old-www/HOWTO/Firewall-HOWTO.html

130 lines
4.9 KiB
HTML

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">
<HTML>
<HEAD>
<META NAME="GENERATOR" CONTENT="SGML-Tools 1.0.9">
<TITLE>Firewall and Proxy Server HOWTO</TITLE>
<LINK HREF="Firewall-HOWTO-1.html" REL=next>
</HEAD>
<BODY>
<A HREF="Firewall-HOWTO-1.html">Next</A>
Previous
Contents
<HR>
<H1>Firewall and Proxy Server HOWTO</H1>
<H2>Mark Grennan, <CODE>mark@grennan.com</CODE></H2>v0.80, Feb. 26, 2000
<P><HR>
<EM> This document is designed to describe the basics of firewall systems and give you some detail on setting up both a filtering and proxy firewall on a Linux based system. An HTML version of this document is available at <EM>http://www.grennan.com/Firewall-HOWTO.html</EM> </EM>
<HR>
<P>
<H2><A NAME="toc1">1.</A> <A HREF="Firewall-HOWTO-1.html">Introduction</A></H2>
<UL>
<LI><A HREF="Firewall-HOWTO-1.html#ss1.1">1.1 Feedback</A>
<LI><A HREF="Firewall-HOWTO-1.html#ss1.2">1.2 Disclaimer </A>
<LI><A HREF="Firewall-HOWTO-1.html#ss1.3">1.3 Copyright</A>
<LI><A HREF="Firewall-HOWTO-1.html#ss1.4">1.4 My Reasons for Writing this</A>
<LI><A HREF="Firewall-HOWTO-1.html#ss1.5">1.5 Further Readings</A>
</UL>
<P>
<H2><A NAME="toc2">2.</A> <A HREF="Firewall-HOWTO-2.html">Understanding Firewalls</A></H2>
<UL>
<LI><A HREF="Firewall-HOWTO-2.html#ss2.1">2.1 Firewall Politics</A>
<LI><A HREF="Firewall-HOWTO-2.html#ss2.2">2.2 Types of Firewalls</A>
</UL>
<P>
<H2><A NAME="toc3">3.</A> <A HREF="Firewall-HOWTO-3.html">Firewall Architecture </A></H2>
<UL>
<LI><A HREF="Firewall-HOWTO-3.html#ss3.1">3.1 Dial-up Architecture</A>
<LI><A HREF="Firewall-HOWTO-3.html#ss3.2">3.2 Single Router Architecture</A>
<LI><A HREF="Firewall-HOWTO-3.html#ss3.3">3.3 Firewall with Proxy Server</A>
<LI><A HREF="Firewall-HOWTO-3.html#ss3.4">3.4 Redundent Internet Configuration</A>
</UL>
<P>
<H2><A NAME="toc4">4.</A> <A HREF="Firewall-HOWTO-4.html">Setting up the Linux Filtering Firewall </A></H2>
<UL>
<LI><A HREF="Firewall-HOWTO-4.html#ss4.1">4.1 Hardware requirements</A>
</UL>
<P>
<H2><A NAME="toc5">5.</A> <A HREF="Firewall-HOWTO-5.html">Software requirements</A></H2>
<UL>
<LI><A HREF="Firewall-HOWTO-5.html#ss5.1">5.1 Selecting a Kernel</A>
<LI><A HREF="Firewall-HOWTO-5.html#ss5.2">5.2 Selecting a proxy server</A>
</UL>
<P>
<H2><A NAME="toc6">6.</A> <A HREF="Firewall-HOWTO-6.html">Preparing the Linux system</A></H2>
<UL>
<LI><A HREF="Firewall-HOWTO-6.html#ss6.1">6.1 Compiling the Kernel</A>
<LI><A HREF="Firewall-HOWTO-6.html#ss6.2">6.2 Configuring two network cards</A>
<LI><A HREF="Firewall-HOWTO-6.html#ss6.3">6.3 Configuring the Network Addresses</A>
<LI><A HREF="Firewall-HOWTO-6.html#ss6.4">6.4 Testing your network</A>
<LI><A HREF="Firewall-HOWTO-6.html#ss6.5">6.5 Securing the Firewall</A>
</UL>
<P>
<H2><A NAME="toc7">7.</A> <A HREF="Firewall-HOWTO-7.html">IP filtering setup (IPFWADM)</A></H2>
<P>
<H2><A NAME="toc8">8.</A> <A HREF="Firewall-HOWTO-8.html">IP filtering setup (IPCHAINS)</A></H2>
<P>
<H2><A NAME="toc9">9.</A> <A HREF="Firewall-HOWTO-9.html">Installing a Transparent SQUID proxy</A></H2>
<P>
<H2><A NAME="toc10">10.</A> <A HREF="Firewall-HOWTO-10.html">Installing the TIS Proxy server</A></H2>
<UL>
<LI><A HREF="Firewall-HOWTO-10.html#ss10.1">10.1 Getting the software</A>
<LI><A HREF="Firewall-HOWTO-10.html#ss10.2">10.2 Compiling the TIS FWTK</A>
<LI><A HREF="Firewall-HOWTO-10.html#ss10.3">10.3 Installing the TIS FWTK </A>
<LI><A HREF="Firewall-HOWTO-10.html#ss10.4">10.4 Configuring the TIS FWTK</A>
</UL>
<P>
<H2><A NAME="toc11">11.</A> <A HREF="Firewall-HOWTO-11.html">The SOCKS Proxy Server</A></H2>
<UL>
<LI><A HREF="Firewall-HOWTO-11.html#ss11.1">11.1 Setting up the Proxy Server</A>
<LI><A HREF="Firewall-HOWTO-11.html#ss11.2">11.2 Configuring the Proxy Server</A>
<LI><A HREF="Firewall-HOWTO-11.html#ss11.3">11.3 Working With a Proxy Server</A>
<LI><A HREF="Firewall-HOWTO-11.html#ss11.4">11.4 Drawbacks with Proxy Servers</A>
</UL>
<P>
<H2><A NAME="toc12">12.</A> <A HREF="Firewall-HOWTO-12.html">Advanced Configurations</A></H2>
<UL>
<LI><A HREF="Firewall-HOWTO-12.html#ss12.1">12.1 A large network with emphasis on security</A>
</UL>
<P>
<H2><A NAME="toc13">13.</A> <A HREF="Firewall-HOWTO-13.html">Making Management Easy</A></H2>
<UL>
<LI><A HREF="Firewall-HOWTO-13.html#ss13.1">13.1 Firewall tools</A>
<LI><A HREF="Firewall-HOWTO-13.html#ss13.2">13.2 General tools</A>
</UL>
<P>
<H2><A NAME="toc14">14.</A> <A HREF="Firewall-HOWTO-14.html">Defeating a Proxy Firewall</A></H2>
<P>
<H2><A NAME="toc15">15.</A> <A HREF="Firewall-HOWTO-15.html">APPENDEX A - Example Scripts</A></H2>
<UL>
<LI><A HREF="Firewall-HOWTO-15.html#ss15.1">15.1 RC Script useing GFCC</A>
<LI><A HREF="Firewall-HOWTO-15.html#ss15.2">15.2 GFCC script</A>
<LI><A HREF="Firewall-HOWTO-15.html#ss15.3">15.3 RC Script without GFCC</A>
</UL>
<P>
<H2><A NAME="toc16">16.</A> <A HREF="Firewall-HOWTO-16.html">APPENDEX B - An VPN RC Script for RedHat</A></H2>
<HR>
<A HREF="Firewall-HOWTO-1.html">Next</A>
Previous
Contents
</BODY>
</HTML>