Configuring IPCop firewalls [electronic resource] : closing borders with Open Source : how to set up, configure, and manage your Linux firewall, web proxy, DHCP, DNS, time server, and VPN with this powerful Open Source solution / Barrie Dempster, James Eaton-Lee.

By: Contributor(s): Series: From technologies to solutionsc2006Description: 1 online resource (vi, 228 p.) : illSubject(s): Genre/Form: Additional physical formats: Print version:: Configuring IPCop firewalls.Online resources:
Partial contents:
ch. 1. Introduction to firewalls -- ch. 2. Introduction to IPCop -- ch. 3. Deploying IPCop and designing a network -- ch. 4. Installing IPCop -- ch. 5. Basic IPCopy usage -- ch. 6. Intrusion detection with IPCopy -- ch. 7. Virtual private networks -- ch. 8. Managing bandwidth with IPCopy -- ch. 9. Customizing IPCop -- ch. 10. Testing, auditing, and hardening IPCop -- ch. 11. IPCopy support.
Summary: "This book is an easy-to-read guide to using IPCop in a variety of different roles within the network. The book is written in a very friendly style that makes this complex topic easy and a joy to read. It first covers basic IPCop concepts, then moves to introduce basic IPCop configurations, before covering advanced uses of IPCop. This book is for both experienced and new IPCop users"--Resource description page.
Item type: eBooks
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Description based on print version record.

"This book is an easy-to-read guide to using IPCop in a variety of different roles within the network. The book is written in a very friendly style that makes this complex topic easy and a joy to read. It first covers basic IPCop concepts, then moves to introduce basic IPCop configurations, before covering advanced uses of IPCop. This book is for both experienced and new IPCop users"--Resource description page.

Includes index.

ch. 1. Introduction to firewalls -- ch. 2. Introduction to IPCop -- ch. 3. Deploying IPCop and designing a network -- ch. 4. Installing IPCop -- ch. 5. Basic IPCopy usage -- ch. 6. Intrusion detection with IPCopy -- ch. 7. Virtual private networks -- ch. 8. Managing bandwidth with IPCopy -- ch. 9. Customizing IPCop -- ch. 10. Testing, auditing, and hardening IPCop -- ch. 11. IPCopy support.

Copyright © 2020 Alfaisal University Library. All Rights Reserved.
Tel: +966 11 2158948 Fax: +966 11 2157910 Email:
librarian@alfaisal.edu