Welcome to Scribd. Sign in or start your free trial to enjoy unlimited e-books, audiobooks & documents.Find out more
Download
Standard view
Full view
of .
Look up keyword
Like this
3Activity
0 of .
Results for:
No results containing your search query
P. 1
Linux Firewall and Proxy Server-HOWTO

Linux Firewall and Proxy Server-HOWTO

Ratings: (0)|Views: 57|Likes:
Published by lcnblzr3877

More info:

Published by: lcnblzr3877 on Nov 28, 2009
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

11/13/2012

pdf

text

original

 
Firewall and Proxy Server HOWTO
 
Table ofContents
Firewall and Proxy Server HOWTO................................................................................................................1
Mark Grennan,mark@grennan.com.......................................................................................................11.Introduction...........................................................................................................................................12.UnderstandingFirewalls.......................................................................................................................13.Firewall Architecture ...........................................................................................................................14.Setting up theLinux Filtering Firewall ................................................................................................15.Software requirements..........................................................................................................................26.Preparing theLinux system..................................................................................................................27.IP filtering setup (IPFWADM).............................................................................................................28.IP filtering setup (IPCHAINS)..............................................................................................................29.Installing a Transparent SQUID proxy.................................................................................................210.Installing theTIS Proxy server...........................................................................................................211.The SOCKSProxy Server..................................................................................................................212.Advanced Configurations...................................................................................................................313.Making Management Easy.................................................................................................................314.Defeating a Proxy Firewall.................................................................................................................315.APPENDEXA − ExampleScripts.....................................................................................................316.APPENDEXB − An VPN RC Script for RedHat..............................................................................31.Introduction...........................................................................................................................................31.1 Feedback............................................................................................................................................31.2 Disclaimer .........................................................................................................................................41.3 Copyright...........................................................................................................................................41.4 My Reasonsfor Writing this..............................................................................................................41.5 Further Readings................................................................................................................................52.UnderstandingFirewalls.......................................................................................................................52.1 Firewall Politics.................................................................................................................................6How it create a security policy...................................................................................................62.2 Types of Firewalls..............................................................................................................................7Packet FilteringFirewalls...........................................................................................................7Proxy Servers..............................................................................................................................7Application Proxy.......................................................................................................................8SOCKSProxy.............................................................................................................................83.Firewall Architecture ...........................................................................................................................83.1 Dial−up Architecture.........................................................................................................................83.2 Single Router Architecture................................................................................................................93.3 Firewall with Proxy Server................................................................................................................93.4 Redundent Internet Configuration...................................................................................................104.Setting up theLinux Filtering Firewall ..............................................................................................104.1 Hardware requirements....................................................................................................................105.Software requirements........................................................................................................................115.1 Selecting a Kernel............................................................................................................................115.2 Selecting a proxy server...................................................................................................................116.Preparing theLinux system................................................................................................................126.1 Compiling the Kernel.......................................................................................................................126.2 Configuring two network cards.......................................................................................................136.3 Configuring the Network Addresses................................................................................................136.4 Testing your network.......................................................................................................................15
Firewall and Proxy Server HOWTOi
 
Tableof Contents
6.5 Securing theFirewall.......................................................................................................................177.IP filtering setup (IPFWADM)...........................................................................................................178.IP filtering setup (IPCHAINS)............................................................................................................199.Installing a Transparent SQUID proxy...............................................................................................2110.Installing theTIS Proxy server.........................................................................................................2110.1 Getting thesoftware.......................................................................................................................2110.2 Compiling the TISFWTK.............................................................................................................2210.3 Installing the TIS FWTK ..............................................................................................................2210.4 Configuring the TIS FWTK...........................................................................................................22The netperm−table file..............................................................................................................23The /etc /services file.................................................................................................................2611.The SOCKS Proxy Server................................................................................................................2611.1 Setting up the Proxy Server...........................................................................................................2611.2 Configuring the Proxy Server........................................................................................................27The Access File.........................................................................................................................27The Routing File.......................................................................................................................2811.3 Working With a Proxy Server........................................................................................................29Unix..........................................................................................................................................29MS Windows with Trumpet Winsock ......................................................................................29Gettingthe Proxy Server to work with UDP Packets...............................................................2911.4 Drawbacks with Proxy Servers......................................................................................................2912.Advanced Configurations.................................................................................................................3012.1 A large network with emphasis on security...................................................................................30The Network Setup...................................................................................................................31The Proxy Setup........................................................................................................................3113.Making Management Easy...............................................................................................................3313.1 Firewall tools.................................................................................................................................3313.2 General tools..................................................................................................................................33...............................................................................................................................................................34 15.APPENDEXA Example Scripts...................................................................................................3415.1 RC Script useing GFCC.................................................................................................................3415.2 GFCC script...................................................................................................................................3615.3 RC Script without GFCC This is the firewall rules set built my hand. It does not use GFCC......3716.APPENDEX B − An VPN RC Script for RedHat............................................................................41
Firewall and Proxy Server HOWTOii

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->