Building Internet Firewalls

Building Internet Firewalls
ISBN-10
1565921240
ISBN-13
9781565921245
Pages
517
Language
English
Published
1995
Publisher
O'Reilly & Associates
Authors
Elizabeth D. Zwicky, D. Brent Chapman

Description

More than a million systems are now connected to the Internet, and something like 15 million people in 100 countries on all seven continents use Internet services. More than 100 million email messages are exchanged each day, along with countless files, documents, and audio and video images.

Everyone is jumping on the Internet bandwagon. Once a haven for academicians and scientists, the Net is now reaching large and small businesses, government at all levels, school children, and senior citizens. The commercial world is rushing headlong into doing business on the Internet, barely pausing while technologies and policies catch up with their desire to go online. But, too few of the seekers after Internet wisdom and riches consider whether their businesses will be safe on the Net.

What kinds of security risks are posed by the Internet? Some risks have been around since the early days of networking -- password attacks (guessing them or cracking them via password dictionaries and cracking programs), denial of service, and exploiting known security holes. Some risks are newer and even more dangerous -- packet sniffers, IP (Internet Protocol) forgery, and various types of hijacking attacks.

Firewalls are a very effective way to protect your system from these Internet security threats. Firewalls in computer networks keep damage on one part of the network (e.g., eavesdropping, a worm program, file damage) from spreading to the rest of the network. Without firewalls, network security problems can rage out of control, dragging more and more systems down.

What is a firewall? It's a hardware and/or software solution that restricts access from your internal network to the Internet -- and vice versa. A firewall may also be used to separate two or more parts of your local network (for example, protecting finance from R&D). The firewall is installed at the perimeter of the network, ordinarily where it connects to the Internet. You can think of a firewall as a checkpoint; all traffic, incoming and outgoing, is stopped at this point. Because it is, the firewall can make sure that it is acceptable. "Acceptable" means that whatever is passing through -- email, file transfers, remote logins, NFS mounts, etc. -- conforms to the security policy of the site.

Building Internet Firewallsis a practical guide to building firewalls on the Internet. If your site is connected to the Internet, or if you're considering getting connected, you need this book. It describes a variety of firewall approaches and architectures and discusses how you can build packet filtering and proxying solutions at your site. It also contains a full discussion of how to configure Internet services (e.g., FTP, SMTP, Telnet) to work with a firewall. The book also includes a complete list of resources, including the location of many publicly available firewall construction tools.

The book is divided into four parts:

Part I discusses Internet threats, the benefits of firewalls, overall security strategies, and a summary of Internet services and their security risks.

Part II describes possible firewall designs and general terms and concepts, how to protect the bastion host in your firewall configuration, how to build proxying and packet filtering firewalls, and how to configure Internet services to operate with a firewall.

Part III describes how to maintain a firewall, develop a security policy, and respond to a security incident.

Part IV contains appendices consisting of a resource summary, a directory of how to find firewall toolkits and other security-related tools, and a detailed summary providing TCP/IP background information.

Other editions

Similar books

  • Building Internet Firewalls
    By Simon Cooper, D. Brent Chapman

    In the five years since the first edition of this classic book was published, Internet use has exploded.

  • The Best Damn Firewall Book Period
    By Thomas W Shinder

    For example, the Ping of Death attack targets ICMP (ping), and if it reaches a vulnerable host, it will crash, causing a DOS. Though other protocols exist within this layer (ARP, RARP, RIP, OSPF), SmartDefense only provides protections ...

  • Building firewalls with OpenBSD and PF
    By Jacek Artymiak

    Written by Jacek Artymiak, a frequent contributor to ONLamp.com, Building Firewalls with OpenBSD and PF is the first and only print publication devoted solely to the subject of the pf packet filter used in OpenBSD, FreeBSD, and NetBSD ...

  • Building Linux and OpenBSD Firewalls
    By Wes Sonnenreich, Tom Yates

    A step-by-step guide to bulding a commercial-grade firewall with open source software Building Linux and OpenBSD Firewalls It's now more important than ever before to protect your data...

  • Firewalls and Internet Security: Repelling the Wily Hacker
    By William R. Cheswick, Steven M. Bellovin, Aviel D. Rubin

    Steven M. Bellovin ( http://stevebellovin.com ) is a Fellow at AT & T Labs Research , where he works on networks , security , and ... ISBN 0-201-63466 - X $ 49.99 US $ 77.99 CANADA A Addison - Wesley Pearson Education 7 85342 " 63466 " 2.

  • Firewalls: Jumpstart for Network and Systems Administrators
    By John R. Vacca, Scott Ellis

    In this book, you will gain extensive hands-on experience installing and configuring a firewall.

  • Linux Networking Cookbook: From Asterisk to Zebra with Easy-to-Use Recipes
    By Carla Schroder

    If you want a book that lays out the steps for specific tasks, that clearly explains the commands and configurations, and does not tax your patience with endless ramblings and meanderings into theory and obscure RFCs, this is the book for ...

  • Internet Firewalls and Network Security
    By Chris Hare, Karanjit Siyan, Karanjit S. Siyan

    ... weber.ucsd.edu In the body of the list include the following line : SUB CuD Also include the subject SUB CuD in your message . This list is also available through the Usenet newsgroup by the following name : comp.society.cu - digest ...

  • Building DMZs For Enterprise Networks
    By Syngress

    - Dr. Thomas W. Shinder is the author of the best-selling book on Microsoft's ISA, Configuring ISA Server 2000. Customers of the first book will certainly buy this book.

  • Zero Trust Networks: Building Secure Systems in Untrusted Networks
    By Evan Gilman, Doug Barth

    The cover image is from Pictorial Museum of Animated Nature. The cover fonts are URW Typewriter and Guardian Sans. The text font is Adobe Minion Pro; the heading font is Adobe Myriad Condensed; and the code font is Dalton Maag's ...