Flylib.com
The Best Damn Firewall Book Period
The Best Damn Firewall Book Period
ISBN: 1931836906
EAN: 2147483647
Year: 2003
Pages: 240
Authors:
Cherie Amon
,
Thomas W. Shinder
,
Anne Carasik-Henmi
BUY ON AMAZON
Table of Contents
BackCover
The Best Damn Firewall Book Period
Foreword
Acknowledgments
Part I: Introduction to Network Security Firewalls
Chapter 1: Introduction to Information Security
Insecurity and the Internet
Threats and Attacks
Security Policies
Creating a Security Policy
Protecting Information Technology
Using SSL and Secure Shell
Other Hardware Security Devices
Summary
Chapter 2: Firewall Concepts
Defining a Firewall
Networking and Firewalls
Popular Firewalls
Summary
Chapter 3: DMZ Concepts, Layout, and Conceptual Design
DMZ Basics
DMZ Design Fundamentals
Advanced Risks
Advanced Design Strategies
Summary
Chapter 4: Introduction to Intrusion Detection Systems
What Is Intrusion Detection?
What Is an Intrusion?
Why Are Intrusion Detection Systems Important?
What Else Can Be Done with Intrusion Detection?
Summary
Part II: Solaris Linux Firewalls
Chapter 5: Implementing a Firewall with Ipchains and Iptables
Understanding the Need for a Firewall
Deploying IP Forwarding and Masquerading
Configuring Your Firewall to Filter Network Packets
Understanding Tables and Chains in a Linux Firewall
Logging Packets at the Firewall
Configuring a Firewall
Counting Bandwidth Usage
Using and Obtaining Automated Firewall Scripts and Graphical Firewall Utilities
Summary
Chapter 6: Maintaining Open Source Firewalls
Testing Firewalls
Using Telnet, Ipchains, Netcat, and SendIP to Probe Your Firewall
Understanding Firewall Logging, Blocking, and Alert Options
Obtaining Additional Firewall Logging Tools
Summary
Chapter 7: Configuring Solaris as a Secure Router and Firewall
Configuring Solaris as a Secure Router
Routing IP Version 6
IP Version 6 Hosts
Configuring Solaris as a Firewall
Summary
Part III: PIX Firewalls
Chapter 8: Introduction to PIX Firewalls
PIX Firewall Features
PIX Hardware
Software Licensing and Upgrades
The Command-Line Interface
Summary
Chapter 9: Passing Traffic
Allowing Outbound Traffic
Allowing Inbound Traffic
TurboACLs
Object Grouping
Case Study
Summary
Chapter 10: Advanced PIX Configurations
Handling Advanced Protocols
Filtering Web Traffic
DHCP Functionality
Other Advanced Features
Summary
Chapter 11: Troubleshooting and Performance Monitoring
Troubleshooting Hardware and Cabling
Troubleshooting Connectivity
Troubleshooting IPsec
Capturing Traffic
Monitoring and Troubleshooting Performance
Summary
Part IV: Check Point NG and Nokia IP Series Appliances
Chapter 12: Installing and Configuring VPN-1FireWall-1 Next Generation
Before You Begin
Installing Check Point VPN-1FireWall-1 NG on Windows
Uninstalling Check Point VPN-1FireWall-1 NG on Windows
Installing Check Point VPN-1FireWall-1 NG on Solaris
Uninstalling Check Point VPN-1FireWall-1 NG on Solaris
Installing Check Point VPN-1FireWall-1 NG on Nokia
Summary
Chapter 13: Using the Graphical Interface
Managing Objects
Adding Rules
Global Properties
SecureUpdate
Log Viewer
System Status
Summary
Chapter 14: Creating a Security Policy
Reasons for a Security Policy
How to Write a Security Policy
Implementing a Security Policy
Installing a Security Policy
Policy Files
Summary
Chapter 15: Advanced Configurations
Check Point High Availability (CPHA)
Single Entry Point VPN Configurations (SEP)
Multiple Entry Point VPN Configurations (MEP)
Other High Availability Methods
Summary
Chapter 16: Configuring Virtual Private Networks
Encryption Schemes
Configuring an FWZ VPN
Configuring an IKE VPN
Configuring a SecuRemote VPN
Installing SecuRemote Client Software
Using SecuRemote Client Software
Summary
Chapter 17: Overview of the Nokia Security Platform
Introducing the Nokia IP Series Appliances
Administration Made Easy
Summary
Chapter 18: Configuring the Check Point Firewall
Preparing for the Configuration
Configuring the Firewall
Testing the Configuration
Upgrading the Firewall
Summary
Chapter 19: Introducing the Voyager Web Interface
Basic System Configuration, Out of the Box
Configuring the System for Security
Understanding Configuration Options
Summary
Chapter 20: Basic System Administration
Rebooting the System
Managing Packages
Managing IPSO Images
Managing Users and Groups
Configuring Static Routes
System Backup and Restore
System Logging
Scheduling Tasks Using cron
Summary
Chapter 21: High Availability and Clustering
Designing Your Cluster
Installing FireWall-1 NG FP3
Check Point ClusterXL
Nokia IPSO Clustering
Nokia IPSO VRRP Clusters
Clustering and HA Performance Tuning
Summary
Part V: ISA Server
Chapter 22: ISA Server Deployment Planning and Design
ISA Deployment: Planning and Designing Issues
Active Directory Implementation
Mission-Critical Considerations
Planning the Appropriate Installation Mode
Summary
Chapter 23: ISA Server Installation
Putting Together Your Flight Plan
Performing the Installation
Migrating from Microsoft Proxy Server 2.0
Summary
Chapter 24: Managing ISA Server
Understanding Integrated Administration
Performing Common Management Tasks
Using Monitoring, Alerting, Logging, and Reporting Functions
Understanding Remote Administration
Summary
Chapter 25: Optimizing, Customizing, Integrating, and Backing Up ISA Server
Optimizing ISA Server Performance
Customizing ISA Server
Integrating ISA Server with Other Services
Backing Up and Restoring the ISA Configuration
Summary
Chapter 26: Troubleshooting ISA Server
Troubleshooting Guidelines
Troubleshooting ISA Server Installation and Configuration Problems
Troubleshooting Authentication and Access Problems
Troubleshooting ISA Client Problems
Troubleshooting Caching and Publishing Problems
Summary
Chapter 27: Advanced Server Publishing with ISA Server
Disabling Socket Pooling
Server Publishing
Web Publishing
Summary
Chapter 28: Protecting Mail Services with ISA Server
Configuring Mail Services on the ISA Server
Configuring Mail Services on the Internal Network
GFI s Mail Security and Mail Essentials for SMTP Servers
Summary
Part VI: Intrusion Detection
Chapter 29: Introducing Snort
What Is Snort?
Snort System Requirements
Exploring Snort s Features
Using Snort on Your Network
Security Considerations with Snort
Summary
Chapter 30: Installing Snort
A Brief Word about Linux Distributions
Installing PCAP
Installing Snort
Summary
Chapter 31: Combining Firewalls and IDS
Policy-Based IDS
Inline IDS
IDS Functionality on the PIX Firewall
Summary
Index
Index_A
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
Index_X
List of Figures
List of Tables
The Best Damn Firewall Book Period
ISBN: 1931836906
EAN: 2147483647
Year: 2003
Pages: 240
Authors:
Cherie Amon
,
Thomas W. Shinder
,
Anne Carasik-Henmi
BUY ON AMAZON
Metrics and Models in Software Quality Engineering (2nd Edition)
Run Charts
Literature Review
Collecting Customer Outage Data for Quality Improvement
Staged versus Continuous Debating Religion
Data Quality Control
SQL Hacks
Hack 5. Solve a Crossword Puzzle Using SQL
Hack 49. Keep Track of Infrequently Changing Values
Hack 66. Use Optimistic Locking
Hack 73. Mix File and Database Storage
Hack 89. Choose Any Three of Five
Microsoft WSH and VBScript Programming for the Absolute Beginner
Overview of the Windows Script Host
Constants, Variables, and Arrays
Combining Different Scripting Languages
Appendix B Built-In VBScript Functions
Appendix C Whats on the CD-ROM?
Comparing, Designing, and Deploying VPNs
What Is a Virtual Private Network?
AToM Pseudowire Operation
IPsec: A Security Architecture for IP
Strengthening SSL Remote Access VPNs Security by Implementing Cisco Secure Desktop
MPLS Configuration on Cisco IOS Software
MPLS Control and Data Plane Components
MPLS VPN Basic Configuration
Case Study-Inter-AS Implementing Route-Reflector and BGP Confederation in Provider Networks
Command Reference
Command Reference
Microsoft Visual Basic .NET Programmers Cookbook (Pro-Developer)
Strings and Regular Expressions
Multithreading
Printing and Drawing with GDI+
ADO.NET
ASP.NET Web Applications
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies