Start by learning packet traversal through the tables/chains. Then learn the supported matches and targets. Netfilter isn't complicated if you take the time to learn it. I recommend avoiding any premade firewall scripts initially.
--
Cory Oldford
PeaceWorks Computer Consulting
#1 - 396 Assiniboine Ave, Winnipeg
204 480 0314 --or-- 519 725 7875, ext 6010.
----- Original Message -----
From: "Jonathan Plews" <jon@ts-tech.co.uk>
To: debian-firewall@lists.debian.org
Sent: Tuesday, September 6, 2011 9:16:52 AM GMT -06:00 US/Canada Central
Subject: Re: First Steps.
Quoting Heddle Weaver <weaver2world@gmail.com>:
> Hello,
>
> Taking first steps in the security world.
You can turn any old Linux box into a firewall with a config file, but
that's just because Linux is cool like that.
iptables (the binary) is pretty nasty, as long as you know it's there
and can read man pages I'd leave it at that. (opinions will vary on
this)
Start off with something like Shorewall and get a basic router going,
most packages you install will have examples to hack at. Add more
interfaces, second WAN connection, wireless cards etc...
Regards
Jon
----------------------------------------------------------------
This message was sent using IMP, the Internet Messaging Program.
--
Cory Oldford
PeaceWorks Computer Consulting
#1 - 396 Assiniboine Ave, Winnipeg
204 480 0314 --or-- 519 725 7875, ext 6010.
----- Original Message -----
From: "Jonathan Plews" <jon@ts-tech.co.uk>
To: debian-firewall@lists.debian.org
Sent: Tuesday, September 6, 2011 9:16:52 AM GMT -06:00 US/Canada Central
Subject: Re: First Steps.
Quoting Heddle Weaver <weaver2world@gmail.com>:
> Hello,
>
> Taking first steps in the security world.
You can turn any old Linux box into a firewall with a config file, but
that's just because Linux is cool like that.
iptables (the binary) is pretty nasty, as long as you know it's there
and can read man pages I'd leave it at that. (opinions will vary on
this)
Start off with something like Shorewall and get a basic router going,
most packages you install will have examples to hack at. Add more
interfaces, second WAN connection, wireless cards etc...
Regards
Jon
----------------------------------------------------------------
This message was sent using IMP, the Internet Messaging Program.
No comments:
Post a Comment