Share Email Print
cover

Proceedings Paper

Firewall using Red Hat Linux 8.0
Author(s): Pallab Ganguly
Format Member Price Non-Member Price
PDF $14.40 $18.00

Paper Abstract

Due to the excessive amount of security threats, the need of a firewall is felt. Again, this firewall also acts as a proxy server to talk to the Internet. Any internal network can be masqueraded against the external world through this firewall. In case of different TCP/IP services like smtp, snmp, udp, tcp, http, and https, it can be restricted userwise. This firewall uses the Squid.conf configuration file as well as PAM (Password Authentication Module), the html files and other configuration files of the Linux operating system. The web browser used is Mozilla. Some CGI/PERL scripts are used. Different Intranet services are also provided userwise and mentioned in the squid.conf file. The major finding in this paper is the simplified way to create a security firewall.

Paper Details

Date Published: 2 October 2006
PDF: 10 pages
Proc. SPIE 6390, Broadband Access Communication Technologies, 63900O (2 October 2006); doi: 10.1117/12.690380
Show Author Affiliations
Pallab Ganguly, CESC Ltd. (India)


Published in SPIE Proceedings Vol. 6390:
Broadband Access Communication Technologies
Raj Jain; Benjamin B. Dingel; Shozo Komaki; Shlomo Ovadia, Editor(s)

© SPIE. Terms of Use
Back to Top