Chapter 2. Getting Started

Starting off this chapter, we’re going to repeat a topic covered in Chapter 1, a topic that in our opinion can’t be repeated enough. A firewall is never going to be enough to secure your network, your hosts, your data, or whatever else you are trying to protect; you must do more. It takes a lot more than one method, a firewall, or even technology alone to manage risk. Technology alone will not suffice. If you find yourself repeating it until you are blue in the face, you will understand why this is such a critical point to repeat. Risk management is more than technology and more than policies or any other single element. It takes the full spectrum of risk management solutions to truly address the problem.

In case the ...

Get Troubleshooting Linux® Firewalls now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.