Paper
2 October 2006 Firewall using Red Hat Linux 8.0
Author Affiliations +
Proceedings Volume 6390, Broadband Access Communication Technologies; 63900O (2006) https://doi.org/10.1117/12.690380
Event: Optics East 2006, 2006, Boston, Massachusetts, United States
Abstract
Due to the excessive amount of security threats, the need of a firewall is felt. Again, this firewall also acts as a proxy server to talk to the Internet. Any internal network can be masqueraded against the external world through this firewall. In case of different TCP/IP services like smtp, snmp, udp, tcp, http, and https, it can be restricted userwise. This firewall uses the Squid.conf configuration file as well as PAM (Password Authentication Module), the html files and other configuration files of the Linux operating system. The web browser used is Mozilla. Some CGI/PERL scripts are used. Different Intranet services are also provided userwise and mentioned in the squid.conf file. The major finding in this paper is the simplified way to create a security firewall.
© (2006) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Pallab Ganguly "Firewall using Red Hat Linux 8.0", Proc. SPIE 6390, Broadband Access Communication Technologies, 63900O (2 October 2006); https://doi.org/10.1117/12.690380
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Internet

Databases

Switches

Network security

Operating systems

Binary data

Broadband telecommunications

Back to Top