I've added a task for saving firewall configuration to a file or script.

However, packet filtering and mangling is only one technique used in
firewalls. This topic is completely ignoring application-layer proxies
(e.g. Squid) as well as transport-layer proxies (SOCKS). Configuration of a
transparent proxy might also be covered here. We might also usefully cover
some of the kernel variables, such as rp_filter, ip_forward, etc. And we
need to distinguish between firewall rules to defend a bastion host and
rules to defend a network; how about DMZ configuration?

Best,

--- Les Bell, RHCE, CISSP
[http://www.lesbell.com.au]


_______________________________________________
lpi-examdev mailing list
[EMAIL PROTECTED]
http://list.lpi.org/mailman/listinfo/lpi-examdev

Reply via email to