Amazon cover image
Image from Amazon.com

Configuring IPCop Firewalls.

By: Contributor(s): Material type: TextTextLanguage: Eng Description: 227;pagesContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9788184042368
Other title:
  • From Technology to solutions, Closing Borders with Open Source
LOC classification:
  • TK5105.59, DEM.
Contents:
TOC36;Table of Contents Preface CH36;Chapter 158; Introduction to Firewalls An Introduction to 40;TCP47;IP41; Networking The Purpose of Firewalls The OSI Model Layer 158; The Physical Layer Layer 258; The Data Link Layer Layer 358; The Network Layer Layer 458; The Transport Layer Layer 558; The Session Layer Layer 658; The Presentation Layer Layer 758; The Application Layer How Networks are Structured Servers and Clients Switches and Hubs Routers Routers44; Firewalls44; and NAT Traffic Filtering Personal Firewalls Stateless Packet Filtering Stateful Packet Filtering Application45;Layer Firewalling Proxy Servers Other Services Sometimes Run on Firewalls DNS DHCP Summary CH36;Chapter 258; Introduction to IPCop Free and Open Source Software Forking IPCop The Purpose of IPCop The Benefits of Building on Stable Components The Gap IPCop Fills Features of IPCop Web Interface Network Interfaces The Green Network Interface The Red Network Interface The Orange Network Interface The Blue Network Interfaces Simple Administration and Monitoring Modem Settings Services Virtual Private Networking ProPolice Stack Protection Why IPCop63; Summary CH36;Chapter 358; Deploying IPCop and Designing a Network Trust Relationships between the Interfaces Altering IPCop Functionality Topology One58; NAT Firewall Topology Two58; NAT Firewall with DMZ Topology Three58; NAT Firewall with DMZ and Wireless Planning Site45;To45;Site VPN Topologies Summary CH36;Chapter 458; Installing IPCop Hardware Requirements Other Hardware Considerations The Installation Procedure Installation Media Hard Drive Partitioning and Formatting Restore Configuration from Floppy Backup Green Interface Configuration Finished63; Locale Settings Hostname DNS Domain Name ISDN Configuration Network Configuration DNS and Default Gateway DHCP Server Finished33; First Boot Summary CH36;Chapter 558; Basic IPCop Usage The System Menu Software Updates Passwords SSH Access GUI Settings Backup Shutdown Checking the Status of Our IPCop Firewall Network Status System Graphs Network Graphs Connections Services DHCP Server Dynamic DNS Edit Hosts Time Server Firewall Functionality External Access Port Forwarding Firewall Options Network Troubleshooting with Ping Summary CH36;Chapter 658; Intrusion Detection with IPCop Introduction to IDS Introduction to Snort Do We Need an IDS63; How Does an IDS Work63; Using Snort with IPCop Monitoring the Logs Priority Log Analysis Options Perl Scripts ACID and BASE What to Do Next63; Summary CH36;Chapter 758; Virtual Private Networks What Is a VPN63; IPSec A Little More about Deploying IPSec Prerequisites
Summary: nnotation This book is an easy-to-read guide to using IPCop in a variety of different roles within the network. The book is written in a very friendly style that makes this complex topic easy and a joy to read. It first covers basic IPCop concepts, then moves to introduce basic IPCop configurations, before covering advanced uses of IPCop. This book is for both experienced and new IPCop users. IPCop is a powerful, open source, Linux based firewall distribution for primarily Small Office Or Home (SOHO) networks, although it can be used in larger networks. It provides most of the features that you would expect a modern firewall to have, and what is most important is that it sets this all up for you in a highly automated and simplified way. This book is an easy introduction to this popular application. After introducing and explaining the foundations of firewalling and networking and why they're important, the book moves on to cover using IPCop, from installing it, through configuring it, to more advanced features, such as configuring IPCop to work as an IDS, VPN and using it for bandwidth management. While providing necessary theoretical background, the book takes a practical approach, presenting sample configurations for home users, small businesses, and large businesses. The book contains plenty of illustrative examples
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Home library Shelving location Call number Copy number Status Date due Barcode
Books Books Harare Institute of Technology Main Library Harare Institute of Technology Main Library General Collection TK5105.59 DEM (Browse shelf(Opens below)) 1 Available BK0010014

Illustration;

Includes bibliographic reference and index.

TOC36;Table of Contents
Preface
CH36;Chapter 158; Introduction to Firewalls
An Introduction to 40;TCP47;IP41; Networking
The Purpose of Firewalls
The OSI Model
Layer 158; The Physical Layer
Layer 258; The Data Link Layer
Layer 358; The Network Layer
Layer 458; The Transport Layer
Layer 558; The Session Layer
Layer 658; The Presentation Layer
Layer 758; The Application Layer
How Networks are Structured
Servers and Clients
Switches and Hubs
Routers
Routers44; Firewalls44; and NAT
Traffic Filtering
Personal Firewalls
Stateless Packet Filtering
Stateful Packet Filtering
Application45;Layer Firewalling
Proxy Servers
Other Services Sometimes Run on Firewalls
DNS
DHCP
Summary
CH36;Chapter 258; Introduction to IPCop
Free and Open Source Software
Forking IPCop
The Purpose of IPCop
The Benefits of Building on Stable Components
The Gap IPCop Fills
Features of IPCop
Web Interface
Network Interfaces
The Green Network Interface
The Red Network Interface
The Orange Network Interface
The Blue Network Interfaces
Simple Administration and Monitoring
Modem Settings
Services
Virtual Private Networking
ProPolice Stack Protection
Why IPCop63;
Summary
CH36;Chapter 358; Deploying IPCop and Designing a Network
Trust Relationships between the Interfaces
Altering IPCop Functionality
Topology One58; NAT Firewall
Topology Two58; NAT Firewall with DMZ
Topology Three58; NAT Firewall with DMZ and Wireless
Planning Site45;To45;Site VPN Topologies
Summary
CH36;Chapter 458; Installing IPCop
Hardware Requirements
Other Hardware Considerations
The Installation Procedure
Installation Media
Hard Drive Partitioning and Formatting
Restore Configuration from Floppy Backup
Green Interface Configuration
Finished63;
Locale Settings
Hostname
DNS Domain Name
ISDN Configuration
Network Configuration
DNS and Default Gateway
DHCP Server
Finished33;
First Boot
Summary
CH36;Chapter 558; Basic IPCop Usage
The System Menu
Software Updates
Passwords
SSH Access
GUI Settings
Backup
Shutdown
Checking the Status of Our IPCop Firewall
Network Status
System Graphs
Network Graphs
Connections
Services
DHCP Server
Dynamic DNS
Edit Hosts
Time Server
Firewall Functionality
External Access
Port Forwarding
Firewall Options
Network Troubleshooting with Ping
Summary
CH36;Chapter 658; Intrusion Detection with IPCop
Introduction to IDS
Introduction to Snort
Do We Need an IDS63;
How Does an IDS Work63;
Using Snort with IPCop
Monitoring the Logs
Priority
Log Analysis Options
Perl Scripts
ACID and BASE
What to Do Next63;
Summary
CH36;Chapter 758; Virtual Private Networks
What Is a VPN63;
IPSec
A Little More about Deploying IPSec
Prerequisites

nnotation This book is an easy-to-read guide to using IPCop in a variety of different roles within the network. The book is written in a very friendly style that makes this complex topic easy and a joy to read. It first covers basic IPCop concepts, then moves to introduce basic IPCop configurations, before covering advanced uses of IPCop. This book is for both experienced and new IPCop users. IPCop is a powerful, open source, Linux based firewall distribution for primarily Small Office Or Home (SOHO) networks, although it can be used in larger networks. It provides most of the features that you would expect a modern firewall to have, and what is most important is that it sets this all up for you in a highly automated and simplified way. This book is an easy introduction to this popular application. After introducing and explaining the foundations of firewalling and networking and why they're important, the book moves on to cover using IPCop, from installing it, through configuring it, to more advanced features, such as configuring IPCop to work as an IDS, VPN and using it for bandwidth management. While providing necessary theoretical background, the book takes a practical approach, presenting sample configurations for home users, small businesses, and large businesses. The book contains plenty of illustrative examples

There are no comments on this title.

to post a comment.