In this three-part series, you'll learn to install and configure a Linux server and firewall. Part 1 covered selecting a secure Linux distribution and installing it. Part 2 covered the reassignment of services provided by the old firewall which the authors . . .
In this three-part series, you'll learn to install and configure a Linux server and firewall. Part 1 covered selecting a secure Linux distribution and installing it. Part 2 covered the reassignment of services provided by the old firewall which the authors replaced. And Part 3 covers the process of installing the firewall itself, including setting security goals, tweaking the OS, ensuring local security, and more.

In the first part of this series, we discussed the installation of Trustix, a secured Linux distribution, on our client's new firewall machine, wolf.. In the second part, we detailed setting up services on wolf to provide functionality comparable to that of the server wolf replaced, plains.. In this third and last installment, we will discuss some of the additional security measures we took to further protect our client's data. Those included firewall setup and the installation of intrusion-detection tools, along with local security measures.

The link for this article located at LinuxWorld is no longer available.