Skip to Content
Linux Desktop Hacks
book

Linux Desktop Hacks

by Nicholas Petreley, Jono Bacon
March 2005
Beginner to intermediate
342 pages
15h 55m
English
O'Reilly Media, Inc.
Content preview from Linux Desktop Hacks
Build a Custom Firewall Computer #81
Chapter 9, Administration and Automation
|
249
HACK
When you access the web interface, you are asked for the administrator
password for the machine (which you created when you installed Smooth-
Wall) and then you can configure it. Within the web panel is a huge range of
options and features that you can configure. These options are grouped into
categories which are visible at the top of the page.
If you need to do something that is not accessible in the web interface, you
can use the included Java SSH applet to log in to the machine and type in
commands to an SSH shell.
Enable Port Forwarding
A common requirement when running a network of machines is the need to
have a connection from outside the firewall serviced by a machine inside the
firewall (usually in the DMZ). This is the scenario for those who run a web
or email server and need to have the relevant ports accessible to the outside
world. When a computer connects to your IP address/domain, the first com-
puter that receives the connection is the firewall. Because it is unlikely you
are running a web or email server on the firewall itself (if you are, you really
shouldn’t be because bugs in these programs can compromise the security of
the firewall) you need a method to get that request to the computer that can
handle it. This is where port forwarding comes in. Its purpose is to take the
request for a service ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.

Read now

Unlock full access

More than 5,000 organizations count on O’Reilly

AirBnbBlueOriginElectronic ArtsHomeDepotNasdaqRakutenTata Consultancy Services

QuotationMarkO’Reilly covers everything we've got, with content to help us build a world-class technology community, upgrade the capabilities and competencies of our teams, and improve overall team performance as well as their engagement.
Julian F.
Head of Cybersecurity
QuotationMarkI wanted to learn C and C++, but it didn't click for me until I picked up an O'Reilly book. When I went on the O’Reilly platform, I was astonished to find all the books there, plus live events and sandboxes so you could play around with the technology.
Addison B.
Field Engineer
QuotationMarkI’ve been on the O’Reilly platform for more than eight years. I use a couple of learning platforms, but I'm on O'Reilly more than anybody else. When you're there, you start learning. I'm never disappointed.
Amir M.
Data Platform Tech Lead
QuotationMarkI'm always learning. So when I got on to O'Reilly, I was like a kid in a candy store. There are playlists. There are answers. There's on-demand training. It's worth its weight in gold, in terms of what it allows me to do.
Mark W.
Embedded Software Engineer

You might also like

Linux Server Hacks, Volume Two

Linux Server Hacks, Volume Two

William von Hagen, Brian K. Jones
Linux in a Windows World

Linux in a Windows World

Roderick W Smith

Publisher Resources

ISBN: 0596009119Catalog PageErrata