Linux Firewalls: Attack Detection and Response with iptables, psad, and fwsnort
Chapter 4 introduced iptables by walking through the steps of building a simple firewall for a standalone system. This chapter discussed the ideas behind firewall optimization and then built user-defined chains to optimize the firewall example from Chapter 4. Finally, the effects of optimization were examined, as were the effects of using the state module. |
Категории