Configuring IPCop Firewalls. (Record no. 3656)

MARC details
000 -LEADER
fixed length control field 04798nam a22002657a 4500
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20230117101503.0
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9788184042368
040 ## - CATALOGING SOURCE
Language of cataloging Eng
Transcribing agency HITLIB
Modifying agency HITLIB
Description conventions rda
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title Eng
050 ## - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5105.59,
Item number DEM.
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Dempster B
Relator term Author,
Fuller form of name Barrie Dempster.
245 ## - TITLE STATEMENT
Title Configuring IPCop Firewalls.
246 ## - VARYING FORM OF TITLE
Title proper/short title From Technology to solutions,
Remainder of title Closing Borders with Open Source.
300 ## - PHYSICAL DESCRIPTION
Extent 227;pages.
336 ## - CONTENT TYPE
Source rdacontent
Content type term text
Content type code txt
337 ## - MEDIA TYPE
Source rdamedia
Media type term unmediated
Media type code n
338 ## - CARRIER TYPE
Source rdacarrier
Carrier type term volume
Carrier type code nc
500 ## - GENERAL NOTE
General note Illustration;
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographic reference and index.
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note TOC36;Table of Contents<br/>Preface<br/>CH36;Chapter 158; Introduction to Firewalls<br/>An Introduction to 40;TCP47;IP41; Networking<br/>The Purpose of Firewalls<br/>The OSI Model<br/>Layer 158; The Physical Layer<br/>Layer 258; The Data Link Layer<br/>Layer 358; The Network Layer<br/>Layer 458; The Transport Layer<br/>Layer 558; The Session Layer<br/>Layer 658; The Presentation Layer<br/>Layer 758; The Application Layer<br/>How Networks are Structured<br/>Servers and Clients<br/>Switches and Hubs<br/>Routers<br/>Routers44; Firewalls44; and NAT<br/>Traffic Filtering<br/>Personal Firewalls<br/>Stateless Packet Filtering<br/>Stateful Packet Filtering<br/>Application45;Layer Firewalling<br/>Proxy Servers<br/>Other Services Sometimes Run on Firewalls<br/>DNS<br/>DHCP<br/>Summary<br/>CH36;Chapter 258; Introduction to IPCop<br/>Free and Open Source Software<br/>Forking IPCop<br/>The Purpose of IPCop<br/>The Benefits of Building on Stable Components<br/>The Gap IPCop Fills<br/>Features of IPCop<br/>Web Interface<br/>Network Interfaces<br/>The Green Network Interface<br/>The Red Network Interface<br/>The Orange Network Interface<br/>The Blue Network Interfaces<br/>Simple Administration and Monitoring<br/>Modem Settings<br/>Services<br/>Virtual Private Networking<br/>ProPolice Stack Protection<br/>Why IPCop63;<br/>Summary<br/>CH36;Chapter 358; Deploying IPCop and Designing a Network<br/>Trust Relationships between the Interfaces<br/>Altering IPCop Functionality<br/>Topology One58; NAT Firewall<br/>Topology Two58; NAT Firewall with DMZ<br/>Topology Three58; NAT Firewall with DMZ and Wireless<br/>Planning Site45;To45;Site VPN Topologies<br/>Summary<br/>CH36;Chapter 458; Installing IPCop<br/>Hardware Requirements<br/>Other Hardware Considerations<br/>The Installation Procedure<br/>Installation Media<br/>Hard Drive Partitioning and Formatting<br/>Restore Configuration from Floppy Backup<br/>Green Interface Configuration<br/>Finished63;<br/>Locale Settings<br/>Hostname<br/>DNS Domain Name<br/>ISDN Configuration<br/>Network Configuration<br/>DNS and Default Gateway<br/>DHCP Server<br/>Finished33;<br/>First Boot<br/>Summary<br/>CH36;Chapter 558; Basic IPCop Usage<br/>The System Menu<br/>Software Updates<br/>Passwords<br/>SSH Access<br/>GUI Settings<br/>Backup<br/>Shutdown<br/>Checking the Status of Our IPCop Firewall<br/>Network Status<br/>System Graphs<br/>Network Graphs<br/>Connections<br/>Services<br/>DHCP Server<br/>Dynamic DNS<br/>Edit Hosts<br/>Time Server<br/>Firewall Functionality<br/>External Access<br/>Port Forwarding<br/>Firewall Options<br/>Network Troubleshooting with Ping<br/>Summary<br/>CH36;Chapter 658; Intrusion Detection with IPCop<br/>Introduction to IDS<br/>Introduction to Snort<br/>Do We Need an IDS63;<br/>How Does an IDS Work63;<br/>Using Snort with IPCop<br/>Monitoring the Logs<br/>Priority<br/>Log Analysis Options<br/>Perl Scripts<br/>ACID and BASE<br/>What to Do Next63;<br/>Summary<br/>CH36;Chapter 758; Virtual Private Networks<br/>What Is a VPN63;<br/>IPSec<br/>A Little More about Deploying IPSec<br/>Prerequisites
520 ## - SUMMARY, ETC.
Summary, etc. nnotation This book is an easy-to-read guide to using IPCop in a variety of different roles within the network. The book is written in a very friendly style that makes this complex topic easy and a joy to read. It first covers basic IPCop concepts, then moves to introduce basic IPCop configurations, before covering advanced uses of IPCop. This book is for both experienced and new IPCop users. IPCop is a powerful, open source, Linux based firewall distribution for primarily Small Office Or Home (SOHO) networks, although it can be used in larger networks. It provides most of the features that you would expect a modern firewall to have, and what is most important is that it sets this all up for you in a highly automated and simplified way. This book is an easy introduction to this popular application. After introducing and explaining the foundations of firewalling and networking and why they're important, the book moves on to cover using IPCop, from installing it, through configuring it, to more advanced features, such as configuring IPCop to work as an IDS, VPN and using it for bandwidth management. While providing necessary theoretical background, the book takes a practical approach, presenting sample configurations for home users, small businesses, and large businesses. The book contains plenty of illustrative examples
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name James Eaton-Lee.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Library of Congress Classification
Koha item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Not for loan Home library Current library Shelving location Source of acquisition Inventory number Total Checkouts Full call number Barcode Date last seen Copy number Koha item type
    Library of Congress Classification   Harare Institute of Technology Main Library Harare Institute of Technology Main Library General Collection DONATION 18/350   TK5105.59 DEM BK0010014 17/01/2023 1 Books