Language: English
Pages: 45
Table of Contents......Page 2
4.Setting up the Linux Filtering Firewall......Page 4
11.The SOCKS Proxy Server......Page 5
1.1 Feedback......Page 6
1.4 My Reasons for Writing this......Page 7
2.Understanding Firewalls......Page 8
How it create a security policy......Page 9
Proxy Servers......Page 10
3.1 Dial-up Architecture......Page 11
3.3 Firewall with Proxy Server......Page 12
4.1 Hardware requirements......Page 13
5.2 Selecting a proxy server......Page 14
6.1 Compiling the Kernel......Page 15
6.3 Configuring the Network Addresses......Page 16
6.4 Testing your network......Page 18
7.IP filtering setup (IPFWADM)......Page 20
8.IP filtering setup (IPCHAINS)......Page 22
10.1 Getting the software......Page 24
10.4 Configuring the TIS FWTK......Page 25
The netperm-table file......Page 26
11.1 Setting up the Proxy Server......Page 29
The Access File......Page 30
The Routing File......Page 31
11.4 Drawbacks with Proxy Servers......Page 32
12.1 A large network with emphasis on security......Page 33
The Proxy Setup......Page 34
13.2 General tools......Page 36
15.1 RC Script useing GFCC......Page 37
15.2 GFCC script......Page 39
15.3 RC Script without GFCC This is the firewall rules set built my hand. It does not use GFCC.......Page 40
16.APPENDEX B - An VPN RC Script for RedHat......Page 44