Chapter 6. TURNING THE TABLES FOR PROACTIVE DEFENSE
In the previous chapter we spent considerable time and energy to make sure the services we want to offer are available even when we have strict packet filtering in place. Now that you have a working setup, you will soon notice that some services tend to attract a little more unwanted attention than others.
In this chapter, we'll look into how we can use built-in PF features such as tables and state-tracking options, sometimes in tandem with userspace programs, to head off the unwanted attention and build a more functional network.
Here's the scenario: We have set up a network with packet filtering ...
Get The Book of PF now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.