- Paperback: 552 pages
- Publisher: Novell Press; 3 edition (September 24, 2005)
- Language: English
- ISBN-10: 0672327716
- ISBN-13: 978-0672327711
- Product Dimensions: 5.9 x 1.2 x 8.9 inches
- Shipping Weight: 1.9 pounds
- Average Customer Review: 44 customer reviews
- Amazon Best Sellers Rank: #1,294,879 in Books (See Top 100 in Books)
Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your mobile phone number.
Linux Firewalls (3rd Edition) 3rd Edition
Use the Amazon App to scan ISBNs and compare prices.
There is a newer edition of this item:
"Enlightenment Now: The Case for Reason, Science, Humanism, and Progress"
Is the world really falling apart? Is the ideal of progress obsolete? Cognitive scientist and public intellectual Steven Pinker urges us to step back from the gory headlines and prophecies of doom, and instead, follow the data: In seventy-five jaw-dropping graphs, Pinker shows that life, health, prosperity, safety, peace, knowledge, and happiness are on the rise. Learn more
Customers who bought this item also bought
Customers who viewed this item also viewed
What other items do customers buy after viewing this item?
TCP/IP packet handling may seem crystal clear when you first hear about it, but after you've configured your Ethernet card's netmask address, the details become rather vague. You might find yourself asking--if you were a Danish prince--"What is a packet, if its chief good and market of its time be but to route and wrap?" If routing and wrapping were all packets did, we would all enjoy our ignorance blissfully. But packets--like men, as the prince learned--can be hollow carriers of ill will, and excluding the bad ones requires us to understand what they really truly are. At last.
Just how interesting packets turn out to be is revealed in Linux Firewalls, Robert L. Zeigler's sober, agile, and subtle text. Narrowing consideration to threats faced by small networks from external sources, Zeigler and his editors introduce security by delivering prerequisite tutorials on packet architecture and normal network-based client/server daemon-to-daemon communications. Nonthreatening daemon-to-daemon communication is part of the regular operation of a networked POSIX-compliant operating system (like Linux or Windows NT), but the incessant background chatter makes finding hostile intrusions a search for sometimes subtle irregularities in a high throughput environment.
In fact, bombardment of networks with useless packets can create diversions for more pernicious attacks. Distinguishing the good packets from the potentially hostile or merely useless packets requires levels of filtering criteria that depend on the specifics of the network environment. Zeigler sorts out all of these issues and outlines practical network administration strategies for packet filtering.
Linux Firewalls is a how-to for the home Linux box, including the creating and debugging firewall rules for home LANs and network interfaces. For larger LAN users, Zeigler describes intrusion logging; configurations based on varying levels of trust; and the how, why, and when of reporting intrusions to network authorities.
In the wrong hands, firewall reports are either hyped-up cloak-and-dagger sensationalism or monotonous treatises in bitwise accounting. Zeigler strikes a middle ground with a book fit for members of the Linux community who are curious about what is happening over their TCP/IP connections. These are folks who have the prowess to build kernel releases on their own but who aren't necessarily wonks at developing kernel or device driver sources. --Peter Leopold --This text refers to an out of print or unavailable edition of this title.
From the Publisher
An Internet-connected Linux machine is in a high-risk situation. This book details security steps that a home or small-to-mid-size, non-enterprise business might take to protect itself from potential remote attackers. As with the first edition, this book will provide a description of the need for security measures and solutions built upon the most up-to-date technology available. What's new in the Second Edition? Besides updating the content to cover the 2.4 kernel, additional chapters on VPNs, SSH, and Tripwire have been added. --This text refers to an out of print or unavailable edition of this title.
Top customer reviews
There was a problem filtering reviews right now. Please try again later.
I still keep Linux Firewalls on my bookshelf. It's a little dated and does not include coverage of firewalld and newer items, but the basics of iptables remain and this is still handy when I'm adjusting my firewalls for a new application, etc. Still useful after all these years...
The original review is below:
I use this book as a reference and that is how it appears to be written. It's the sort of book I want to have on my shelf so it's there when I need it. Once my firewalling is setup I'm not futzing with it, so that knowledge goes out of my head; not like I'm configuring them every day. As a reference I find it'e well organized and provides quick access to the information I need, The coverage of iptables helps me get the firewalling task at hand done and to refresh my memory of iptables in's and out's. .
I've had this book for years. It got me started with linux firewalls, and it's still helpful when I have to dredge up that skill set even quite a while since I last used it.
I'm sure a lot of the content in this book is available online and some of that will certainly be newer or have some more info. But I like having one place to go for what I need when I need it.
This book has helped me to truly begin to understand how iptables works. I have previously used a Shorewall interface for working on a firewall, but I found that things were just a step or two too abstract for my liking. Linux Firewalls gave me a good (not excessive!) helping of background/theory, and then started showing me actual firewall scripts, interspersed with explanations for almost every command issued.
The book is not for a complete Linux/networking novice. It really does not help you if you don't already know how to do important administrative tasks like assure that the firewall script is executed at the proper time, or know how to fill in the blanks of things that are not strictly Firewall related. That's what I liked about this book, personally: It did not explain to me what a Shell was, or take 50 pages to describe the OSI model (yet again!), and it does not lecture too much on what is or is not the proper way to do things. It just shows you how to do various things, and gives you the information you need to be able to go from there.
Also, the book never gave me a front to back picture of how packets flow through the firewall and are routed and filtered and in what order everything happens. I ended up resorting to the LINUX HOWTO documentation, which gave me more of what I was looking for.
If you already know something about networking and Linux, I'd recommend reading the LINUX HOWTO documentation and if you're hungry for a professional-level firewall book, pick up "Building Internet Firewalls (2nd Edition)" from O'Reilly.
About the book. From the very basic concepts to advanced but clear firewall setup, this book leads you to create a system that will optimally fit your needs. Very impressed. My system implements lots of recommendations from this book. Thanks to authors, thanks to Amazon!
It covers more than just iptables so you can use it to learn/teach networking (TCP/IP,OSI,etc)
Most recent customer reviews
Overall, the book is excellent. It has a nice balance between explaining concepts and giving actual firewall...Read more