Due to the excessive amount of security threats, the need of a firewall is felt. Again, this firewall also acts as a proxy server to talk to the Internet. Any internal network can be masqueraded against the external world through this firewall. In case of different TCP/IP services like smtp, snmp, udp, tcp, http, and https, it can be restricted userwise. This firewall uses the Squid.conf configuration file as well as PAM (Password Authentication Module), the html files and other configuration files of the Linux operating system. The web browser used is Mozilla. Some CGI/PERL scripts are used. Different Intranet services are also provided userwise and mentioned in the squid.conf file. The major finding in this paper is the simplified way to create a security firewall.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.