Summary

 < Free Open Study > 



In this chapter, you learned how to construct a firewall. You started with a stock Red Hat Linux installation and customized the package list to exclude anything that's not strictly necessary. Then you installed a script establishing a set of firewall rules that actually set up the protections for the network. Finally, you installed and configured some software that provides important services to your internal, protected machines.

Stop for a moment and think about that. You started with a stock installation, and tuned and customized it to meet a set of very specific needs. You were able to do this because in Part Two you learned about Linux distributions, and in Part Three you learned how to install software on your system. Of course, you can't really claim to be a security expert after this chapter, but then that wasn't really the point.

Hopefully, you now feel like you've gained a respectable mastery of Linux systems—and not just one distribution. This case study was based on Red Hat Linux, but even now the gears in your head are probably turning, considering how you'd go about this same task on a Debian or Slackware system. Yes—it's very possible on both. It's even possible on other distributions, and more importantly it's possible for you.



 < Free Open Study > 



Tuning and Customizing a Linux System
Tuning and Customizing a Linux System
ISBN: 1893115275
EAN: 2147483647
Year: 2002
Pages: 159

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net