Rework of firewall chapter start

Simon L. Nielsen simon at FreeBSD.org
Wed Dec 15 19:10:28 UTC 2004


Hello

I started to reword and improve the first two sections of the firewall
chapter.  Comments (both to the direction of the changes and the
actual patch)?

-- 
Simon L. Nielsen
-------------- next part --------------
Index: chapter.sgml
===================================================================
RCS file: /home/ncvs/doc/en_US.ISO8859-1/books/handbook/firewalls/chapter.sgml,v
retrieving revision 1.7
diff -u -d -r1.7 chapter.sgml
--- chapter.sgml	12 Dec 2004 23:21:03 -0000	1.7
+++ chapter.sgml	15 Dec 2004 19:08:51 -0000
@@ -32,18 +32,18 @@
   <sect1 id="firewalls-intro">
     <title>Introduction</title>
 
-    <para>All software-based firewalls provide some way to filter
+    <para>Firewalls makes it possbile to filter
       incoming and outgoing traffic that flows through your system.
-      The firewall uses one or more sets of <quote>rules</quote> to
+      A firewall uses one or more sets of <quote>rules</quote> to
       inspect the network packets as they come in or go out of your
       network connections and either allows the traffic through or
-      blocks it. The rules of the firewall can inspect one or more
+      blocks it.  The rules of a firewall can inspect one or more
       characteristics of the packets, including but not limited to the
       protocol type, the source or destination host address, and the
       source or destination port.</para>
 
-    <para>Firewalls greatly enhance the security of your network, your
-      applications and services.  They can be used to do one or more of
+    <para>Firewalls can greatly enhance the security of a network or a
+      host.  They can be used to do one or more of
       the following things:</para>
 
     <itemizedlist>
@@ -77,24 +77,24 @@
       </listitem>
 
       <listitem>
-	<para>The differences between the firewall software products
+	<para>The differences between the firewalls
 	  built into &os;</para>
       </listitem>
 
       <listitem>
 	<para>How to use and configure the OpenBSD
-	  <application>PF</application> firewall software.</para>
+	  <application>PF</application> firewall.</para>
       </listitem>
 
 
       <listitem>
-	<para>How to use and configure the
-  	  <application>IPFILTER</application> software.</para>
+	<para>How to use and configure
+  	  <application>IPFILTER</application>.</para>
       </listitem>
 
       <listitem>
-	<para>How to use and configure the
-	<application>IPFW</application> software.</para>
+	<para>How to use and configure
+	  <application>IPFW</application>.</para>
       </listitem>
     </itemizedlist>
 
@@ -109,50 +109,29 @@
   </sect1>
 
   <sect1 id="firewalls-rulesets">
-    <title>Firewall Rule Set Types</title>
-
-    <para>Constructing a software application firewall rule set may
-      seem to be trivial, but most people get it wrong. The most
-      common mistake is to create an <quote>exclusive</quote> firewall
-      rather than an <quote>inclusive</quote> firewall.</para>
-
-    <para>An exclusive firewall allows all services through except for
-      those matching a set of rules that block certain
-      services.</para>
-
-    <para>An inclusive firewall does the reverse. It only allows
-      services matching the rules through and blocks everything else.
-      This way you can control what services can originate behind the
-      firewall destined for the public Internet and also control which
-      services originating from the public Internet may access your
-      network. Inclusive firewalls are much, much safer than exclusive
-      firewalls.</para>
+    <title>Firewall Concepts</title>
 
-    <para>When you use your browser to access a web site there are
-      many internal functions that happen before your screen fills
-      with the data from the target web site. Your browser does not
-      receive one large file containing all the data and display
-      format instructions at one time. Each internal function accesses
-      the public Internet in multiple send/receive cycles of packets
-      of information. When all the packets containing the data finally
-      arrive, the data contained in the packets is combined together
-      to fill your screen. Each service (<acronym>DNS</acronym>,
-      <acronym>HTTP</acronym>, etc) has its own port number. The port
-      number 80 is for <acronym>HTTP</acronym> services. So you can
-      code your firewall to only allow web page session start requests
-      originating from your <acronym>LAN</acronym> to pass through the
-      firewall out to the public Internet.</para>
+    <para>There are two basic ways to create firewall rulesets:
+      <quote>inclusive</quote> or <quote>exclusive</quote>.  An
+      exclusive firewall allows all traffic through except for the
+      traffic matching the ruleset.  An inclusive firewall does the
+      reverse.  It only allows traffic matching the rules through and
+      blocks everything else.</para>
 
-    <para>Security can be tightened further by telling the firewall to
-      monitor the send/receive cycles of all the packets making up
-      that session until the session completes. These are called
-      stateful capabilities and provides the maximum level of
-      protection.</para>
+    <para>Inclusive firewalls are generally safer than exclusive
+      firewalls because they significantly reduces the risk of
+      allowing unwanted traffic to pass through the firewall.</para>
 
-    <para>A firewall rule set that does not implement stateful
-      capabilities on all the services being authorized is an insecure
-      firewall that is still open to many of the most common methods
-      of attack.</para>
+    <para>Security can be tightened further using a <quote>stateful
+	firewall</quote>.  With a stateful firewall the firewall keeps
+      track of which connections are open through the firewall and
+      will only allow traffic through which either matches a existing
+      connection or opens a new one.  The disadvantage of a stateful
+      file wall is that it is can be vulnerable to Denial of Service
+      (<acronym>DoS</acronym>) attacks if a lot of new connections
+      are opened very fast.  In most firewalls it is possible to use a
+      combination of stateful and non-stateful behavior to make an
+      optimal firewall for the site.</para>
   </sect1>
 
   <sect1 id="firewalls-apps">
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 187 bytes
Desc: not available
URL: <http://lists.freebsd.org/pipermail/freebsd-doc/attachments/20041215/e73e6f00/attachment.sig>


More information about the freebsd-doc mailing list