Part II: Building FirewallsPart II describes how to build firewalls, configure services to run with them, and maintain firewalls over time. Chapter 4, Firewall Design , outlines the basic components and major architectures used in constructing firewalls -- dual-homed hosts, screened hosts, screened subnets, and variations on these basic architectures. Chapter 5, Bastion Hosts , presents step-by-step instructions for how to design and build the bastion hosts used in many firewall configurations. Chapter 6, Packet Filtering , describes how proxy clients and servers work, and how to use these systems in building a firewall. Chapter 7, Proxy Systems , describes how packet filtering systems work and discusses what you can and can't accomplish with them in building a firewall. Chapter 8, Configuring Internet Services , describes how to configure each major Internet service to run with a firewall. Chapter 9, Two Sample Firewalls , presents two sample configurations for basic firewalls. Chapter 10, Authentication and Inbound Services , discusses the problem of allowing users to access your systems from the Internet, and describes a variety of authentication strategies and products. |
|