Sei sulla pagina 1di 2

CONTENTS

Chapter 11: Configuring IPTables


Router or Firewall ....................................................................................................................................... 11-3
IPTable Overview ....................................................................................................................................... 11-4
Kernel Configuration for IPTables ............................................................................................................. 11-7
IPTables Syntaxes ....................................................................................................................................... 11-8
Configuring a Firewall with IPTables ........................................................................................................ 11-9
NAT (Network Address Translation) .......................................................................................................... 11-15
Forwarding Ports with IPTables ................................................................................................................. 11-18
Logging IPTables Activities ....................................................................................................................... 11-21

Chapter 12: Squid Proxy Server & Linux Firewall


Squid Overview .......................................................................................................................................... 12-4
Configuring Client Browsers ...................................................................................................................... 12-5
Configuring Files ........................................................................................................................................ 12-8
Security ....................................................................................................................................................... 12-9
Caches ......................................................................................................................................................... 12-15
Logs ............................................................................................................................................................ 12-16
Firewall Overview ...................................................................................................................................... 12-18
Packet Filtering ........................................................................................................................................... 12-19
IP Masquerading ......................................................................................................................................... 12-20

Chapter : Introduction to IP VPNs


What Are VPNs? ........................................................................................................................................
Benefits of VPNs ........................................................................................................................................
Enterprise VPN Types and Applications ....................................................................................................
Access VPNs ..............................................................................................................................................
The Extranet VPN ......................................................................................................................................
The Intranet VPN ........................................................................................................................................
Tunneling Types .........................................................................................................................................
Do-It-Yourself .............................................................................................................................................
Carrier-Provided .........................................................................................................................................

i
Types of VPNs ............................................................................................................................................

Chapter : IP Layer 2 Tunneling


Access VPNs ..............................................................................................................................................

Chapter : Point-to-Point Tunneling Protocol (PPTP)


PPTP ...........................................................................................................................................................

Chapter : Layer-2 Tunneling Protocol (L2TP)


Layer-2 Forwarding (L2F) ..........................................................................................................................
Layer-2 Tunneling Protocol (L2TP) ...........................................................................................................

Chapter : Layer-3 Tunneling


Layer-3 Tunneling ......................................................................................................................................
Layer-3 Tunnel Encapsulation ....................................................................................................................
Generic Route Encapsulation (GRE) ..........................................................................................................
GRE Encapsulation ....................................................................................................................................
GRE Benefits and Drawbacks ....................................................................................................................

ii

Potrebbero piacerti anche