Paranoid Penguin - Building a Transparent Firewall with Linux, Part II
But, this is as far as I can take you this month. Next time, I'll begin showing how to configure networking, bridging and, of course, iptables on our transparent firewall.
If you can't wait until then, see the OpenWrt home page for more information, or if you're really adventurous, search the Web for other tutorials on creating transparent firewalls with OpenWrt. But, if I say so myself, we're off to a good start!
Home Page for the OpenWrt Project: www.openwrt.org
OpenWrt's Table of (Supported) Hardware: oldwiki.openwrt.org/TableOfHardware.html
Mick Bauer's “Building a Secure Squid Web Proxy, Part I”, LJ, April 2009: www.linuxjournal.com/article/10407
Mick Bauer's “Building a Secure Squid Web Proxy, Part II”, LJ, May 2009: www.linuxjournal.com/article/10433
Mick Bauer's “Building a Secure Squid Web Proxy, Part III”, LJ, July 2009: www.linuxjournal.com/article/10488
Mick Bauer's “Building a Secure Squid Web Proxy, Part IV”, LJ, August 2009: www.linuxjournal.com/article/10513
Mick Bauer (firstname.lastname@example.org) is Network Security Architect for one of the US's largest banks. He is the author of the O'Reilly book Linux Server Security, 2nd edition (formerly called Building Secure Servers With Linux), an occasional presenter at information security conferences and composer of the “Network Engineering Polka”.
- Chemistry on the Desktop
- FinTech and SAP HANA
- Five HPC Cost Considerations to Maximize ROI
- HOSTING Monitoring Insights
- Preseeding Full Disk Encryption
- William Rothwell and Nick Garner's Certified Ethical Hacker Complete Video Course (Pearson IT Certification)
- Hodge Podge
- Two Ways GDPR Will Change Your Data Storage Solution
- Two Factors Are Better Than One
- GRUB Boot from ISO