Coverart for item
The Resource Configuring IPCop firewalls : closing borders with Open Source, Barrie Dempster, James Eaton-Lee, (electronic resource)

Configuring IPCop firewalls : closing borders with Open Source, Barrie Dempster, James Eaton-Lee, (electronic resource)

Label
Configuring IPCop firewalls : closing borders with Open Source
Title
Configuring IPCop firewalls
Title remainder
closing borders with Open Source
Statement of responsibility
Barrie Dempster, James Eaton-Lee
Creator
Contributor
Subject
Language
eng
Summary
Annotation
http://library.link/vocab/creatorName
Dempster, Barrie
Dewey number
005.8
Illustrations
illustrations
Index
index present
Literary form
non fiction
Nature of contents
dictionaries
http://library.link/vocab/relatedWorkOrContributorName
Eaton-Lee, James
http://library.link/vocab/subjectName
  • Firewalls (Computer security)
  • Open source software
Summary expansion
This book is an easy-to-read guide to using IPCop in a variety of different roles within the network. The book is written in a very friendly style that makes this complex topic easy and a joy to read. It first covers basic IPCop concepts, then moves to introduce basic IPCop configurations, before covering advanced uses of IPCop. This book is for both experienced and new IPCop users. IPCop is a powerful, open source, Linux based firewall distribution for primarily Small Office Or Home (SOHO) networks, although it can be used in larger networks. It provides most of the features that you would expect a modern firewall to have, and what is most important is that it sets this all up for you in a highly automated and simplified way. This book is an easy introduction to this popular application. After introducing and explaining the foundations of firewalling and networking and why they're important, the book moves on to cover using IPCop, from installing it, through configuring it, to more advanced features, such as configuring IPCop to work as an IDS, VPN and using it for bandwidth management. While providing necessary theoretical background, the book takes a practical approach, presenting sample configurations for home users, small businesses, and large businesses. The book contains plenty of illustrative examples
Label
Configuring IPCop firewalls : closing borders with Open Source, Barrie Dempster, James Eaton-Lee, (electronic resource)
Instantiates
Publication
Note
"How to set up, configure, and manage your Linux firewall, web proxy, DHCP, DNS, time server, and VPN with this powerful Open Source solution"--T.page
Antecedent source
unknown
Color
multicolored
Contents
Cover -- TOC36;Table of Contents -- Preface -- CH36;Chapter 158; Introduction to Firewalls -- An Introduction to 40;TCP47;IP41; Networking -- The Purpose of Firewalls -- The OSI Model -- Layer 158; The Physical Layer -- Layer 258; The Data Link Layer -- Layer 358; The Network Layer -- Layer 458; The Transport Layer -- Layer 558; The Session Layer -- Layer 658; The Presentation Layer -- Layer 758; The Application Layer -- How Networks are Structured -- Servers and Clients -- Switches and Hubs -- Routers -- Routers44; Firewalls44; and NAT -- Traffic Filtering -- Personal Firewalls -- Stateless Packet Filtering -- Stateful Packet Filtering -- Application45;Layer Firewalling -- Proxy Servers -- Other Services Sometimes Run on Firewalls -- DNS -- DHCP -- Summary -- CH36;Chapter 258; Introduction to IPCop -- Free and Open Source Software -- Forking IPCop -- The Purpose of IPCop -- The Benefits of Building on Stable Components -- The Gap IPCop Fills -- Features of IPCop -- Web Interface -- Network Interfaces -- The Green Network Interface -- The Red Network Interface -- The Orange Network Interface -- The Blue Network Interfaces -- Simple Administration and Monitoring -- Modem Settings -- Services -- Virtual Private Networking -- ProPolice Stack Protection -- Why IPCop63; -- Summary -- CH36;Chapter 358; Deploying IPCop and Designing a Network -- Trust Relationships between the Interfaces -- Altering IPCop Functionality -- Topology One58; NAT Firewall -- Topology Two58; NAT Firewall with DMZ -- Topology Three58; NAT Firewall with DMZ and Wireless -- Planning Site45;To45;Site VPN Topologies -- Summary -- CH36;Chapter 458; Installing IPCop -- Hardware Requirements -- Other Hardware Considerations -- The Installation Procedure -- Installation Media -- Hard Drive Partitioning and Formatting -- Restore Configuration from Floppy Backup -- Green Interface Configuration -- Finished63; -- Locale Settings -- Hostname -- DNS Domain Name -- ISDN Configuration -- Network Configuration -- DNS and Default Gateway -- DHCP Server -- Finished33; -- First Boot -- Summary -- CH36;Chapter 558; Basic IPCop Usage -- The System Menu -- Software Updates -- Passwords -- SSH Access -- GUI Settings -- Backup -- Shutdown -- Checking the Status of Our IPCop Firewall -- Network Status -- System Graphs -- Network Graphs -- Connections -- Services -- DHCP Server -- Dynamic DNS -- Edit Hosts -- Time Server -- Firewall Functionality -- External Access -- Port Forwarding -- Firewall Options -- Network Troubleshooting with Ping -- Summary -- CH36;Chapter 658; Intrusion Detection with IPCop -- Introduction to IDS -- Introduction to Snort -- Do We Need an IDS63; -- How Does an IDS Work63; -- Using Snort with IPCop -- Monitoring the Logs -- Priority -- Log Analysis Options -- Perl Scripts -- ACID and BASE -- What to Do Next63; -- Summary -- CH36;Chapter 758; Virtual Private Networks -- What Is a VPN63; -- IPSec -- A Little More about Deploying IPSec -- Prerequisites
Control code
ocn250538600
Dimensions
unknown
Extent
1 online resource (vi, 228 pages)
File format
unknown
Form of item
online
Isbn
9781847190253
Level of compression
unknown
Note
eBooks on EBSCOhost
Other physical details
illustrations
Quality assurance targets
not applicable
Reformatting quality
unknown
Sound
unknown sound
Specific material designation
remote
System control number
(OCoLC)250538600
Label
Configuring IPCop firewalls : closing borders with Open Source, Barrie Dempster, James Eaton-Lee, (electronic resource)
Publication
Note
"How to set up, configure, and manage your Linux firewall, web proxy, DHCP, DNS, time server, and VPN with this powerful Open Source solution"--T.page
Antecedent source
unknown
Color
multicolored
Contents
Cover -- TOC36;Table of Contents -- Preface -- CH36;Chapter 158; Introduction to Firewalls -- An Introduction to 40;TCP47;IP41; Networking -- The Purpose of Firewalls -- The OSI Model -- Layer 158; The Physical Layer -- Layer 258; The Data Link Layer -- Layer 358; The Network Layer -- Layer 458; The Transport Layer -- Layer 558; The Session Layer -- Layer 658; The Presentation Layer -- Layer 758; The Application Layer -- How Networks are Structured -- Servers and Clients -- Switches and Hubs -- Routers -- Routers44; Firewalls44; and NAT -- Traffic Filtering -- Personal Firewalls -- Stateless Packet Filtering -- Stateful Packet Filtering -- Application45;Layer Firewalling -- Proxy Servers -- Other Services Sometimes Run on Firewalls -- DNS -- DHCP -- Summary -- CH36;Chapter 258; Introduction to IPCop -- Free and Open Source Software -- Forking IPCop -- The Purpose of IPCop -- The Benefits of Building on Stable Components -- The Gap IPCop Fills -- Features of IPCop -- Web Interface -- Network Interfaces -- The Green Network Interface -- The Red Network Interface -- The Orange Network Interface -- The Blue Network Interfaces -- Simple Administration and Monitoring -- Modem Settings -- Services -- Virtual Private Networking -- ProPolice Stack Protection -- Why IPCop63; -- Summary -- CH36;Chapter 358; Deploying IPCop and Designing a Network -- Trust Relationships between the Interfaces -- Altering IPCop Functionality -- Topology One58; NAT Firewall -- Topology Two58; NAT Firewall with DMZ -- Topology Three58; NAT Firewall with DMZ and Wireless -- Planning Site45;To45;Site VPN Topologies -- Summary -- CH36;Chapter 458; Installing IPCop -- Hardware Requirements -- Other Hardware Considerations -- The Installation Procedure -- Installation Media -- Hard Drive Partitioning and Formatting -- Restore Configuration from Floppy Backup -- Green Interface Configuration -- Finished63; -- Locale Settings -- Hostname -- DNS Domain Name -- ISDN Configuration -- Network Configuration -- DNS and Default Gateway -- DHCP Server -- Finished33; -- First Boot -- Summary -- CH36;Chapter 558; Basic IPCop Usage -- The System Menu -- Software Updates -- Passwords -- SSH Access -- GUI Settings -- Backup -- Shutdown -- Checking the Status of Our IPCop Firewall -- Network Status -- System Graphs -- Network Graphs -- Connections -- Services -- DHCP Server -- Dynamic DNS -- Edit Hosts -- Time Server -- Firewall Functionality -- External Access -- Port Forwarding -- Firewall Options -- Network Troubleshooting with Ping -- Summary -- CH36;Chapter 658; Intrusion Detection with IPCop -- Introduction to IDS -- Introduction to Snort -- Do We Need an IDS63; -- How Does an IDS Work63; -- Using Snort with IPCop -- Monitoring the Logs -- Priority -- Log Analysis Options -- Perl Scripts -- ACID and BASE -- What to Do Next63; -- Summary -- CH36;Chapter 758; Virtual Private Networks -- What Is a VPN63; -- IPSec -- A Little More about Deploying IPSec -- Prerequisites
Control code
ocn250538600
Dimensions
unknown
Extent
1 online resource (vi, 228 pages)
File format
unknown
Form of item
online
Isbn
9781847190253
Level of compression
unknown
Note
eBooks on EBSCOhost
Other physical details
illustrations
Quality assurance targets
not applicable
Reformatting quality
unknown
Sound
unknown sound
Specific material designation
remote
System control number
(OCoLC)250538600

Library Locations

    • InternetBorrow it
      Albany, Auckland, 0632, NZ
Processing Feedback ...