Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more ➡
Download
Standard view
Full view
of .
Add note
Save to My Library
Sync to mobile
Look up keyword
Like this
1Activity
×
0 of .
Results for:
No results containing your search query
P. 1
Linux Firewall & Proxy Server

Linux Firewall & Proxy Server

Ratings: (0)|Views: 325|Likes:
Published by api-3736383

More info:

Published by: api-3736383 on Oct 15, 2008
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See More
See less

03/18/2014

pdf

text

original

Firewall and Proxy Server HOWTO
Table of Contents
Firewall and Proxy Server HOWTO................................................................................................................1

Mark Grennan, mark@grennan.com.......................................................................................................1
1.Introduction...........................................................................................................................................1
2.Understanding Firewalls.......................................................................................................................1
3.Firewall Architecture...........................................................................................................................1
4.Setting up the Linux Filtering Firewall................................................................................................1
5.Software requirements..........................................................................................................................2
6.Preparing the Linux system..................................................................................................................2
7.IP filtering setup (IPFWADM).............................................................................................................2
8.IP filtering setup (IPCHAINS)..............................................................................................................2
9.Installing a Transparent SQUID proxy.................................................................................................2
10.Installing the TIS Proxy server...........................................................................................................2
11.The SOCKS Proxy Server..................................................................................................................2
12.Advanced Configurations...................................................................................................................3
13.Making Management Easy.................................................................................................................3
14.Defeating a Proxy Firewall.................................................................................................................3
15.APPENDEX A \u2212 Example Scripts.....................................................................................................3
16.APPENDEX B \u2212 An VPN RC Script for RedHat..............................................................................3
1.Introduction...........................................................................................................................................3
1.1 Feedback............................................................................................................................................3
1.2 Disclaimer.........................................................................................................................................4
1.3 Copyright...........................................................................................................................................4
1.4 My Reasons for Writing this..............................................................................................................4
1.5 Further Readings................................................................................................................................5
2.Understanding Firewalls.......................................................................................................................5
2.1 Firewall Politics.................................................................................................................................6
How it create a security policy...................................................................................................6
2.2 Types of Firewalls..............................................................................................................................7
Packet Filtering Firewalls...........................................................................................................7
Proxy Servers..............................................................................................................................7
Application Proxy.......................................................................................................................8
SOCKS Proxy.............................................................................................................................8
3.Firewall Architecture...........................................................................................................................8
3.1 Dial\u2212up Architecture.........................................................................................................................8
3.2 Single Router Architecture................................................................................................................9
3.3 Firewall with Proxy Server................................................................................................................9
3.4 Redundent Internet Configuration...................................................................................................10
4.Setting up the Linux Filtering Firewall..............................................................................................10
4.1 Hardware requirements....................................................................................................................10
5.Software requirements........................................................................................................................11
5.1 Selecting a Kernel............................................................................................................................11
5.2 Selecting a proxy server...................................................................................................................11
6.Preparing the Linux system................................................................................................................12
6.1 Compiling the Kernel.......................................................................................................................12
6.2 Configuring two network cards.......................................................................................................13
6.3 Configuring the Network Addresses................................................................................................13
6.4 Testing your network.......................................................................................................................15

Firewall and Proxy Server HOWTO
i
Table of Contents

6.5 Securing the Firewall.......................................................................................................................17
7.IP filtering setup (IPFWADM)...........................................................................................................17
8.IP filtering setup (IPCHAINS)............................................................................................................19
9.Installing a Transparent SQUID proxy...............................................................................................21
10.Installing the TIS Proxy server.........................................................................................................21
10.1 Getting the software.......................................................................................................................21
10.2 Compiling the TIS FWTK.............................................................................................................22
10.3 Installing the TIS FWTK..............................................................................................................22
10.4 Configuring the TIS FWTK...........................................................................................................22
The netperm\u2212table file..............................................................................................................23
The /etc/services file.................................................................................................................26
11.The SOCKS Proxy Server................................................................................................................26
11.1 Setting up the Proxy Server...........................................................................................................26
11.2 Configuring the Proxy Server........................................................................................................27
The Access File.........................................................................................................................27
The Routing File.......................................................................................................................28
11.3 Working With a Proxy Server........................................................................................................29
Unix..........................................................................................................................................29
MS Windows with Trumpet Winsock......................................................................................29
Getting the Proxy Server to work with UDP Packets...............................................................29
11.4 Drawbacks with Proxy Servers......................................................................................................29
12.Advanced Configurations.................................................................................................................30
12.1 A large network with emphasis on security...................................................................................30
The Network Setup...................................................................................................................31
The Proxy Setup........................................................................................................................31
13.Making Management Easy...............................................................................................................33
13.1 Firewall tools.................................................................................................................................33
13.2 General tools..................................................................................................................................33

...............................................................................................................................................................34 15.APPENDEX A \u2212 Example Scripts...................................................................................................34 15.1 RC Script useing GFCC.................................................................................................................34 15.2 GFCC script...................................................................................................................................36 15.3 RC Script without GFCC This is the firewall rules set built my hand. It does not use GFCC......37 16.APPENDEX B \u2212 An VPN RC Script for RedHat............................................................................41

Firewall and Proxy Server HOWTO
ii

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->