Book Image

Mastering Python Networking

By : Eric Chou, Ben Straub
Book Image

Mastering Python Networking

By: Eric Chou, Ben Straub

Overview of this book

Network programming can be a challenging task. However, with full-featured and well-documented libraries, Python makes it an enjoyable experience.This book is an extensive resource that will help you learn everything about employing Python for network programming. You’ll begin with a detailed revision of the Transmission Control Protocol/Internet Protocol (TCP/IP) suite and the Python language. Once you’ve brushed up on the basics, you’ll understand how to use Python libraries to automate network tasks and employ the Ansible framework to achieve your network goals. Next, the book will guide you in using Python for DevOps by employing open source tools to test, secure, and analyze your network. You’ll then build on your knowledge by understanding how to retrieve network information using a polling mechanism and flow-based monitoring. You will also learn how to build customized network web services. In the last module, you’ll use Python for SDN and compare the performance of tools such as OpenFlow, OpenDaylight, and Network Functions Virtualization (NFV). In the concluding chapters, you’ll apply what you’ve learned to construct a migration plan to advance from a legacy to a scalable SDN-based network. By the end of this book, you’ll have developed the skills you need to confidently design high-performance network server apps using Python. https://github.com/TrainingByPackt/Mastering-Python-Networking-eLearning/tree/master
Table of Contents (8 chapters)
Chapter 6
Network Security with Python
Content Locked
Section 2
The Lab Setup
The devices being used in this chapter are a bit different from the previous chapters. In the previous chapters, we were isolating a particular device by focusing on the topic at hand. For this chapter, we will use a few more devices in our lab in order to illustrate the function of the tools that we will be using. The connectivity and operating system information are important as they have ramifications regarding the security tools that we will show later in this chapter. For example, if we want to apply an access list to protect the server, we need to know what the topology looks like and which direction the client is making their connections from. The Ubuntu host connections are a bit different than what we have seen so far, so please make reference back to this lab section when you see the example later if needed.