How This Book Is Organized
This book is organized into three sections. Section 1 is a brief introduction to our principles of security and risk management in which we explain how firewalls work, how they should be set up, and some sample recipes for various firewall configurations. If you're new to firewalls or need a refresher, this is a good section for you to read. If you're an old hand with firewalls, you can probably skip this section and move on to Sections 2 and 3.
Section 2 is about troubleshooting and diagnostic methodologies. The intent here is to pass on troubleshooting
Section 3 contains the specific troubleshooting chapters in the book. This is where the troubleshooting guides reside. It should be possible to just flip
With regard to the issues of making this material as approachable as possible, we make no assumption about the reader's knowledge about good firewalling, risk management, and computer security practices. An important thought hopefully not lost on the reader is that firewalls and other security devices should be managed with a great deal of forethought and knowledge. Failure to understand a protocol or the consequences of allowing it through your firewall could have disastrous consequences.
However, we do understand that time is short, and sometimes you have to fix the problem and come back to it and understand what effect it has later. Nevertheless, with that said, along with our deepest empathy for all the overworked systems
Goals of This Book
It is our sincere hope that that we accomplish three goals with this book:
We can't cover every possible problem in this book, so as we've already alluded, we will have to show you how to troubleshoot and solve unforeseen problems on your own. To help with this process and to provide access to your peers, we have included