tailieunhanh - Ebook Building internet firewalls: Phần 1

This book is a practical guide to building your own firewall. It provides step-by-step explanations of how to design and install a firewall at your site and how to configure Internet services such as electronic mail, FTP, the World Wide Web, and others to work with a firewall. Firewalls are complex, though, and we can't boil everything down to simple rules. | Building Internet Firewalls Elizabeth D. Zwicky Simon Cooper D. Brent Chapman Second Edition June 2000 ISBN 1-56592-871-7 890 pages Completely revised and much expanded the new edition of the highly respected and bestselling Building Internet Firewalls now covers Unix Linux and Windows NT. This practical and detailed guide explains in step-by-step fashion how to design and install firewalls and configure Internet services to work with a firewall. It covers a wide range of services and protocols and offers a complete list of resources including the location of many publicly available firewalls construction tools. Release Team oR 2001 CONTENTS Preface 1 Scope of This Book Audience Platforms Products Examples Conventions Used in This Book Comments and Questions Acknowledgments for the Second Edition Acknowledgments for the First Edition I Network Security 8 1 Why Internet Fi rewalls What Are You Trying to Protect What Are You Trying to Protect Against Who Do You Trust How Can You Protect Your Site What Is an Internet Firewall Religious Arguments 9 2 Internet Services Secure Services and Safe Services The World Wide Web Electronic Mail and News File Transfer File Sharing and Printing Remote Access Real-Time Conferencing Services Naming and Directory Services Authentication and Auditing Services Administrative Services Databases Games 27 3 Security Strategies Least Privilege Defense in Depth Choke Point Weakest Link Fail-Safe Stance Universal Participation Diversity of Defense Simplicity Security Through Obscurity 42 II Building F irewalls 50 4 Packets and Protocols What Does a Packet Look Like IP Protocols Above IP Protocols Below IP Application Layer Protocols IP Version 6 Non-IP Protocols Attacks Based on Low-Level Protocol Details 51 5 Firewall Technologies Some Firewall Definitions Packet Filtering Proxy Services