Red Hat Linux Firewalls

  • Authors:
  • Bill McCarty;Mark J. Cox

  • Affiliations:
  • -;-

  • Venue:
  • Red Hat Linux Firewalls
  • Year:
  • 2002

Quantified Score

Hi-index 0.00

Visualization

Abstract

From the Publisher:Your Official Red Hat Linux Guide to FirewallsReviewed and approved by the experts at Red Hat, this comprehensive reference guide gives you all the tools to construct firewalls on a Red Hat server that will lock out intruders and defend your network against attacks.Red Hat Linux expert and IT professor Bill McCarty begins by giving you a solid foundation in security technology and philosophy. You'll examine the importance of perimeter security and the central role packet-filtering firewalls play, understand the network traffic patterns associated with common Internet services, and explore ways to develop firewall policies that permit, prohibit, or restrict use. With this groundwork in place, you then discover how to cost-justify, design, implement, test, and operate packet-filtering firewalls constructed with Red Hat Linux. You'll also gain valuable information about related topics, such as implementing bastion hosts and detecting network intrusion.This guidebook arms you with everything you need to secure your Red Hat Linux system with state-of-the-art firewalls.Proven Security Solutions with Red Hat Linux FirewallsExamine the migration from ipchains in earlier releases of Red Hat Linux to the iptables in Red Hat Linux 8Manage iptable log filesCustomize firewalls produced with lokkitLearn how to use Red Hat Linux with the traditional bastion host firewall setupDiscover IP masquerading, network address translation, and other advanced Red Hat firewall featuresStudy firewalls and firewall administration techniques that work "out of the box" on Red Hat Linux systemsGain a working knowledge of firewall design, implementation, and administration