Part II describes how to build firewalls, configure services to run with them, and maintain firewalls over time.
Chapter 4, Firewall Design , outlines the basic components and major architectures used in constructing firewalls -- dual-homed hosts, screened hosts, screened subnets, and variations on these basic architectures.
Chapter 5, Bastion Hosts , presents step-by-step instructions for how to design and build the bastion hosts used in many firewall configurations.
Chapter 6, Packet Filtering , describes how proxy clients and servers work, and how to use these systems in building a firewall.
Chapter 7, Proxy Systems , describes how packet filtering systems work and discusses what you can and can't accomplish with them in building a firewall.
Chapter 8, Configuring Internet Services , describes how to configure each major Internet service to run with a firewall.
Chapter 9, Two Sample Firewalls , presents two sample configurations for basic firewalls.
Chapter 10, Authentication and Inbound Services , discusses the problem of allowing users to access your systems from the Internet, and describes a variety of authentication strategies and products.