I've added a task for saving firewall configuration to a file or script. However, packet filtering and mangling is only one technique used in firewalls. This topic is completely ignoring application-layer proxies (e.g. Squid) as well as transport-layer proxies (SOCKS). Configuration of a transparent proxy might also be covered here. We might also usefully cover some of the kernel variables, such as rp_filter, ip_forward, etc. And we need to distinguish between firewall rules to defend a bastion host and rules to defend a network; how about DMZ configuration?
Best, --- Les Bell, RHCE, CISSP [http://www.lesbell.com.au] _______________________________________________ lpi-examdev mailing list [EMAIL PROTECTED] http://list.lpi.org/mailman/listinfo/lpi-examdev
