Book Image

Designing and Implementing Linux Firewalls and QoS using netfilter, iproute2, NAT and l7-filter

By : Lucian Gheorghe
Book Image

Designing and Implementing Linux Firewalls and QoS using netfilter, iproute2, NAT and l7-filter

By: Lucian Gheorghe

Overview of this book

Firewalls are used to protect your network from the outside world. Using a Linux firewall, you can do a lot more than just filtering packets. This book shows you how to implement Linux firewalls and Quality of Service using practical examples from very small to very large networks. After giving us a background of network security, the book moves on to explain the basic technologies we will work with, namely netfilter, iproute2, NAT and l7-filter. These form the crux of building Linux firewalls and QOS. The later part of the book covers 5 real-world networks for which we design the security policies, build the firewall, setup the script, and verify our installation. Providing only necessary theoretical background, the book takes a practical approach, presenting case studies and plenty of illustrative examples.
Table of Contents (14 chapters)
Designing and Implementing Linux Firewalls and QoS using netfilter, iproute2, NAT, and L7-filter
Credits
About the Author
About the Reviewer
Preface
Index

Summary


In this first case-study chapter of this book, we've analyzed a couple of scenarios that we can classify as "small" networks, for which we've built firewall and QoS.

The chapter presented:

  • How to make a SOHO router out of a PC running Linux

  • How to secure a SOHO network

  • How to use Linux as router for a small to medium office, and how to secure such a network

  • How to perform transparent proxy using Squid and iptables

  • How to perform NAPT to redirect traffic for certain ports to other hosts using Linux

  • How to split bandwidth between the devices in a SOHO environment using HTB

  • How to do bandwidth shaping using CBQ

  • How to use the L7-filter project to shape traffic consumed by certain applications

  • Most important, how to think, define, and apply security policies for SOHO and small-to-medium office environments