Building Internet Firewalls: Internet and Web Security

Front Cover
"O'Reilly Media, Inc.", Jun 26, 2000 - Computers - 896 pages

In the five years since the first edition of this classic book was published, Internet use has exploded. The commercial world has rushed headlong into doing business on the Web, often without integrating sound security technologies and policies into their products and methods. The security risks--and the need to protect both business and personal data--have never been greater. We've updated Building Internet Firewalls to address these newer risks.

What kinds of security threats does the Internet pose? Some, like password attacks and the exploiting of known security holes, have been around since the early days of networking. And others, like the distributed denial of service attacks that crippled Yahoo, E-Bay, and other major e-commerce sites in early 2000, are in current headlines.

Firewalls, critical components of today's computer networks, effectively protect a system from most Internet security threats. They keep damage on one part of the network--such as eavesdropping, a worm program, or file damage--from spreading to the rest of the network. Without firewalls, network security problems can rage out of control, dragging more and more systems down.

Like the bestselling and highly respected first edition, Building Internet Firewalls, 2nd Edition, is a practical and detailed step-by-step guide to designing and installing firewalls and configuring Internet services to work with a firewall. Much expanded to include Linux and Windows coverage, the second edition describes:

    • Firewall technologies: packet filtering, proxying, network address translation, virtual private networks
    • Architectures such as screening routers, dual-homed hosts, screened hosts, screened subnets, perimeter networks, internal firewalls
    • Issues involved in a variety of new Internet services and protocols through a firewall
    • Email and News
    • Web services and scripting languages (e.g., HTTP, Java, JavaScript, ActiveX, RealAudio, RealVideo)
    • File transfer and sharing services such as NFS, Samba
    • Remote access services such as Telnet, the BSD "r" commands, SSH, BackOrifice 2000
    • Real-time conferencing services such as ICQ and talk
    • Naming and directory services (e.g., DNS, NetBT, the Windows Browser)
    • Authentication and auditing services (e.g., PAM, Kerberos, RADIUS);
    • Administrative services (e.g., syslog, SNMP, SMS, RIP and other routing protocols, and ping and other network diagnostics)
    • Intermediary protocols (e.g., RPC, SMB, CORBA, IIOP)
    • Database protocols (e.g., ODBC, JDBC, and protocols for Oracle, Sybase, and Microsoft SQL Server)

    The book's complete list of resources includes the location of many publicly available firewall construction tools.

 

Contents

I
1
Why Internet Firewalls?
3
Internet Services
33
Security Strategies
59
II
73
Packets and Protocols
75
Firewall Technologies
102
Firewall Architectures
122
File Transfer File Sharing and Printing
454
Remote Access to Hosts
488
RealTime Conferencing Services
520
Naming and Directory Services
539
Authentication and Auditing Services
591
Administrative Services
630
Databases and Games
664
Two Sample Firewalls
681

Firewall Design
157
Packet Filtering
165
Proxy Systems
224
Bastion Hosts
241
Unix and Linux Bastion Hosts
273
Windows NT and Windows 2000 Bastion Hosts
297
III
315
Internet Services and Firewalls
317
Intermediary Protocols
349
The World Wide Web
384
Electronic Mail and News
423
IV
721
Security Policies
723
Maintaining Firewalls
742
Responding to Security Incidents
764
V
795
Resources
797
Tools
813
Cryptography
823
Index
849
Copyright

Other editions - View all

Common terms and phrases

Popular passages

Page 34 - He is also the associate director for virtual environments at the National Center for Supercomputing Applications (NCSA) at the University of Illinois at Urbana-Champaign.

Bibliographic information