Linux Firewalls, 2/e
暫譯: Linux 防火牆,第二版

Robert Ziegler

  • 出版商: New Riders
  • 出版日期: 2001-10-24
  • 售價: $2,050
  • 貴賓價: 9.5$1,948
  • 語言: 英文
  • 頁數: 592
  • 裝訂: Paperback
  • ISBN: 0735710996
  • ISBN-13: 9780735710993
  • 相關分類: Linux
  • 已過版

買這商品的人也買了...

相關主題

商品描述

An Internet-connected Linux machine is in a high-risk situation. This book details security steps that a home or small-to-mid-size, non-enterprise business might take to protect itself from potential remote attackers. As with the first edition, this book will provide a description of the need for security measures and solutions built upon the most up-to-date technology available. The content for the Second Edition has been updated to cover the 2.4 kernel, and additional chapters on VPNs, SSH, and Tripwires have been added.

Table of Contents

I. PACKET FILTERING AND BASIC SECURITY MEASURES.

1. Preliminary Concepts Underlying Packet-Filtering Firewalls.
The TCP/IP Reference Networking Model. IP Addresses. Routing: Getting a Packet from Here to There. Service Ports: The Door to the Programs on Your System. Packets: IP Network Messages.

2. Packet-Filtering Concepts.
A Packet-Filtering Firewall. Choosing a Default Packet-Filtering Policy. Rejecting Versus Denying a Packet. Filtering Incoming Packets. Filtering Outgoing Packets. Private versus Public Network Services.

3. iptables: The Linux Firewall Administration Program.
Differences Between IPFW and Netfilter Firewall Mechanisms. iptables Features. iptables Syntax.

4. Building and Installing a Standalone Firewall.
iptables: The Linux Firewall Administration Program. Initializing the Firewall. Protecting Services on Assigned Unprivileged Ports. Enabling Basic, Required Internet Services. Enabling Common TCP Services. Enabling Common UDP Services. Filtering ICMP Control and Status Messages. Logging Dropped Incoming Packets. Logging Dropped Outgoing Packets. Denying Access to Problem Sites Up Front. Installing the Firewall.

II. ADVANCED ISSUES, MULTIPLE FIREWALLS, AND PERIMETER NETWORKS.

5. Firewall Optimization.
Rule Organization. User-Defined Chains. Optimized Example. What Did Optimization Buy?

6. Packet Forwarding.
The Limitations of a Standalone Firewall. Basic Gateway Firewall Setups. LAN Security Issues. Configuration Options for a Trusted Home LAN. Configuration Options for a Larger or Less Trusted LAN. A Formal Screened-Subnet Firewall. Converting the Gateway from Local Services to Forwarding.

7. NAT-Network Address Translation.
The Conceptual Background of NAT. iptables NAT Semantics. Examples of SNAT and Private LANs. Examples of DNAT, LANs, and Proxies.

8. Debugging the Firewall Rules.
General Firewall-Development Tips. Listing the Firewall Rules. Checking the Input, Output, and Forwarding Rules. Checking for Open Ports. Debugging SSH: A Real-Life Example.

III. SYSTEM-LEVEL SECURITY AND MONITORING.

9. Verifying That the System Is Running as You Expect.
Checking the Network Interfaces with ifconfig. Checking the Network Connection with ping. Checking Network Processes with netstat. Checking a Process Bound to a Particular Port with fuser. Checking All Processes with ps -ax. Interpreting the System Logs.

10. Issues at the UNIX System Administration Level.
Authentication: Verifying Identity. Authorization: Defining Access Rights to Identities. Server-Specific Configuration. SOCKS: An Application-Level Proxy Firewall. Miscellaneous System Accounts in /etc/passwd, /etc/shadow, and /etc/group. Setting Your PATH Variable. /etc/issue.net. Remote Logging. Keeping Current with Software Upgrades.

11. Secure Shell (SSH).
Installing SSH. Generating SSH Keys. Using SSH. Customizing Your SSH Configuration. Secure Copy (scp).

12. Tripwire.
Tripwire Overview. Installing Tripwire. Looking at How Tripwire Works. Configuring Tripwire. Using Tripwire. Tripwire Tips and Tricks.

13. Intrusion Detection and Incident Reporting Software.
Intrusion-Detection Software. Symptoms Suggesting That the System Might Be Compromised. What to Do if Your System Is Compromised. Incident Reporting.

IV. APPENDIXES.

Appendix A. Security Resources.
Security Information Sources. Software Collections. Security Tools. Firewall Tools. Reference Papers and FAQs. General Web Sites. Books.

Appendix B. Firewall Examples and Support Scripts.
iptables Firewall for a Standalone System from Chapter 4. Optimized iptables Firewall from Chapter 5. iptables Firewall for a Choke Firewall from Chapter 6. Special Purpose Support Scripts. DHCP and pump: Firewall Support with a Dynamic IP Address and Name Servers.

Appendix C. VPN.
Overview of Virtual Private Networks (VPN). Types of VPN. VPN Protocols. Linux and VPN Products. VPN Configurations. Connecting Networks. VPN and Firewalls.

Appendix D. Glossary.
Index.

商品描述(中文翻譯)

一台連接到互聯網的 Linux 機器處於高風險狀態。本書詳細說明了家庭或中小型非企業商業可能採取的安全措施,以保護自己免受潛在的遠程攻擊者的威脅。與第一版一樣,本書將提供對安全措施需求的描述,以及基於最新技術的解決方案。第二版的內容已更新以涵蓋 2.4 內核,並新增了有關 VPN、SSH 和 Tripwires 的章節。

目錄

I. 封包過濾和基本安全措施。
1. 封包過濾防火牆的基本概念。
TCP/IP 參考網路模型。IP 位址。路由:將封包從這裡傳送到那裡。服務埠:您系統上程式的入口。封包:IP 網路訊息。

2. 封包過濾概念。
封包過濾防火牆。選擇預設的封包過濾政策。拒絕與否定封包的區別。過濾進來的封包。過濾出去的封包。私有與公共網路服務。

3. iptables:Linux 防火牆管理程式。
IPFW 與 Netfilter 防火牆機制的差異。iptables 特性。iptables 語法。

4. 建立和安裝獨立防火牆。
iptables:Linux 防火牆管理程式。初始化防火牆。保護分配的非特權埠上的服務。啟用基本的必要網際網路服務。啟用常見的 TCP 服務。啟用常見的 UDP 服務。過濾 ICMP 控制和狀態訊息。記錄丟棄的進來封包。記錄丟棄的出去封包。提前拒絕對問題網站的訪問。安裝防火牆。

II. 進階問題、多重防火牆和邊界網路。
5. 防火牆優化。
規則組織。用戶定義的鏈。優化範例。優化帶來了什麼?

6. 封包轉發。
獨立防火牆的限制。基本的閘道防火牆設置。局域網安全問題。受信任家庭局域網的配置選項。較大或不太受信任的局域網的配置選項。正式的過濾子網防火牆。將閘道從本地服務轉換為轉發。

7. NAT-網路地址轉換。
NAT 的概念背景。iptables NAT 語義。SNAT 和私有局域網的範例。DNAT、局域網和代理的範例。

8. 調試防火牆規則。
一般防火牆開發提示。列出防火牆規則。檢查輸入、輸出和轉發規則。檢查開放的埠。調試 SSH:一個實際範例。

III. 系統級安全和監控。
9. 驗證系統是否按預期運行。
使用 ifconfig 檢查網路介面。使用 ping 檢查網路連接。使用 netstat 檢查網路進程。使用 fuser 檢查綁定到特定埠的進程。使用 ps -ax 檢查所有進程。解讀系統日誌。

10. UNIX 系統管理層級的問題。
認證:驗證身份。授權:定義身份的訪問權限。伺服器特定配置。SOCKS:應用層代理防火牆。/etc/passwd、/etc/shadow 和 /etc/group 中的雜項系統帳戶。設置您的 PATH 變數。/etc/issue.net。遠程日誌記錄。保持軟體升級的最新狀態。

11. 安全外殼 (SSH)。
安裝 SSH。生成 SSH 金鑰。使用 SSH。自定義您的 SSH 配置。安全複製 (scp)。

12. Tripwire。
Tripwire 概述。安裝 Tripwire。了解 Tripwire 的工作原理。配置 Tripwire。使用 Tripwire。Tripwire 提示和技巧。

13. 入侵檢測和事件報告軟體。
入侵檢測軟體。系統可能被入侵的症狀。如果您的系統被入侵該怎麼辦。事件報告。

IV. 附錄。
附錄 A. 安全資源。
安全資訊來源。軟體集合。安全工具。防火牆工具。參考文件和常見問題解答。一般網站。書籍。

附錄 B. 防火牆範例和支援腳本。
第 4 章的獨立系統 iptables 防火牆。第 5 章的優化 iptables 防火牆。第 6 章的 Choke 防火牆 iptables。特殊用途支援腳本。DHCP 和 pump:動態 IP 位址和名稱伺服器的防火牆支援。

附錄 C. VPN。
虛擬私人網路 (VPN) 概述。VPN 類型。VPN 協議。Linux 和 VPN 產品。VPN 配置。連接網路。VPN 和防火牆。

附錄 D. 詞彙表。
索引。