Sunteți pe pagina 1din 2

System Requirements: Windows NT/2000/XP/2003/Vista

Duration: 10 hours/40 Videos on 1-DVD

LinuxCBT Proxy Edition feat. Squid encompasses: 1. Proxy Security.


LinuxCBT Proxy Edition feat. Squid is unparalleled in content, depth and
expertise. It entails 10-hours, or over 1-day of classroom
training. LinuxCBT Proxy Edition feat. Squid prepares you or your organization for
successfully securing GNU/Linux & Open
Source-based solutions. As a by-product, many of the covered concepts, utilities
and tricks are applicable to heterogeneous
computing environments, ensuring your coverage of the fundamentals of
securing corporate infrastructures.
Let LinuxCBT Proxy Edition feat. Squid cost-effectively sharpen your GNU/Linux &
Open Source Security skills!
Recommended Prerequisites for:
* Any LinuxCBT Operating System Course (Classic/EL-4/SUSE/Debian Editions)
o Open mind & determination to master Linux and related open-source
applications
o Basic understanding of networking concepts
o Access to a PC to follow the exercises
Proxy Security - Module 1
* Squid Proxy Initialization
o Discuss Squid concepts & applications
o Discuss DNS application
o Configure DNS on primary SuSE Linux server for the Squid Proxy environment
o Confirm DNS environment
o Start Squid and evaluate default configuration
o Install Squid Proxy server
*
* General Proxy Usage
o Configure web browser to utilize proxy services
o Grant permissions to permit local hosts to utilize proxy services
o Discuss ideal file system layout - partitioning
o Explore key configuration files
o Use client to test the performance of proxy services
o Discuss HIT/MISS logic for serving content
o Configure proxy support for text-based (lftp/wget/lynx) HTTP clients
*
* Squid Proxy Logs
o Discuss Squid Proxy logging mechanism
o Identify key log files
o Discuss & explore the Access log to identify HITS and/or MISSES
o Discuss & explore the Store log to identify cached content
o Convert Squid logs to the Common Log Format (CLF) for easy processing

o Discuss key CLF fields


o Configure Webalizer to process Squid-CLF logs
o Revert to Squid Native logs
o Discuss key Native log fields
o Configure Webalizer to process Squid Native logs
*
* Squid Network Configuration & System Stats
o Discuss cachemgr.cgi Common Gateway Interface(CGI) script
o Explore the available metrics provided by cachemgr.cgi
o Change default Squid Proxy port
o Modify text/graphical clients and test communications
o Discuss Safe Ports - usage & applications
*
* Squid Access Control Lists (ACLs)
o Intro to Access Control Lists (ACLs) - syntax
o Define & test multiple HTTP-based ACLs
o Define & test ACL lists - to support multiple hosts/subnets
o Define & test time-based ACLs
o Nest ACLs to tighten security
o Implement destination domain based ACLs
o Exempt destination domains from being cached to ensure content freshness
o Define & test Anded ACLs
o Discuss the benefits of Regular Expressions (Regexes)
o Implement Regular Expressions ACLs to match URL patterns
o Exempt hosts/subnets from being cached or using the Squid cache
o Force cache usage
o Configure enterprise-class Cisco PIX firewall to deny outbound traffic
o Configure DNS round-robin with multiple Squid Proxy caches for load-balancing
o Discuss delay pool concepts & applications - bandwidth management
o Configure delay pools - to support rate-limiting
o Examine results of various delay pool classes
o Enforce maximum connections to deter Denial of Service (DoS) attacks
o Verify maximum connections comply with security policy
*
* Squid Proxy Hierarchies
o Discuss Squid cache hierarchy concepts & applications
o Ensure communications through a primary cache server - double-auditing
o Discuss and configure parent-child bypass based on ACLs
o Configure Intranet ACLs for peer-cache bypass
o Discuss & implement Squid cache hierarchy siblings
o Configure transparent proxy services

S-ar putea să vă placă și