How to secure my firewall

Find the HOWTO or step-by-step guide that you need right here.

 

Discover How To Secure My Firewall HOWTOs

Deploying A Content Filtering Proxy Server To Distribute Controlled Internet Access With SafeSquid

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A content filtering proxy server, helps distribute Internet access while providing control to the administrators over the content delivered. It is usually used in organizations or schools to ensure that Internet usage conforms to the local acceptable use policy. A content filtering proxy must necessarily accommodate the demands of granular rules for Internet access privileges and restrictions across an enterprise. Here's a quick step-by-step guide on setting up a proxy server. It's great to have such functionality freely available. But like all tools, how much knowledge do you think you need to make it work consistently and effectively?

A Linux firewall primer

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This article looks at some of the decision considerations in selecting a Linux-based firewall, including both considerations specific to firewall technology and general considerations about understanding Linux-based and open source options.

Linux Firewalls: Packet Filtering

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This article explains the general frame of reference for what network communication is, how network-based services are identified, what a packet is, and the types of messages and information sent between computers on a network.