firewalls
checking for existing rules, 48-55
configuring, 61-78
identifying protective firewall needs, 60-78
interface access policy guidelines, 61
protective strategies, 60-61
Red Hat Linux firewall configuration, 66-67
rules, 57-60
simple Linux firewall configuration, 67-78
stateless and stateful, 59-60
SUSE Linux firewall configuration, 62-65
SUSE SLES 8.0 firewall rules for dual interface configuration, 69-78
FreeS/WAN, 229-230
configuring, 231-233
establishing a VPN, 233-235
generating authentication keys for gateways, 231
installing, 230-231