The Book of PF: A No-Nonsense Guide to the OpenBSD Firewall

版权声明:原创作品,允许转载,转载时请务必以超链接形式标明文章原始出版、作者信息和本声明。否则将追究法律责任。 http://blog.csdn.net/topmvp - topmvp

OpenBSD's stateful packet filter, PF, offers an amazing feature set and support across the major BSD platforms. Like most firewall software though, unlocking PF's full potential takes a good teacher. Peter N.M. Hansteen's PF website and conference tutorials have helped thousands of users build the networks they need using PF. The Book of PF is the product of Hansteen's knowledge and experience, teaching good practices as well as bare facts and software options. Throughout the book, Hansteen emphasizes the importance of staying in control by having a written network specification, using macros to make rule sets more readable, and performing rigid testing when loading in new rules.

Today's system administrators face increasing challenges in the quest for network quality, and The Book of PF can help by demystifying the tools of modern *BSD network defense. But, perhaps more importantly, because we know you like to tinker, The Book of PF tackles a broad range of topics that will stimulate your mind and pad your resume, including how to:

*Create rule sets for all kinds of network traffic, whether it is crossing a simple home LAN, hiding behind NAT, traversing DMZs, or spanning bridges
*Use PF to create a wireless access point, and lock it down tight with authpf and special access restrictions
*Maximize availability by using redirection rules for load balancing and CARP for failover
*Use tables for proactive defense against would-be attackers and spammers
*Set up queues and traffic shaping with ALTQ, so your network stays responsive
*Master your logs with monitoring and visualization, because you can never be too paranoid

http://rapidshare.com/files/82392492/1593271654.rar
This is a book about building the network you need. We’ll dip into the topics of fire- walls and related functions, starting from a little theory. You’ll see plenty of examples of filtering and other ways to direct network traffic. I’ll assume that you have a basic to intermediate command of TCP/IP networking concepts and Unix administration. All the information in this book comes with a fair warning: As in any number of other endeavors, the solutions we discuss can be done in more than one way. You should also be aware that the software world could have changed slightly or quite a bit since the book was printed. The information in the book is as up to date and correct as possible at the time of writing, and refers to OpenBSD version 4.8, FreeBSD 8.1, and NetBSD 5.0, with any patches available in late August 2010. xviii Introduction This Is Not a HOWTO The book is a direct descendant of a moderately popular PF tutorial. The tutorial is also the source of the following admonition, and you may be exposed to this live if you attend one of my tutorial sessions: This document is not intended as a precooked recipe for cutting and pasting. Just to hammer this in, please repeat after me: The Pledge of the Network Admin This is my network. It is mine, or technically, my employer's. It is my responsibility, and I care for it with all my heart. There are many other networks a lot like mine, but none are just like it. I solemnly swear that I will not mindlessly paste from HOWTOs. The point is that while the configurations I show you do work (I have tested them, and they are in some way related to what has been put into production), they may be overly simplistic, since many were designed to demonstrate a specific point of configuration. They are almost certain to be at least a little off, and they possibly could be quite wrong for your network. Please keep in mind that this book is intended to show you a few useful techniques and inspire you to achieve good things. Please strive to understand your network and what you need to do to make it better. Please do not paste blindly from this document or any other. What This Book Covers The book is intended to be a stand-alone document to enable you to work onyour machines with only short forays into man pages and occasional refer- ence to the online and printed resources listed in Appendix A. Your system probably comes with a prewritten pf.conf file containing some commented-out suggestions for useful configurations, as well as a fewexamples in the documentation directories such as /usr/share/pf/. These examples are useful as a reference, but we won’t use them directly inthis book. Instead, you’ll learn how to construct a pf.conf from scratch, step by step.
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值