Table of content


   
  Table of Contents
 
Essential Check Point FireWall-1 NG: An Installation, Configuration, and Troubleshooting Guide
By Dameon D. Welch-Abernathy
 
Publisher : Addison Wesley
Pub Date : January 21, 2004
ISBN : 0-321-18061-5
Pages : 656


    Copyright
    Frequently Asked Questions
    Preface
      How This Book Came to Be
      What This Book Is and Is Not
      Conventions
      Acknowledgments
      Chapter 1.  Introduction to Firewalls
      What Is a Firewall?
      What a Firewall Cannot Do
      An Overview of Firewall Security Technologies
      What Kind of Firewall Is FireWall-1?
      Do You Really Need FireWall-1?
      More Information
      Chapter 2.  Planning Your FireWall-1 Installation
      Network Topology
      Developing a Site-Wide Security Policy
      Fun with Check Point Licensing
      Summary
      Chapter 3.  Installing FireWall-1
      Selecting an Operating System
      Installing the Operating System
      Beginning the FireWall-1 Installation
      Upgrading from FireWall-1 4.1
      Summary
      Chapter 4.  Building Your Rulebase
      The Management GUIs
      The Rulebase Components
      The Rulebase
      Making Your First Rulebase
      Frequently Asked Questions
      Troubleshooting
      Summary
      Chapter 5.  Logging and Alerting
      SmartView Status
      SmartView Tracker
      Alerts
      Log Maintenance
      Summary
      Chapter 6.  Common Issues
      Common Configuration Questions
      Common Error Messages in the System Log
      Service-Related Questions
      Problems with Stateful Inspection of TCP Connections
      Problems with FTP
      Problems That Aren't the Firewall's Fault
      Summary
      Chapter 7.  Remote Management
      The Components
      Secure Internal Communication
      Special Remote Management Conditions
      What You Can Do with Remote Management
      Moving Management Modules
      Highly Availabile Management Modules
      Troubleshooting Remote Management Issues
      Large-Scale Management Issues
      Summary
      Chapter 8.  User Authentication
      Passwords
      How Users Authenticate
      Setting Up Authentication
      Setting Up User Authentication
      Setting Up Session Authentication
      Setting Up Client Authentication
      Integrating External Authentication Servers
      Clientless VPN
      Frequently Asked Questions
      Troubleshooting Authentication Problems
      Summary
      Sample Configurations
      Chapter 9.  Content Security
      The Security Servers
      The HTTP Security Server
      The FTP Security Server
      The SMTP Security Server
      The TCP Security Server
      General Questions about the Security Servers
      Debugging the Security Servers
      Summary
      Sample Configurations
      Chapter 10.  Network Address Translation
      Introduction to Address Translation
      RFC1918 and Link-Local Addresses
      How NAT Works in FireWall-1
      Implementing NAT : A Step-by-Step Example
      Limitations of NAT
      Troubleshooting NAT with a Packet Sniffer
      Summary
      Sample Configurations
      Chapter 11.  Site-to-Site VPN
      Introduction to a VPN
      A Word about Licensing
      FWZ, IPSec, and IKE
      How to Configure Encryption
      Frequently Asked Questions about VPNs in FireWall-1
      Troubleshooting VPN Problems
      Summary
      Sample Configurations
      Chapter 12.  SecuRemote and SecureClient
      Introduction to SecuRemote and SecureClient
      A Word about Licensing
      Configuring SecuRemote on FireWall-1
      Office Mode
      Microsoft L2TP Clients
      High-Availability and Multiple Entry Point Configurations
      Microsoft Networking and SecureClient
      SecureClient Packaging Tool
      Frequently Asked Questions
      Troubleshooting
      Summary
      Sample Configurations
      Chapter 13.  High Availability
      State Synchronization's Role in High Availability
      Implementing High Availability
      Frequently Asked Questions Regarding State Synchronization
      Error Messages That Occur with ClusterXL or State Synchronization
      Summary
      Chapter 14.  INSPECT
      What Is INSPECT?
      Basic INSPECT Syntax
      How Your Rulebase Is Converted to INSPECT
      Sample INSPECT Code
      Summary
      Appendix A.  Securing Your Bastion Host
      Securing Solaris
      Securing Windows NT
      Securing Windows 2000
      Securing Linux
      Appendix B.  Sample Acceptable Usage Policy
      Appendix C.  firewall-1.conf File for Use with OpenLDAP v1
      Appendix D.  firewall-1.schema File for Use with OpenLDAP v2
      Appendix E.  Performance Tuning
      Number of Entries Permitted in Tables
      Memory Used for State Tables
      Tweaks for Specific Operating Systems
      Appendix F.  Sample defaultfilter.pf File
      Appendix G.  Other Resources
      Internet Resources
      Software
      Appendix H.  Further Reading


Essential Check Point FireWall-1 NG
Essential Check Point FireWall-1 NG: An Installation, Configuration, and Troubleshooting Guide
ISBN: 0321180615
EAN: 2147483647
Year: 2004
Pages: 143

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net