Internet security you can afford using Untangle as your internet gateway
Untangle is an Internet gateway and firewall that provides a powerful solution for protecting computer networks, whether at home or on the job--stopping viruses, hackers, and other unwanted Internet traffic from interfering with your life. In its basic form, Untangle is free, so getting started is e...
Saved in:
| Main Author: | |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Boston
Cengage Learning
[2015]
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Table of Contents:
- Cover--Contents--Introduction--PART I: OKAY, I�M CONVINCED. NOW WHAT?--Chapter 1 Getting a Computer--Why Do I Need to Do Anything Special?--New, Used, or DIY?--A Basic DIY Setup--Setting Up the Computer--Location and Environmental Issues--Chapter 2 Networking 101--Evaluating Your Network--Network Configurations--Network Equipment--Bandwidth and Internet Connections--IP Addresses, TCP/IP, DNS, and DHCP--Proxy Servers--Chapter 3 Downloading and Installing Untangle--Start Downloading and Start Burning--Installation--Eth1? Eth0? What Do I Plug In Where?--Isn�t the DMZ in Korea?--Finishing the Install and Initial Configuration--Running the Software: Basics of the UI--PART II: SO WHAT ABOUT THIS SO-CALLED “SERVER�? HOW DO I PROTECT MY NETWORK?--Chapter 4 What�s Happening InsideMy Untangle Gateway?--Router Versus Bridge and Other Router-Setup Considerations--The Apps Tab--The Config Tab: Further Setup and Administration--The Underlying Operating System--The Virtual Server Rack: Configuring the Apps--Chapter 5 Network and User Protection Best Practices--DHCP, DNS, and Network Devices--Firewall, Ports, Protocols, and Intrusion Prevention--Malware Protection--Email Protection--User Protection and Training--Content Filtering--Use Case Matrix: Recommendations by Environment--Chapter 6 Implementing Networking Best Practices (or Not) with Untangle--Network Configuration Overview--NAT--Pointing Traffic to a Web Server (Port Forwards)--DHCP Configuration--DNS--Bypass Rules--Advanced Configuration--Chapter 7 Implementing Protection Best Practices (or Not) with Untangle (a.k.a. “The Rack�)--The Firewall--The Application Control--The Web Filter--Attack Blocker (Shield) and Intrusion Prevention--Anti-Malware and Email Protection--Critical Features Missing from the Free Package--Chapter 8 User Considerations--Creating Users--The Captive Portal: User Consent--Bypassing Content Filters and Protections--Enforcing Content Filtering Anytime, Anywhere (VPNs and Proxies)--What Should You Be Filtering?--Event Logging, or Catching Them Being Naughty and What to Do About It--Chapter 9 Advanced Topics--Why Untangle Doesn�t Behave Like an Average Linux Server--Remote Administration and SSH--Enabling the Debian Repositories--Virtualizing Untangle (The Right Way to Run Multiple Services on an Untangle Gateway)--Optimizing Untangle--Advanced Network Architectures with Untangle--Using DynDNS--PART III: WHAT IS THIS “SCALABILITY� OF WHICH YOU SPEAK?--Chapter 10 Paid Features--Paid Versus Free Features


