This How To contains the following sections:
What you must know
Restricting Web server communication
Restricting database server communication
Restricting server-to-server communication
Using IPSec tools