The Definitive Guide to Building Firewalls with Linux
As the security challenges facing Linux system and network administrators have grown, the security tools and techniques available to them have improved dramatically. InLinux® Firewalls, Fourth Edition, long-time Linux security expert Steve Suehring has revamped his definitive Linux firewall guide to cover the important advances in Linux security.
An indispensable working resource for every Linux administrator concerned with security, this guide presents comprehensive coverage of both iptables and nftables. Building on the solid networking and firewalling foundation in previous editions, it also adds coverage of modern tools and techniques for detecting exploits and intrusions, and much more.
Distribution neutral throughout, this edition is fully updated for todays Linux kernels, and includes current code examples and support scripts for Red Hat/Fedora, Ubuntu, and Debian implementations. If youre a Linux professional, it will help you establish an understanding of security for any Linux system, and for networks of all sizes, from home to enterprise.
Inside, youll find just what you need to
- Install, configure, and update a Linux firewall running either iptables or nftables
- Migrate to nftables, or take advantage of the latest iptables enhancements
- Manage complex multiple firewall configurations
- Create, debug, and optimize firewall rules
- Use Samhain and other tools to protect filesystem integrity, monitor networks, and detect intrusions
- Harden systems against port scanning and other attacks
- Uncover exploits such as rootkits and backdoors with chkrootkit
Part I: Packet Filtering and Basic Security Measures
Chapter 1: Preliminary Concepts Underlying Packet-Filtering
Firewalls
Chapter 2: Packet-Filtering Concepts
Chapter 3: iptables : The Legacy Linux Firewall Administration
Program
Chapter 4: nftables : The Linux Firewall Administration Program
Chapter 5: Building and Installing a Standalone Firewall
Part II: Advanced Issues, Multiple Firewalls, and Perimeter
Networks
Chapter 6: Firewall Optimization
Chapter 7: Packet Forwarding
Chapter 8: NATNetwork Address Translation
Chapter 9: Debugging the Firewall Rules
Chapter 10: Virtual Private Networks
Part III: Beyond iptables and nftables
Chapter 11: Intrusion Detection and Response
Chapter 12: Intrusion Detection Tools
Chapter 13: Network Monitoring and Attack Detection
Chapter 14: Filesystem Integrity
Part IV: Appendices
Appendix A: Security Resources
Appendix B: Firewall Examples and Support Scripts
Appendix C: Glossary
Appendix D: GNU Free Documentation License
Index
Steve Suehring is a technology architect who consults and speaks on a wide variety of technology-related subjects. He has worked in Linux administration and security since 1995, and served as Linux Security editor for LinuxWorld magazine. His previous books include JavaScript Step by Step, Third Edition (Microsoft Press, 2013), and MySQL Bible (Wiley, 2002).