libcats.org
Главная

Designing and Implementing Linux Firewalls and QoS

Обложка книги Designing and Implementing Linux Firewalls and QoS

Designing and Implementing Linux Firewalls and QoS

Learn how to secure your system and implement QoS using real-world scenarios for networks of all sizes
  • Implementing Packet filtering, NAT, bandwidth shaping, packet prioritization using netfilter/iptables, iproute2, Class Based Queuing (CBQ) and Hierarchical Token Bucket (HTB)
  • Designing and implementing 5 real-world firewalls and QoS scenarios ranging from small SOHO offices to a large scale ISP network that spans many cities
  • Building intelligent networks by marking, queuing, and prioritizing different types of traffic

In Detail

Firewalls are used to protect your network from the outside world. Using a Linux firewall, you can do a lot more than just filtering packets. This book shows you how to implement Linux firewalls and Quality of Service using practical examples from very small to very large networks.

After giving us a background of network security, the book moves on to explain the basic technologies we will work with, namely netfilter, iproute2, NAT and l7-filter. These form the crux of building Linux firewalls and QOS. The later part of the book covers 5 real-world networks for which we design the security policies, build the firewall, setup the script, and verify our installation. Providing only necessary theoretical background, the book takes a practical approach, presenting case studies and plenty of illustrative examples.

Approach

The author draws on his experience to offer the reader valuable advice on the best practices. Providing only necessary theoretical background, the book takes a practical approach, presenting case studies and plenty of illustrative examples.

Who this book is written for?

This book is aimed at Linux Network administrators with some understanding of Linux security threats and issues, or any one interested in securing their systems behind a firewall. Basic knowledge of Linux is presumed but other than that this book shows you how to do the rest, from configuring your system to dealing with security breaches.

Популярные книги за неделю:

Ключ к сверхсознанию

Автор:
Категория: Путь к себе
Размер книги: 309 Kb

Древо жизни

Автор:
Категория: Путь к себе
Размер книги: 1.70 Mb

Здоровье надо созидать

Автор:
Категория: Здоровье
Размер книги: 363 Kb

The Meme Machine

Автор:
Категория: psychology, memetics, sociology
Размер книги: 1.72 Mb
Только что пользователи скачали эти книги:

Elliott, Kate - Crown of Stars 02 - Prince of Dogs

Автор:
Размер книги: 453 Kb

Insulated Gate Bipolar Transistor IGBT Theory and Design

Автор: , Автор: , Автор: , Автор: , Автор:
Размер книги: 30.83 Mb

Молодец, Леша!

Автор:
Размер книги: 5 Kb

Дианетика 55 (16)

Автор:
Размер книги: 7 Kb

Managerial Accounting 2010 Edition

Автор: , Автор:
Размер книги: 46.40 Mb

The Twilight Saga: The Official Illustrated Guide

Автор:
Размер книги: 4.64 Mb

The Berenstain Bears' New Baby

Автор: , Автор:
Категория: fiction
Размер книги: 13.13 Mb

Anatol

Автор:
Категория: fiction
Размер книги: 206 Kb