Skip to main content
USENIX
  • Conferences
  • Students
Sign in
  • LISA '12 Home
  • Registration Information
  • Registration Discounts
  • Organizers
  • At a Glance
  • Calendar
  • Conference Themes
  • Training Program
    • Live Streaming
  • Technical Sessions
  • Workshops
  • Data Storage Day
  • ION San Diego
  • Posters
  • Birds-of-a-Feather Sessions
  • Exhibition
  • Sponsors
  • Activities
  • Why Attend?
  • Hotel and Travel Information
  • Services
  • Students and Grants
  • Questions?
  • Help Promote
  • Flyer PDF
  • Brochure PDF
  • For Participants
  • Call for Participation
  • Past Proceedings

sponsors

Diamond Sponsor
Diamond Sponsor
Gold Sponsor
Gold Sponsor
Silver Sponsor
Silver Sponsor
Silver Sponsor
Bronze Sponsor
Bronze Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor

twitter

Tweets by @LISAConference

usenix conference policies

  • Event Code of Conduct
  • Conference Network Policy
  • Statement on Environmental Responsibility Policy

You are here

Home » Real-World Insights on How to Secure and Route Your Linux Network
Tweet

connect with us

http://twitter.com/usenix
https://www.facebook.com/events/280256018711626/
http://www.linkedin.com/groups/USENIX-Association-49559/about
http://www.youtube.com/user/USENIXAssociation

Real-World Insights on How to Secure and Route Your Linux Network

Half Day Morning
(9:00 am-12:30 pm)

Nautilus 2

T7
Updated!
Jason Faulkner, Rackspace
Description: 

We will be talking about how to configure IP addresses and static routes using iptables for security and convenience, the iproute2 utilities for advanced routing and IP configurations, and some "gotchas" that can happen with Linux networks. You'll learn why you should throw away ifconfig on Linux in favor of ip, and how to create and optimize iptables rule sets.

You will leave this class with enough IPv6 knowledge to kick-start your transitions or understand your preexisting IPv6 network. We'll also discuss how the loss of NAT doesn't mean your network can't be secure.

Who should attend: 

Novice and intermediate Linux system and network administrators, or anyone who wants to understand the ins and outs of networking on Linux. A basic understanding of the OSI model and Linux utilities is recommended but not required. This class is especially well suited for administrators making the leap from Windows to Linux.

Take back to work: 

Ways to expertly secure and route your Linux servers on an IP network.

Topics include: 
  • Basics
    • Networking review
    • Basic network configuration: Sysconfig-based configuration, ifconfig/route, iproute2
    • Other useful network troubleshooting tools: ethtool, sysctl -a, ip route get (ip address)
  • Firewalls
    • High-level firewall architecture
    • ip[6]tables: differences between iptables and ip6tables, common use cases, how traffic flows through iptables, targets and matches you never knew existed
  • Advanced topics
    • Optimization
    • Complex rulesets
    • Custom chains
  • Other interesting things
    • Multiple routing tables
    • IPv6 tunneling
    • Balancing among multiple ISPs
    • Network tuning using sysactls

Diamond Sponsors

Gold Sponsors

Silver Sponsors

Bronze Sponsors

Media Sponsors & Industry Partners

© USENIX

LISA is a registered trademark of the USENIX Association.

  • Privacy Policy
  • Contact Us