18.7. Additional Resources
Refer to the following sources for additional information on packet filtering with
- Security Guide; Red Hat, Inc — Contains a chapter about the role of firewalls within an overall security strategy as well as strategies for constructing firewall rules.
- System Administrators Guide; Red Hat, Inc — Contains a chapter about configuring firewalls using Security Level Configuration Tool.