Summary

This chapter showed you the basics of firewalls and design considerations in firewall systems. You were introduced to different generations of firewalls and their functions, and you learned how to design a good firewall system. This can be something as simple as setting up a basic packet filtering firewall, to something as complex as using a stateful firewall with DMZs, ALG authenticated user connections, authenticating user connections, using different scanning techniques to probe host behind firewalls, and making use of many other features.

In the next chapter, we will discuss VPNs in a public internet infrastructure, as well as different attributes within an IPsec framework. 

Get Practical Network Scanning now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.