Building Internet Firewalls / Edition 2

Building Internet Firewalls / Edition 2

5.0 1
by Elizabeth Zwicky D., Simon Cooper, Brent Chapman D.
     
 

View All Available Formats & Editions

ISBN-10: 1565928717

ISBN-13: 9781565928718

Pub. Date: 06/01/2000

Publisher: O'Reilly Media, Incorporated

In the five years since the first edition of this classic book was published, Internet use has exploded. The commercial world has rushed headlong into doing business on the Web, often without integrating sound security technologies and policies into their products and methods. The security risks—and the need to protect both business and personal data—have

Overview

In the five years since the first edition of this classic book was published, Internet use has exploded. The commercial world has rushed headlong into doing business on the Web, often without integrating sound security technologies and policies into their products and methods. The security risks—and the need to protect both business and personal data—have never been greater. We've updated Building Internet Firewalls to address these newer risks.

What kinds of security threats does the Internet pose? Some, like password attacks and the exploiting of known security holes, have been around since the early days of networking. And others, like the distributed denial of service attacks that crippled Yahoo, E-Bay, and other major e-commerce sites in early 2000, are in current headlines.

Firewalls, critical components of today's computer networks, effectively protect a system from most Internet security threats. They keep damage on one part of the network—such as eavesdropping, a worm program, or file damage—from spreading to the rest of the network. Without firewalls, network security problems can rage out of control, dragging more and more systems down.

Like the bestselling and highly respected first edition, Building Internet Firewalls, 2nd Edition, is a practical and detailed step-by-step guide to designing and installing firewalls and configuring Internet services to work with a firewall. Much expanded to include Linux and Windows coverage, the second edition describes:

    • Firewall technologies: packet filtering, proxying, network address translation, virtual private networks
    • Architectures such as screening routers, dual-homed hosts, screened hosts, screened subnets, perimeter networks, internal firewalls
    • Issues involved in a variety of new Internet services and protocols through a firewall
    • Email and News
    • Web services and scripting languages (e.g., HTTP, Java, JavaScript, ActiveX, RealAudio, RealVideo)
    • File transfer and sharing services such as NFS, Samba
    • Remote access services such as Telnet, the BSD "r" commands, SSH, BackOrifice 2000
    • Real-time conferencing services such as ICQ and talk
    • Naming and directory services (e.g., DNS, NetBT, the Windows Browser)
    • Authentication and auditing services (e.g., PAM, Kerberos, RADIUS);
    • Administrative services (e.g., syslog, SNMP, SMS, RIP and other routing protocols, and ping and other network diagnostics)
    • Intermediary protocols (e.g., RPC, SMB, CORBA, IIOP)
    • Database protocols (e.g., ODBC, JDBC, and protocols for Oracle, Sybase, and Microsoft SQL Server)

    The book's complete list of resources includes the location of many publicly available firewall construction tools.

Product Details

ISBN-13:
9781565928718
Publisher:
O'Reilly Media, Incorporated
Publication date:
06/01/2000
Edition description:
Second Edition
Pages:
896
Product dimensions:
7.08(w) x 9.08(h) x 1.69(d)

Table of Contents

  • Preface
  • Part I: Network Security
    • Chapter 1: Why Internet Firewalls?
    • Chapter 2: Internet Services
    • Chapter 3: Security Strategies


  • Part II: Building Firewalls
    • Chapter 4: Packets and Protocols
    • Chapter 5: Firewall Technologies
    • Chapter 6: Firewall Architectures
    • Chapter 7: Firewall Design
    • Chapter 8: Packet Filtering
    • Chapter 9: Proxy Systems
    • Chapter 10: Bastion Hosts
    • Chapter 11: Unix and Linux Bastion Hosts
    • Chapter 12: Windows NT and Windows 2000 Bastion Hosts


  • Part III: Internet Services
    • Chapter 13: Internet Services and Firewalls
    • Chapter 14: Intermediary Protocols
    • Chapter 15: The World Wide Web
    • Chapter 16: Electronic Mail and News
    • Chapter 17: File Transfer, File Sharing, and Printing
    • Chapter 18: Remote Access to Hosts
    • Chapter 19: Real-Time Conferencing Services
    • Chapter 20: Naming and Directory Services
    • Chapter 21: Authentication and Auditing Services
    • Chapter 22: Administrative Services
    • Chapter 23: Databases and Games
    • Chapter 24: Two Sample Firewalls


  • Part IV: Keeping Your Site Secure
    • Chapter 25: Security Policies
    • Chapter 26: Maintaining Firewalls
    • Chapter 27: Responding to Security Incidents


  • Part V: Appendixes
    • Appendix A: Resources
    • Appendix B: Tools
    • Appendix C: Cryptography


  • Colophon

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >

Building Internet Firewalls 5 out of 5 based on 0 ratings. 1 reviews.
Guest More than 1 year ago
In this day and age, attacks by so-called 'hackers' against companies' internal networks are always a threat and virtually any business, government or educational institution needs to protect itself against this threat. Firewalls (while not 100% safe) offer an excellent protection against such attacks. These attacks as the books can come in many forms, such as 'denial of service' attacks. This updated second edition offers a lot of information about setting up and maintaining a firewall. It describes different types of firewalls, the tools (both software & hardware) you can use to set up your firewall, which Internet services (World Wide Web, electronic mail and netnews, FTP, telnet, teleconferencing, etc) you can decide to put through a firewall, and maintaining it once the firewall has been set up. There's a lot of good common-sense information in here too, when it talks about how you go about deciding what should and shouldn't be protected, who will have access to which services, what kind of security policies to set up, and what to do when you do have any type of 'break-in.' I learned quite a bit about firewalls from this book and anyone who needs to learn about firewalls should get a copy of this book if they already haven't.