Paranoid Penguin - Building a Transparent Firewall with Linux, Part II
But, this is as far as I can take you this month. Next time, I'll begin showing how to configure networking, bridging and, of course, iptables on our transparent firewall.
If you can't wait until then, see the OpenWrt home page for more information, or if you're really adventurous, search the Web for other tutorials on creating transparent firewalls with OpenWrt. But, if I say so myself, we're off to a good start!
Home Page for the OpenWrt Project: www.openwrt.org
OpenWrt's Table of (Supported) Hardware: oldwiki.openwrt.org/TableOfHardware.html
Mick Bauer's “Building a Secure Squid Web Proxy, Part I”, LJ, April 2009: www.linuxjournal.com/article/10407
Mick Bauer's “Building a Secure Squid Web Proxy, Part II”, LJ, May 2009: www.linuxjournal.com/article/10433
Mick Bauer's “Building a Secure Squid Web Proxy, Part III”, LJ, July 2009: www.linuxjournal.com/article/10488
Mick Bauer's “Building a Secure Squid Web Proxy, Part IV”, LJ, August 2009: www.linuxjournal.com/article/10513
Mick Bauer (firstname.lastname@example.org) is Network Security Architect for one of the US's largest banks. He is the author of the O'Reilly book Linux Server Security, 2nd edition (formerly called Building Secure Servers With Linux), an occasional presenter at information security conferences and composer of the “Network Engineering Polka”.
- New Products
- Flexible Access Control with Squid Proxy
- Users, Permissions and Multitenant Sites
- Security in Three Ds: Detect, Decide and Deny
- High-Availability Storage with HA-LVM
- Tighten Up SSH
- DevOps: Everything You Need to Know
- Non-Linux FOSS: MenuMeters
- Solving ODEs on Linux
- diff -u: What's New in Kernel Development