Linux Network Administratoramp;#039;s Guide (3rd Edition) [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Linux Network Administratoramp;#039;s Guide (3rd Edition) [Electronic resources] - نسخه متنی

Tony Bautts, Terry Dawson, Gregor N. Purdy

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید







Chapter 7. TCP/IP Firewall



Security is increasingly important for
companies and individuals alike. The Internet provides them with a
powerful tool to distribute information about themselves and obtain
information from others, but it also exposes them to dangers from
which they were previously exempt. Computer crime, information theft,
and malicious damage are all potential dangers.

This chapter covers the Linux features for setting up a firewall,
known both by its command interface (iptables) and its kernel subsystem name
(netfilter). This firewall implementation was
new in the 2.4 kernel and works substantially the same way in 2.6.

A malicious person who gains access to a computer system may guess
system passwords or exploit the bugs and idiosyncratic behavior of
certain programs to obtain a working account on that host. Once they
are able to log in to the host, they may have access to sensitive
information. In a commercial setting, stealing, deleting, or
modifying information such as marketing plans, new project details,
or customer information databases can cause significant damage to the
company.

The safest way to avoid such widespread
damage is to prevent unauthorized people from gaining network access
to the host. This is where firewalls come in.


Constructing secure firewalls is an art. It involves a good
understanding of technology, but equally important, it requires an
understanding of the philosophy behind firewall designs. We
won't cover everything you need to know in this
book; we strongly recommend you do some additional research before
trusting any particular firewall design, including any we present
here.

We will focus on the Linux-specific technical issues in this chapter.
Later we will present a sample firewall configuration that should
serve as a useful starting point in your own configuration, but as
with all security-related matters, you'll want to
make sure that you understand the information well enough to
customize it to suit your needs and verify that the result is
sufficient. Double-check the design, make sure that you understand
it, and then modify it to suit your requirements. To be safe, be
sure.


/ 121