Linux firewalls

Page 1

USE IP TABLES TO DETECT AND PRE VENT

System administrators need to stay ahead of new security vulnerabilities that leave their networks exposed every day. A firewall and an intrusion detection system (IDS) are two important weapons in that fight, enabling you to proactively deny access and monitor network traffic for signs of an attack.

• Tools for visualizing iptables logs

Linux Firewalls discusses the technical details of the iptables firewall and the Netfilter framework that are built into the Linux kernel, and it explains how they provide strong filtering, Network Address Translation (NAT), state tracking, and application layer inspection capabilities that rival many commercial tools. You’ll learn how to deploy iptables as an IDS with psad and fwsnort and how to build a strong, passive authentication layer around iptables with fwknop.

If you’re responsible for keeping a network secure, you’ll find Linux Firewalls invaluable in your attempt to understand attacks and use iptables—along with psad and fwsnort—to detect and even prevent compromises.

Concrete examples illustrate concepts such as firewall log analysis and policies, passive network authentication and authorization, exploit packet traces, Snort ruleset emulation, and more with coverage of: • Application layer attack detection with the iptables string match extension and fwsnort • Building an iptables ruleset that emulates a Snort ruleset

• Passive OS fingerprinting with iptables Perl and C code snippets offer practical examples that will help you to maximize your deployment of Linux firewalls.

ABOUT THE AUTHOR

Michael Rash is a security architect with Enterasys Networks, Inc., where he develops the Dragon intrusion detection and prevention system. He is a frequent contributor to open source projects and the creator of psad, fwknop, and fwsnort. Rash is an expert on firewalls, intrusion detection systems, passive OS fingerprinting, and the Snort rules language. He is co-author of Snort 2.1 Intrusion Detection (Syngress, 2004) and author of Intrusion Prevention and Active Response (Syngress, 2005), and he has written security articles for Linux Journal, Sys Admin magazine, and ;login:.

• Port knocking vs. Single Packet Authorization (SPA)

“ I L AY F L AT .” This book uses RepKover — a durable binding that won’t snap shut. Printed on recycled paper

$49.95 ($59.95 CDN) SHELVE IN: COMPUTER SECURITY/ NETWORKING

w w w.nostarch.com ®

LINUX FIREWALLS ATTACK DETECTION A N D RESPONSE W I T H I P T A B L E S ,

P S A D ,

A N D

F W S N O R T

MICHAEL R ASH

Linux Firewalls is a great book. — From the foreword by Richard Bejtlich of TaoSecurity.com

R ASH

T H E F I N E ST I N G E E K E N T E RTA I N M E N T ™

LINU X FIRE WA LL S

N E T W O R K- B A S E D AT TACKS

®


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.