• Complain

Elizabeth D. Zwicky - Building Internet Firewalls

Here you can read online Elizabeth D. Zwicky - Building Internet Firewalls full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2000, publisher: OReilly Media, genre: Politics. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

No cover

Building Internet Firewalls: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Building Internet Firewalls" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

In the five years since the first edition of this classic book was published, Internet use has exploded. The commercial world has rushed headlong into doing business on the Web, often without integrating sound security technologies and policies into their products and methods. The security risks--and the need to protect both business and personal data--have never been greater. Weve updated Building Internet Firewalls to address these newer risks.

What kinds of security threats does the Internet pose? Some, like password attacks and the exploiting of known security holes, have been around since the early days of networking. And others, like the distributed denial of service attacks that crippled Yahoo, E-Bay, and other major e-commerce sites in early 2000, are in current headlines.

Firewalls, critical components of todays computer networks, effectively protect a system from most Internet security threats. They keep damage on one part of the network--such as eavesdropping, a worm program, or file damage--from spreading to the rest of the network. Without firewalls, network security problems can rage out of control, dragging more and more systems down.

Like the bestselling and highly respected first edition, Building Internet Firewalls, 2nd Edition, is a practical and detailed step-by-step guide to designing and installing firewalls and configuring Internet services to work with a firewall. Much expanded to include Linux and Windows coverage, the second edition describes:

    • Firewall technologies: packet filtering, proxying, network address translation, virtual private networks
    • Architectures such as screening routers, dual-homed hosts, screened hosts, screened subnets, perimeter networks, internal firewalls
    • Issues involved in a variety of new Internet services and protocols through a firewall
    • Email and News
    • Web services and scripting languages (e.g., HTTP, Java, JavaScript, ActiveX, RealAudio, RealVideo)
    • File transfer and sharing services such as NFS, Samba
    • Remote access services such as Telnet, the BSD r commands, SSH, BackOrifice 2000
    • Real-time conferencing services such as ICQ and talk
    • Naming and directory services (e.g., DNS, NetBT, the Windows Browser)
    • Authentication and auditing services (e.g., PAM, Kerberos, RADIUS);
    • Administrative services (e.g., syslog, SNMP, SMS, RIP and other routing protocols, and ping and other network diagnostics)
    • Intermediary protocols (e.g., RPC, SMB, CORBA, IIOP)
    • Database protocols (e.g., ODBC, JDBC, and protocols for Oracle, Sybase, and Microsoft SQL Server)

    The books complete list of resources includes the location of many publicly available firewall construction tools.

Elizabeth D. Zwicky: author's other books


Who wrote Building Internet Firewalls? Find out the surname, the name of the author of the book and a list of all author's works by series.

Building Internet Firewalls — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Building Internet Firewalls" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Building Internet Firewalls, 2nd Edition
Elizabeth D. Zwicky
Simon Cooper
D. Brent Chapman
Editor
Debby Russell

Copyright 2009 O'Reilly Media, Inc.

OReilly Media SPECIAL OFFER Upgrade this ebook with OReilly for more - photo 1

O'Reilly Media

SPECIAL OFFER: Upgrade this ebook with OReilly

for more information on this offer!

Please note that upgrade offers are not available from sample content.

Preface

This book is a practical guide to building your own firewall. It provides step-by-step explanations of how to design and install a firewall at your site and how to configure Internet services such as electronic mail, FTP, the World Wide Web, and others to work with a firewall. Firewalls are complex, though, and we can't boil everything down to simple rules. Too much depends on exactly what hardware, operating system, and networking you are using at your site, and what you want your users to be able to do and not do. We've tried to give you enough rules, examples, and resources here so you'll be able to do the rest on your own.

What is a firewall, and what does it do for you? A firewall is a way to restrict access between the Internet and your internal network. You typically install a firewall at the point of maximum leverage, the point where your network connects to the Internet. The existence of a firewall at your site can greatly reduce the odds that outside attackers will penetrate your internal systems and networks. The firewall can also keep your own users from compromising your systems by sending dangerous information unencrypted passwords and sensitive data to the outside world.

The attacks on Internet-connected systems we are seeing today are more serious and more technically complex than those in the past. To keep these attacks from compromising our systems, we need all the help we can get. Firewalls are a highly effective way of protecting sites from these attacks. For that reason, we strongly recommend you include a firewall in your site's overall Internet security plan. However, a firewall should be only one component in that plan. It's also vital that you establish a security policy, that you implement strong host security, and that you consider the use of authentication and encryption devices that work with the firewalls you install. This book will touch on each of these topics while maintaining its focus on firewalls.

Scope of This Book

This book is divided into five parts.

, explores the problem of Internet security and focuses on firewalls as part of an effective strategy to address that problem.

  • , introduces the major risks associated with using the Internet today; discusses what to protect, and what to protect against; discusses various security models; and introduces firewalls in the context of what they can and can't do for your site's security.

  • , outlines the services users want and need from the Internet, and summarizes the security problems posed by those services.

  • , outlines the basic security principles an organization needs to understand before it adopts a security policy and invests in specific security mechanisms.

, describes how to build firewalls.

  • , describes the basic network concepts firewalls work with.

  • , explains the terms and technologies used in building firewalls.

  • , describes the major architectures used in constructing firewalls, and the situations they are best suited to.

  • , presents the process of designing a firewall.

  • describes how packet filtering systems work, and discusses what you can and can't accomplish with them in building a firewall.

  • , describes how proxy clients and servers work, and how to use these systems in building a firewall.

  • , presents a general overview of the process of designing and building the bastion hosts used in many firewall configurations.

  • , presents the details of designing and building a Unix or Linux bastion host.

  • , presents the details of designing and building a Windows NT bastion host.

, describes how to configure services in the firewall environment.

  • , describes the general issues involved in selecting and configuring services in the firewall environment.

  • , discusses basic protocols that are used by multiple services.

  • , discusses the Web and related services.

  • , discusses services used for transferring electronic mail and Usenet news.

  • , discusses the services used for moving files from one place to another.

  • , discusses services that allow you to use one computer from another computer.

  • , discusses services that allow people to interact with each other online.

  • , discusses the services used to distribute information about hosts and users.

  • , discusses services used to identify users before they get access to resources, to keep track of what sort of access they should have, and to keep records of who accessed what and when.

  • , discusses other services used to administer machines and networks.

  • , discusses the remaining two major classes of popular Internet services, databases and games.

  • , presents two sample configurations for basic firewalls.

, describes how to establish a security policy for your site, maintain your firewall, and handle the security problems that may occur with even the most effective firewalls.

  • , discusses the importance of having a clear and well-understood security policy for your site, and what that policy should and should not contain. It also discusses ways of getting management and users to accept the policy.

  • , describes how to maintain security at your firewall over time and how to keep yourself aware of new Internet security threats and technologies.

  • , describes what to do when a break-in occurs, or when you suspect that your security is being breached.

, consists of the following summary appendixes:

  • , contains a list of places you can go for further information and help with Internet security: World Wide Web pages, FTP sites, mailing lists, newsgroups, response teams, books, papers, and conferences.

  • , summarizes the best freely available firewall tools and how to get them.

  • , contains background information on cryptography that is useful to anyone trying to decrypt the marketing materials for security products.

Audience

Who should read this book? Although the book is aimed primarily at those who need to build firewalls, large parts of it are appropriate for everyone who is concerned about Internet security. This list tells you what sections are particularly applicable to you:

System administrators

You should read the entire book.

Senior managers

You should read at least will tell you where to go for more information and resources.

Information technology managers and users

You should read all of the chapters we've cited for the managers in the previous category. In addition, you should read , which explains the kinds of issues that may arise at your site over timefor example, how to develop a security policy, keep up to date, and react if someone attacks your site.

Although this book provides general concepts of firewalls appropriate to any site, it focuses on "average" sites: small to large commercial or educational sites. If you are setting up a personal firewall, you may wish to read just , and the service chapters appropriate to the services you wish to run. If you are setting up a firewall for an extremely large site, all of the chapters will be useful to you, but you may find that you need to use additional techniques.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Building Internet Firewalls»

Look at similar books to Building Internet Firewalls. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Building Internet Firewalls»

Discussion, reviews of the book Building Internet Firewalls and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.