Item description for Designing and Implementing Linux Firewalls with QoS using netfilter, iproute2, NAT and L7-filter by Lucian Gheorghe...
Learn how to secure your system and implement QoS using real-world scenarios for networks of all sizes using this unique book. The book covers: Implementing Packet filtering, NAT, bandwidth shaping, packet prioritization using netfilter/iptables, iproute2, Class Based Queuing (CBQ) and Hierarchical Token Bucket (HTB) Designing and implementing 5 real-world firewalls and QoS scenarios ranging from small SOHO offices to a large Learn how to secure your system and implement QoS using real-world scenarios for networks of all sizes using this unique book. The book covers: Implementing Packet filtering, NAT, bandwidth shaping, packet prioritization using netfilter/iptables, iproute2, Class Based Queuing (CBQ) and Hierarchical Token Bucket (HTB) Designing and implementing 5 real-world firewalls and QoS scenarios ranging from small SOHO offices to a large scale ISP network that spans many cities Building intelligent networks by marking, queuing, and prioritizing different types of traffic
This practical guide teaches you how to implement effective network protection by using your own customized firewall solution. Based on extensive practical experience, this book distills a unique set of scenario based scripts and guidelines for a proven firewall solution, into one succinct and precise book.
After giving us a background of network security, the book moves on to explain the basic technologies we will work with, namely netfilter, iproute2, NAT and l7-filter. These form the crux of building Linux firewalls and QOS. The later part of the book covers 5 real-world networks for which we design the security policies, build the firewall, setup the script, and verify our installation.Providing only necessary theoretical background, the book takes a practical approach, presenting case studies and plenty of illustrative examples.
Chapter 1 is a brief introduction to networking concepts. It covers OSI and TCP/IP networking models with explanations on their layers, TCP and UDP as Layer 4 protocols and then rounds off the chapter with a discussion on IP addresses, Subnetting, and Supernetting.
Chapter 2 discusses possible security threats and vulnerabilities found at each of the OSI layers. The goal here is to understand where and how these threats can affect us and to stay protected from attackers. It then rounds off the discussion by sketching out the basic steps required to protect the services that run on our system.
Chapter 3 introduces two tools needed to build Linux firewalls and QoS. We first learn the workings of netfilter, which is a packet filtering framework, and implement what we have learnt to build a basic firewall for a Linux workstation. We then see how to perform advanced routing and traffic shaping using the IP and TC tools provided by the iproute2 package. The chapter ends with another example scenario where we implement the concepts learnt in the chapter.
Chapter 4 discusses NAT, the types of NAT, how they work and how they can be implemented with Linux by giving practical examples. It also describe packet mangling, when to use it, and why to use it.
Chapter 5 covers layer 7 filtering in detail. We see how to install the l7-filter package, apply the necessary Linux kernel and ip table patches, and test our installation. We then learn the different applications of l7-filter and see how to put them to practical use. We will also see how to install and use IPP2P, which is an alternative to the l7-filter package but only for P2P traffic, and finally we set up a test between the two packages.
Chapter 6 raises two very popular scenarios, for which we design, implement, and test firewalls and a small QoS configuration. In the first scenario, we configure Linux as a SOHO router.
Chapter 7 covers the design of a firewall system for a hypermarket having the headquarters in one location, one store in the same city and several stores in other cities. The hypermarket has an application that uses MSSQL databases in each location which is replicated at the headquarters.
Chapter 8 covers the design of a three-layered network deployed at a large provider of Internet and IP telephony services, the three layers being Core, Distribution and Access. It explains network configuration first on the core and distribution levels and then moves on to building firewalls. The huge size of the network also means that there is a need to tackle newer security threats. As seen in the figure we have 4 Cores running BGP under Zebra and each one peculiar in its own way.
Throughout the book, the author draws on his experience to offer the reader valuable advice on the best practices. Providing only necessary theoretical background, the book takes a practical approach, presenting case studies and plenty of illustrative examples. This book is aimed at Linux Network administrators with some understanding of Linux security threats and issues, or any one interested in securing their systems behind a firewall. Basic knowledge of Linux is presumed but other than that this book shows you how to do the rest, from configuring your system to dealing with security breaches.
Promise Angels is dedicated to bringing you great books at great prices. Whether you read for entertainment, to learn, or for literacy - you will find what you want at promiseangels.com!
Est. Packaging Dimensions: Length: 0.75" Width: 7.5" Height: 9.25" Weight: 1.12 lbs.
Release Date Oct 31, 2006
Publisher Packt Publishing
ISBN 1904811655 ISBN13 9781904811657
Availability 119 units. Availability accurate as of May 22, 2017 11:47.
Usually ships within one to two business days from La Vergne, TN.
Orders shipping to an address other than a confirmed Credit Card / Paypal Billing address may incur and additional processing delay.
Reviews - What do customers think about Designing and Implementing Linux Firewalls with QoS using netfilter, iproute2, NAT and L7-filter?
Very good book Oct 22, 2007
If you like opensource, QoS, Firewalls... this book would be what you need.
If you are netadmin, sysadmin or you are an IT guy and learn this book, you can limit p2p/bittorrent traffic, guarantee bandwith for some services like http, ftp, voip, etc. (QoS), you can protect your network with firewalls.
First in chapter 1 we learn about Networking Fundamentals, then in chapter 2, about Security Threats in every OSI layer. After that we are ready to learn about basis of netfilter and iproute (Firewall and QoS).
In next chapters, show us how to do layer 7 filtering, practical QoS and more advanced things. Then we apply this knowledge in a very practical serie of scenerios that come later in the book.
Very good book, I recomend this to you.
Pretty good book Jan 11, 2007
Although I am an experienced Linux user and do some Admin, I'm on my current project developing a linux embedded system that will be a router. We have QoS and netfilter requirements and I found nearly all the data on QoS old and dated for the 2.4 kernel. Furthermore, due to lack of info I had a hard time developing basic test scenarios.
After reading this book, I feel much better preparred for the project. What I liked about the book was the real world examples with some sense of humor. Even on a dry subject like network packets I was able to read thru the book easily. The tc examples and kernel config was what I really needed, and the book handled that well. The book is based on kernel 2.6.14 at least in a few areas.
I'm giving the book 4 stars because I'm just starting. The book does have large and small examples but I haven't used them yet. As an intro I give it 5 stars.