LinuxCBT - Firewall Edition - 2013
English | Audio: aac, 44100 Hz, mono (eng)
MOV | Video: h264, yuv420p, 800x600, 29.97 fps(r) (eng) | 788 MB
Genre: Video Training
Course Objective
Firewall Security - Module III
Intro IPTables
Discuss key IPTables concepts
OSI Model discussion
Determine if IPTables support is available in the current kernel
Identify key IPTables modules and supporting files
Explore and examine the default tables
Learn IPTables Access Control List (ACL) syntax
Discuss ACL management
Learn to Save & Restore IPTables ACLs
IPTables - Chain Management
Explore the various chains in the default tables
Discuss the purpose of each chain
Examine packet counts & bytes traversing the various chains
Focus on appending and inserting new ACLs into pre-defined chains
Write rules to permit common traffic flows
Delete & Replace ACLs to alter security policy
Flush ACLs - reset the security policy to defaults
Zero packet counts & bytes - bandwidth usage monitoring
Create user-defined chains to perform additional packet handling
Rename chains to suit the security policy/nomenclature
Discuss & explore chain policy
IPTables - Packet Matching & Handling
Explain the the basics of packet matching
Identify key layer-3/4 match objects - (Source/Dest IPs, Source/Dest Ports, etc.)
Explore the multi-homed configuration
Block traffic based on untrusted (Internet-facing) interface
Perform packet matching/handling based on common TCP streams
Perform packet matching/handling based on common UDP datagrams
Perform packet matching/handling based on common ICMP traffic
Write fewer rules (ACLs) by specifying lists of interesting layer-4 ports
Discuss layer-3/4 IPTables default packet matching
Discuss default layer-2 behavior
Increase security by writing rules to match packets based on layer-2 addresses
IPTables - State Maintenance - Stateful Firewall
Discuss the capabilities of traditional packet-filtering firewalls
Explain the advantages of stateful firewalls
Examine the supported connection states
Identify key kernel modules to support the stateful firewall
Implement stateful ACLs & examine traffic flows
IPTables - Targets - Match Handling
Discuss the purpose of IPTables targets for packet handling
Write rules with the ACCEPT target
Write rules with the DROP target
Write rules with the REJECT target
Write rules with the REDIRECT target
Confirm expected behavior for all targets
IPTables - Logging
Explore Syslog kernel logging configuration
Define Access Control Entry (ACEs) to perform logging
Explain the key fields captured by IPTables
Log using user-defined chain for enhanced packet handling
Log traffic based on security policy
Define a catch-all ACE
Use ACE negation to control logged packets
Label log entries for enhanced parsing
IPTables - Packet Routing
Describe subnet layout
Enable IP routing in the kernel - committ changes to disk
Update routing tables on the other Linux Hosts on the network
Update the Cisco PIX Firewall's routing tables
Test routing through the Linux router, from a remote Windows 2003 Host
Focus on the forward chain
Write ACEs to permit routing
Test connectivity
IPTables - Network Address Translation (NAT)
Discuss NAT features & concepts
Discuss & implement IP masquerading
Define Source NAT (SNAT) ACEs & test translations
Create SNAT multiples
Implement Destination NAT (DNAT) ACEs & test translations
Define DNAT multiples
Create NETMAP subnet mappings - one-to-one NATs
IPTables - Demilitarized Zone (DMZ) Configuration
Describe DMZ configuration
Write Port Address Translation (PAT) rules to permit inbound traffic
Test connectivity from connected subnets
Configure DMZ forwarding (Routing)
Implement Dual-DMZs - ideal for n-tiered web applications
IPTables - IPv6
Explore IPv6 configuration
Peruse IPv6 IPTables management tools
Log and Filter ICMPv6 traffic
Log and Filter TCPv6 traffic
Log and Filter UDPv6 traffic
Use 'nping' to generate IPv6 traffic for analysis
Create IPv6 Sub-Chains to manage rules
Evaluate results
With a Premium account you can download files having Fullspeed !
Download from Uploaded
Kod:
http://uploaded.net/file/d6s1xc7f/LinuxCBT.Firewall.Edition.part1.rar
http://uploaded.net/file/wxscpjq2/LinuxCBT.Firewall.Edition.part2.rar
http://uploaded.net/file/9aigll4f/LinuxCBT.Firewall.Edition.part3.rar
http://uploaded.net/file/mutd7ueo/LinuxCBT.Firewall.Edition.part4.rar
http://uploaded.net/file/tuwxdzbf/LinuxCBT.Firewall.Edition.part5.rar
http://uploaded.net/file/jcpqmowp/LinuxCBT.Firewall.Edition.part6.rar
http://uploaded.net/file/xny09c27/LinuxCBT.Firewall.Edition.part7.rar
http://uploaded.net/file/jr3q3plc/LinuxCBT.Firewall.Edition.part8.rar
http://uploaded.net/file/vtffgq9f/LinuxCBT.Firewall.Edition.part1.rar
http://uploaded.net/file/b00lg38o/LinuxCBT.Firewall.Edition.part2.rar
Kod:
http://lumfile.com/h3kercwsju99/LinuxCBT.Firewall.Edition.part1.rar
http://lumfile.com/8oqxm8oyrjh0/LinuxCBT.Firewall.Edition.part2.rar
http://lumfile.com/l3yae0sg3gqj/LinuxCBT.Firewall.Edition.part3.rar
http://lumfile.com/1mky3rdf50k8/LinuxCBT.Firewall.Edition.part4.rar
http://lumfile.com/grxlo78vypaa/LinuxCBT.Firewall.Edition.part5.rar
http://lumfile.com/mekpb0yyrtjf/LinuxCBT.Firewall.Edition.part6.rar
http://lumfile.com/fjvv5ydo4a77/LinuxCBT.Firewall.Edition.part7.rar
http://lumfile.com/73jfpp1js1dj/LinuxCBT.Firewall.Edition.part8.rar