red Hat Linux RED HAT(r) PRESS(TM) Linux Solutions from the Experts at Red Hat Red Hat-the world's leading Linux company-presents a series of unrivaled guides that are reviewed and approved by the experts at Red Hat. Each book is packed with invaluable tips and techniques that are ideal for everyone from beginning to advanced network and systems professionals, as well as home and small businesses.