Your Official Red Hat Linux Guide to Firewalls
Reviewed and approved by the experts at Red Hat, this comprehensive reference guide gives you all the tools to construct firewalls on a Red Hat server that will lock out intruders and defend your network against attacks.
Red Hat Linux expert and IT professor Bill McCarty begins by giving you a solid foundation in security technology and philosophy. You′ll examine the importance of perimeter security and the central role packet–filtering firewalls play, understand the network traffic patterns associated with common Internet services, and explore ways to develop firewall policies that permit, prohibit, or restrict use. With this groundwork in place, you then discover how to cost–justify, design, implement, test, and operate packet–filtering firewalls constructed with Red Hat Linux. You′ll also gain valuable information about related topics, such as implementing bastion hosts and detecting network intrusion.
This guidebook arms you with everything you need to secure your Red Hat Linux system with state–of–the–art firewalls.
Proven Security Solutions with Red Hat Linux Firewalls
∗ Examine the migration from ipchains in earlier releases of Red Hat Linux to the iptables in Red Hat Linux 8
∗ Manage iptable log files
∗ Customize firewalls produced with lokkit
∗ Learn how to use Red Hat Linux with the traditional bastion host firewall setup
∗ Discover IP masquerading, network address translation, and other advanced Red Hat firewall features
∗ Study firewalls and firewall administration techniques that work "out of the box" on Red Hat Linux systems
∗ Gain a working knowledge of firewall design, implementation, and administration
"Learn how to protect your network from evil attackers, and from yourself, by making a firewall using Red Hat Linux and other open source software."
–Mark J. Cox, Senior Director of Engineering, Red Hat