HomeGroupsTalkZeitgeist
This site uses cookies to deliver our services, improve performance, for analytics, and (if not signed in) for advertising. By using LibraryThing you acknowledge that you have read and understand our Terms of Service and Privacy Policy. Your use of the site and services is subject to these policies and terms.
Hide this

Results from Google Books

Click on a thumbnail to go to Google Books.

Linux iptables Pocket Reference by Gregor N.…
Loading...

Linux iptables Pocket Reference (edition 2004)

by Gregor N. Purdy

MembersReviewsPopularityAverage ratingMentions
63None278,118 (3.79)1
Member:chimeric
Title:Linux iptables Pocket Reference
Authors:Gregor N. Purdy
Info:O'Reilly Media (2004), Paperback, 96 pages
Collections:Your library
Rating:*****
Tags:software, security

Work details

Linux iptables Pocket Reference by Gregor N. Purdy

None.

None
Loading...

Sign up for LibraryThing to find out whether you'll like this book.

No current Talk conversations about this book.

» See also 1 mention

No reviews
no reviews | add a review
You must log in to edit Common Knowledge data.
For more help see the Common Knowledge help page.
Series (with order)
Canonical title
Original title
Alternative titles
Original publication date
People/Characters
Important places
Important events
Related movies
Awards and honors
Epigraph
Dedication
First words
Quotations
Last words
Disambiguation notice
Publisher's editors
Blurbers
Publisher series
Original language
Canonical DDC/MDS

References to this work on external resources.

Wikipedia in English

None

Book description
Haiku summary

Amazon.com Product Description (ISBN 0596005695, Paperback)

Firewalls, Network Address Translation (NAT), network logging and accounting are all provided by Linux's Netfilter system, also known by the name of the command used to administer it, iptables. The iptables interface is the most sophisticated ever offered on Linux and makes Linux an extremely flexible system for any kind of network filtering you might do. Large sets of filtering rules can be grouped in ways that makes it easy to test them and turn them on and off.

Do you watch for all types of ICMP traffic--some of them quite dangerous? Can you take advantage of stateful filtering to simplify the management of TCP connections? Would you like to track how much traffic of various types you get?

This pocket reference will help you at those critical moments when someone asks you to open or close a port in a hurry, either to enable some important traffic or to block an attack. The book will keep the subtle syntax straight and help you remember all the values you have to enter in order to be as secure as possible. The book has an introductory section that describes applications,followed by a reference/encyclopaedic section with all the matches and targets arranged alphabetically.

(retrieved from Amazon Thu, 12 Mar 2015 18:10:35 -0400)

No library descriptions found.

Quick Links

Popular covers

Rating

Average: (3.79)
0.5
1
1.5
2
2.5
3 3
3.5 1
4 1
4.5
5 2

O'Reilly Media

An edition of this book was published by O'Reilly Media.

» Publisher information page

Is this you?

Become a LibraryThing Author.

 

About | Contact | Privacy/Terms | Help/FAQs | Blog | Store | APIs | TinyCat | Legacy Libraries | Early Reviewers | Common Knowledge | 134,178,454 books! | Top bar: Always visible