Cover image for Configuring IPCop firewalls [electronic resource] : closing borders with Open Source / Barrie Dempster, James Eaton-Lee.
Configuring IPCop firewalls [electronic resource] : closing borders with Open Source / Barrie Dempster, James Eaton-Lee.
ISBN:
9781847190253

9781281270924
Title:
Configuring IPCop firewalls [electronic resource] : closing borders with Open Source / Barrie Dempster, James Eaton-Lee.
Author:
Dempster, Barrie.
Personal Author:
Publication Information:
Birmingham, U.K. : Packt Pub., ©2006.
Physical Description:
1 online resource (vi, 228 pages) : illustrations
General Note:
"How to set up, configure, and manage your Linux firewall, web proxy, DHCP, DNS, time server, and VPN with this powerful Open Source solution"--T.page.
Contents:
Cover -- TOC36;Table of Contents -- Preface -- CH36;Chapter 158; Introduction to Firewalls -- An Introduction to 40;TCP47;IP41; Networking -- The Purpose of Firewalls -- The OSI Model -- Layer 158; The Physical Layer -- Layer 258; The Data Link Layer -- Layer 358; The Network Layer -- Layer 458; The Transport Layer -- Layer 558; The Session Layer -- Layer 658; The Presentation Layer -- Layer 758; The Application Layer -- How Networks are Structured -- Servers and Clients -- Switches and Hubs -- Routers -- Routers44; Firewalls44; and NAT -- Traffic Filtering -- Personal Firewalls -- Stateless Packet Filtering -- Stateful Packet Filtering -- Application45;Layer Firewalling -- Proxy Servers -- Other Services Sometimes Run on Firewalls -- DNS -- DHCP -- Summary -- CH36;Chapter 258; Introduction to IPCop -- Free and Open Source Software -- Forking IPCop -- The Purpose of IPCop -- The Benefits of Building on Stable Components -- The Gap IPCop Fills -- Features of IPCop -- Web Interface -- Network Interfaces -- The Green Network Interface -- The Red Network Interface -- The Orange Network Interface -- The Blue Network Interfaces -- Simple Administration and Monitoring -- Modem Settings -- Services -- Virtual Private Networking -- ProPolice Stack Protection -- Why IPCop63; -- Summary -- CH36;Chapter 358; Deploying IPCop and Designing a Network -- Trust Relationships between the Interfaces -- Altering IPCop Functionality -- Topology One58; NAT Firewall -- Topology Two58; NAT Firewall with DMZ -- Topology Three58; NAT Firewall with DMZ and Wireless -- Planning Site45;To45;Site VPN Topologies -- Summary -- CH36;Chapter 458; Installing IPCop -- Hardware Requirements -- Other Hardware Considerations -- The Installation Procedure -- Installation Media -- Hard Drive Partitioning and Formatting -- Restore Configuration from Floppy Backup -- Green Interface Configuration -- Finished63; -- Locale Settings -- Hostname -- DNS Domain Name -- ISDN Configuration -- Network Configuration -- DNS and Default Gateway -- DHCP Server -- Finished33; -- First Boot -- Summary -- CH36;Chapter 558; Basic IPCop Usage -- The System Menu -- Software Updates -- Passwords -- SSH Access -- GUI Settings -- Backup -- Shutdown -- Checking the Status of Our IPCop Firewall -- Network Status -- System Graphs -- Network Graphs -- Connections -- Services -- DHCP Server -- Dynamic DNS -- Edit Hosts -- Time Server -- Firewall Functionality -- External Access -- Port Forwarding -- Firewall Options -- Network Troubleshooting with Ping -- Summary -- CH36;Chapter 658; Intrusion Detection with IPCop -- Introduction to IDS -- Introduction to Snort -- Do We Need an IDS63; -- How Does an IDS Work63; -- Using Snort with IPCop -- Monitoring the Logs -- Priority -- Log Analysis Options -- Perl Scripts -- ACID and BASE -- What to Do Next63; -- Summary -- CH36;Chapter 758; Virtual Private Networks -- What Is a VPN63; -- IPSec -- A Little More about Deploying IPSec -- Prerequisites.
Local Note:
eBooks on EBSCOhost
Added Author:
Format:
Electronic Resources
Electronic Access:
Click here to view
Publication Date:
2006
Publication Information:
Birmingham, U.K. : Packt Pub., ©2006.