List of Tables


Chapter 1: Introduction to Check Point Next Generation with Application Intelligence

Table 1.1: OSI Reference Model

Chapter 2: Installing and Configuring VPN-1/FireWall-1 Next Generation with Application Intelligence

Table 2.1: Minimum System Requirements
Table 2.2: newimage Command Line Arguments
Table 2.3: newpkg Command Line Arguments

Chapter 3: Using the Graphical Interface

Table 3.1: Configuration Matrix
Table 3.2: dynamic-objects Command Options
Table 3.3: ICMP Codes

Chapter 4: Creating a Security Policy

Table 4.1: Categories of Security Controls

Chapter 6: Authenticating Users

Table 6.1: Client Authentication versus User Authentication
Table 6.2: Session Authentication versus Client and User Authentication

Chapter 7: Open Security (OPSEC) and Content Filtering

Table 7.1: Path Field Search Examples

Chapter 8: Managing Policies and Logs

Table 8.1: FireWall-1 Throughput
Table 8.2: Relevant Powers of 2
Table 8.3: Quick Recommendations
Table 8.4: Logging Options

Chapter 9: Tracking and Alerts

Table 9.1: Basic User-Defined Alert Input
Table 9.2: ICMP and NAT User-Defined Input
Table 9.3: fw sam Command Options

Chapter 10: Configuring Virtual Private Networks

Table 10.1: Check Point Encryption Algorithms
Table 10.2: VPN Ports and Protocols

Chapter 11: Securing Remote Clients

Table 11.1: Encryption Protocols

Chapter 12: Advanced VPN Configurations

Table 12.1: cphaprob Command Options

Appendix A: Class C Subnet Mask Cheat Sheet

Table A.1: Netmasks and Aggregates



Check Point NG[s]AI
Check Point NG[s]AI
ISBN: 735623015
EAN: N/A
Year: 2004
Pages: 149

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net