Book description
The Book of PF is the essential guide to building a secure network with PF, the OpenBSD packet filtering tool.
Table of contents
- Dedication
- Praise for The Book of PF
- Foreword from the first edition
- Acknowledgments
- Introduction
-
1. Building the Network you Need
- Your Network: High Performance, Low Maintenance, and Secure
- Where the Packet Filter Fits In
- The Rise of PF
-
If You Came from Elsewhere
- Pointers for Linux Users
-
Frequently Answered Questions About PF
- Can I run PF on my Linux machine?
- Can you recommend a GUI tool for managing my PF rule set?
- Is there a tool I can use to convert my OtherProduct® setup to a PF configuration?
- I heard PF is based on IPFilter, which I know from working with Solaris. Can I just copy my IPFilter configuration across and have a working setup right away?
- Why did the PF rule syntax change all of a sudden?
- Where can I find out more?
- A Little Encouragement: A PF Haiku
- 2. PF Configuration Basics
- 3. Into the Real World
-
4. Wireless Networks Made Easy
-
A Little IEEE 802.11 Background
- MAC Address Filtering
- WEP
- WPA
- The Right Hardware for the Task
- Setting Up a Simple Wireless Network
- An OpenBSD WPA Access Point
- A FreeBSD WPA Access Point
- The Access Point’s PF Rule Set
- Access Points with Three or More Interfaces
- Handling IPSec, VPN Solutions
- The Client Side
- OpenBSD Setup
- FreeBSD Setup
- Guarding Your Wireless Network with authpf
- A Basic Authenticating Gateway
- Wide Open but Actually Shut
-
A Little IEEE 802.11 Background
- 5. Bigger or Trickier Networks
-
6. Turning the Tables for Proactive Defense
- Turning Away the Brutes
- Giving Spammers a Hard Time with spamd
- Spam-Fighting Tips
-
7. Traffic Shaping with Queues and Priorities
- Always-On Priority and Queues for Traffic Shaping
- Transitioning from ALTQ to Priorities and Queues
- Directing Traffic with ALTQ
- Priority-Based Queues
- Conclusion: Traffic Shaping for Fun, and Perhaps Even Profit
- 8. Redundancy and Resource Availability
-
9. Logging, Monitoring, and Statistics
-
PF Logs: The Basics
- Logging the Packet’s Path Through Your Rule Set: log (matches)
- Logging All Packets: log (all)
- Logging to Several pflog Interfaces
- Logging to syslog, Local or Remote
- Tracking Statistics for Each Rule with Labels
- Additional Tools for PF Logs and Statistics
- Keeping an Eye on Things with systat
- Keeping an Eye on Things with pftop
- Graphing Your Traffic with pfstat
- Collecting NetFlow Data with pflow(4)
- Collecting NetFlow Data with pfflowd
- SNMP Tools and PF-Related SNMP MIBs
- Log Data as the Basis for Effective Debugging
-
PF Logs: The Basics
- 10. Getting Your Setup Just Right
- A. Resources
- B. A Note On Hardware Support
- Index
- About the Author
- Copyright
Product information
- Title: The Book of PF, 3rd Edition
- Author(s):
- Release date: October 2014
- Publisher(s): No Starch Press
- ISBN: 9781593275891
You might also like
book
The Book of GNS3
The Book of GNS3 shows network engineers and systems administrators how to simulate network connections and …
audiobook
The Science of Influence
One of the most crucial skills for everyone to develop is influence. Without it, human relations …
book
Smartphone Video Storytelling
Smartphone Video Storytelling helps readers master the techniques for making compelling short-form video content with a …
book
The Hype Handbook: 12 Indispensable Success Secrets From the World’s Greatest Propagandists, Self-Promoters, Cult Leaders, Mischief Makers, and Boundary Breakers
Master the art and science of using shameless propaganda for personal and social good. Influencers have …