Paranoid Penguin - Building a Transparent Firewall with Linux, Part II
But, this is as far as I can take you this month. Next time, I'll begin showing how to configure networking, bridging and, of course, iptables on our transparent firewall.
If you can't wait until then, see the OpenWrt home page for more information, or if you're really adventurous, search the Web for other tutorials on creating transparent firewalls with OpenWrt. But, if I say so myself, we're off to a good start!
Home Page for the OpenWrt Project: www.openwrt.org
OpenWrt's Table of (Supported) Hardware: oldwiki.openwrt.org/TableOfHardware.html
Mick Bauer's “Building a Secure Squid Web Proxy, Part I”, LJ, April 2009: www.linuxjournal.com/article/10407
Mick Bauer's “Building a Secure Squid Web Proxy, Part II”, LJ, May 2009: www.linuxjournal.com/article/10433
Mick Bauer's “Building a Secure Squid Web Proxy, Part III”, LJ, July 2009: www.linuxjournal.com/article/10488
Mick Bauer's “Building a Secure Squid Web Proxy, Part IV”, LJ, August 2009: www.linuxjournal.com/article/10513
Mick Bauer (firstname.lastname@example.org) is Network Security Architect for one of the US's largest banks. He is the author of the O'Reilly book Linux Server Security, 2nd edition (formerly called Building Secure Servers With Linux), an occasional presenter at information security conferences and composer of the “Network Engineering Polka”.
- Tips for Optimizing Linux Memory Usage
- Picking Out the Nouns
- "No Reboot" Kernel Patching - And Why You Should Care
- DevOps: Better Than the Sum of Its Parts
- Return of the Mac
- Android Candy: Intercoms
- Drupageddon: SQL Injection, Database Abstraction and Hundreds of Thousands of Web Sites
- Non-Linux FOSS: .NET?
- diff -u: What's New in Kernel Development