Configuring IPCop Firewalls: Closing Borders with Open Source

How to setup, configure and manage your Linux firewall, web proxy, DHCP, DNS, time server, and VPN with this powerful Open Source solution
Preview in Mapt
Code Files

Configuring IPCop Firewalls: Closing Borders with Open Source

Barrie Dempster, James Eaton-Lee

How to setup, configure and manage your Linux firewall, web proxy, DHCP, DNS, time server, and VPN with this powerful Open Source solution
Mapt Subscription
FREE
$29.99/m after trial
eBook
$16.80
RRP $23.99
Save 29%
Print + eBook
$39.99
RRP $39.99
What do I get with a Mapt Pro subscription?
  • Unlimited access to all Packt’s 5,000+ eBooks and Videos
  • Early Access content, Progress Tracking, and Assessments
  • 1 Free eBook or Video to download and keep every month after trial
What do I get with an eBook?
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
What do I get with Print & eBook?
  • Get a paperback copy of the book delivered to you
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
What do I get with a Video?
  • Download this Video course in MP4 format
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
$0.00
$16.80
$39.99
$29.99p/m after trial
RRP $23.99
RRP $39.99
Subscription
eBook
Print + eBook
Start 30 Day Trial

Frequently bought together


Configuring IPCop Firewalls: Closing Borders with Open Source Book Cover
Configuring IPCop Firewalls: Closing Borders with Open Source
$ 23.99
$ 16.80
Open Source Identity Management Patterns and Practices Using OpenAM 10.x Book Cover
Open Source Identity Management Patterns and Practices Using OpenAM 10.x
$ 14.99
$ 10.50
Buy 2 for $27.30
Save $11.68
Add to Cart
Subscribe and access every Packt eBook & Video.
 
  • 5,000+ eBooks & Videos
  • 50+ New titles a month
  • 1 Free eBook/Video to keep every month
Start Free Trial
 

Book Details

ISBN 139781904811367
Paperback244 pages

Book Description

IPCop is a powerful, open source, Linux based firewall distribution for primarily Small Office Or Home (SOHO) networks, although it can be used in larger networks. It provides most of the features that you would expect a modern firewall to have, and what is most important is that it sets this all up for you in a highly automated and simplified way.
This book is an easy introduction to this popular application. After introducing and explaining the foundations of firewalling and networking and why they're important, the book moves on to cover using IPCop, from installing it, through configuring it, to more advanced features, such as configuring IPCop to work as an IDS, VPN and using it for bandwidth management. While providing necessary theoretical background, the book takes a practical approach, presenting sample configurations for home users, small businesses, and large businesses. The book contains plenty of illustrative examples.

Table of Contents

Chapter 1: Introduction to Firewalls
An Introduction to (TCP/IP) Networking
The Purpose of Firewalls
The OSI Model
How Networks are Structured
Traffic Filtering
Other Services Sometimes Run on Firewalls
Summary
Chapter 2: Introduction to IPCop
Free and Open Source Software
The Purpose of IPCop
The Benefits of Building on Stable Components
The Gap IPCop Fills
Features of IPCop
Virtual Private Networking
Why IPCop?
Summary
Chapter 3: Deploying IPCop and Designing a Network
Trust Relationships between the Interfaces
Altering IPCop Functionality
Topology One: NAT Firewall
Topology Two: NAT Firewall with DMZ
Topology Three: NAT Firewall with DMZ and Wireless
Planning Site-To-Site VPN Topologies
Summary
Chapter 4: Installing IPCop
Hardware Requirements
Other Hardware Considerations
The Installation Procedure
Green Interface Configuration
First Boot
Summary
Chapter 5: Basic IPCop Usage
The System Menu
Checking the Status of Our IPCop Firewall
Network Status
Services
Firewall Functionality
Summary
Chapter 6: Intrusion Detection with IPCop
Introduction to IDS
Introduction to Snort
Do We Need an IDS?
How Does an IDS Work?
Using Snort with IPCop
Monitoring the Logs
Log Analysis Options
What to Do Next?
Summary
Chapter 7: Virtual Private Networks
What is a VPN?
Summary
Chapter 8: Managing Bandwidth with IPCop
The Bandwidth Problem
The HTTP Problem
The Solutions: Proxying and Caching
Introduction to Squid
Configuring Squid
Cache Management
Managing Bandwidth without a Cache
Summary
Chapter 9: Customizing IPCop
Addons
Firewall Addons Server
Common Addons
Summary
Chapter 10: Testing, Auditing, and Hardening IPCop
Security and Patch Management
Basic Firewall Hardening
Advanced Hardening
Logfiles and Monitoring Usage
Usage and Denial of Service
Where to Go Next?
Summary
Chapter 11: IPCop Support
Support
Summary

What You Will Learn

Chapter 1 briefly introduces some firewall and networking concepts. The chapter introduces the roles of several common networking devices and explains how firewalls fit into this.

Chapter 2 introduces the IPCop package itself, discussing how IPCop's red/orange/blue/green interfaces fit into a network topology. It then covers the configuration of IPCop in other common roles, such as those of a web proxy, DHCP, DNS, time, and VPN server.

Chapter 3 covers three sample scenarios where we learn how to deploy IPCop, how IPCop interfaces connect to each other and to the network as a whole.

Chapter 4 covers installing IPCop. It outlines the system configuration required to run IPCop, and explains the configuration required to get IPCop up and running.

In Chapter 5, we will learn how to employ the various tools IPCop provides us with to administrate, operate, troubleshoot, and monitor our IPCop firewall

Chapter 6 starts off with explaining the need for an IDS in our system and then goes on to explain how to use the SNORT IDS with IPCop.

Chapter 7 introduces the VPN concept and explains how to set up an IPSec VPN configuration for a system. Special focus is laid on configuring the blue zone — a secured wireless network augmenting the security of a wireless segment, even one already using WEP or WPA.

Chapter 8 demonstrates how to manage bandwidth using IPCop making use of traffic shaping techniques and cache management. The chapter also covers the configuration of the Squid web proxy and caching system.

Chapter 9 focuses on the vast range of add-ons available to configure IPCop to suit our needs. We see how to install add-ons and then learn more about common add-ons like SquidGuard, Enhanced Filtering, Blue Access, LogSend, and CopFilter.  

Chapter 10 covers IPCop security risks, patch management and some security and auditing tools and tests.

Chapter 11 outlines the support IPCop users have in the form of mailing lists and IRC.

Authors

Table of Contents

Chapter 1: Introduction to Firewalls
An Introduction to (TCP/IP) Networking
The Purpose of Firewalls
The OSI Model
How Networks are Structured
Traffic Filtering
Other Services Sometimes Run on Firewalls
Summary
Chapter 2: Introduction to IPCop
Free and Open Source Software
The Purpose of IPCop
The Benefits of Building on Stable Components
The Gap IPCop Fills
Features of IPCop
Virtual Private Networking
Why IPCop?
Summary
Chapter 3: Deploying IPCop and Designing a Network
Trust Relationships between the Interfaces
Altering IPCop Functionality
Topology One: NAT Firewall
Topology Two: NAT Firewall with DMZ
Topology Three: NAT Firewall with DMZ and Wireless
Planning Site-To-Site VPN Topologies
Summary
Chapter 4: Installing IPCop
Hardware Requirements
Other Hardware Considerations
The Installation Procedure
Green Interface Configuration
First Boot
Summary
Chapter 5: Basic IPCop Usage
The System Menu
Checking the Status of Our IPCop Firewall
Network Status
Services
Firewall Functionality
Summary
Chapter 6: Intrusion Detection with IPCop
Introduction to IDS
Introduction to Snort
Do We Need an IDS?
How Does an IDS Work?
Using Snort with IPCop
Monitoring the Logs
Log Analysis Options
What to Do Next?
Summary
Chapter 7: Virtual Private Networks
What is a VPN?
Summary
Chapter 8: Managing Bandwidth with IPCop
The Bandwidth Problem
The HTTP Problem
The Solutions: Proxying and Caching
Introduction to Squid
Configuring Squid
Cache Management
Managing Bandwidth without a Cache
Summary
Chapter 9: Customizing IPCop
Addons
Firewall Addons Server
Common Addons
Summary
Chapter 10: Testing, Auditing, and Hardening IPCop
Security and Patch Management
Basic Firewall Hardening
Advanced Hardening
Logfiles and Monitoring Usage
Usage and Denial of Service
Where to Go Next?
Summary
Chapter 11: IPCop Support
Support
Summary

Book Details

ISBN 139781904811367
Paperback244 pages
Read More

Read More Reviews

Recommended for You

Nmap 6: Network Exploration and Security Auditing Cookbook Book Cover
Nmap 6: Network Exploration and Security Auditing Cookbook
$ 26.99
$ 18.90
Instant Wireshark Starter Book Cover
Instant Wireshark Starter
$ 14.99
$ 10.50
Linux Shell Scripting Cookbook, Second Edition Book Cover
Linux Shell Scripting Cookbook, Second Edition
$ 26.99
$ 5.40
Git: Version Control for Everyone Book Cover
Git: Version Control for Everyone
$ 23.99
$ 16.80
CentOS 6 Linux Server Cookbook Book Cover
CentOS 6 Linux Server Cookbook
$ 29.99
$ 21.00
Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide Book Cover
Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide
$ 35.99
$ 7.20