id="info"

Packet Filtering Using IP Tables in Linux

Firewalls are core elements in network security. However, managing firewall rules, especially for enterprise networks, has become complex and error-prone. Firewall filtering rules have to be carefully written and organized in order to correctly implement the security policy. In addition, inserting or modifying a filtering rule requires thorough analysis of the relationship between the rules in order to determine the proper order. In this paper work has been done on creating the virtual network environment using Microsoft virtual PC(SP1) and Capturing and analyzing of network packets using the most popular open source network protocol analyzer Wireshark.

Provided by: International Journal of Computer Science Issues Topic: Security Date Added: Jul 2011 Format: PDF

Find By Topic