Configuring IPCop Firewalls: Closing Borders with Open Source
Barrie Dempster, James Eaton/Lee更新时间:2021-04-29 19:01:56
最新章节:Index封面
书名页
Configuring IPCop Firewalls
Credits
About the Authors
About the Reviewers
Preface
What You Need for This Book
Conventions
Reader Feedback
Customer Support
Chapter 1. Introduction to Firewalls
The Purpose of Firewalls
The OSI Model
How Networks are Structured
Traffic Filtering
Other Services Sometimes Run on Firewalls
Summary
Chapter 2. Introduction to IPCop
The Purpose of IPCop
The Benefits of Building on Stable Components
The Gap IPCop Fills
Features of IPCop
Virtual Private Networking
Why IPCop?
Summary
Chapter 3. Deploying IPCop and Designing a Network
Altering IPCop Functionality
Topology One: NAT Firewall
Topology Two: NAT Firewall with DMZ
Topology Three: NAT Firewall with DMZ and Wireless
Planning Site-To-Site VPN Topologies
Summary
Chapter 4. Installing IPCop
Other Hardware Considerations
The Installation Procedure
Green Interface Configuration
First Boot
Summary
Chapter 5. Basic IPCop Usage
Checking the Status of Our IPCop Firewall
Network Status
Services
Firewall Functionality
Summary
Chapter 6. Intrusion Detection with IPCop
Introduction to Snort
Do We Need an IDS?
How Does an IDS Work?
Using Snort with IPCop
Monitoring the Logs
Log Analysis Options
What to Do Next?
Summary
Chapter 7. Virtual Private Networks
Summary
Chapter 8. Managing Bandwidth with IPCop
The HTTP Problem
The Solutions: Proxying and Caching
Introduction to Squid
Configuring Squid
Cache Management
Managing Bandwidth without a Cache
Summary
Chapter 9. Customizing IPCop
Firewall Addons Server
Common Addons
Summary
Chapter 10. Testing Auditing and Hardening IPCop
Basic Firewall Hardening
Advanced Hardening
Logfiles and Monitoring Usage
Usage and Denial of Service
Where to Go Next?
Summary
Chapter 11. IPCop Support
Summary
Index
更新时间:2021-04-29 19:01:56