Flylib.com
The Best Damn Firewall Book Period
The Best Damn Firewall Book Period
ISBN: 1931836906
EAN: 2147483647
Year: 2003
Pages: 240
Authors:
Cherie Amon
,
Thomas W. Shinder
,
Anne Carasik-Henmi
BUY ON AMAZON
Table of Contents
BackCover
The Best Damn Firewall Book Period
Foreword
Acknowledgments
Part I: Introduction to Network Security Firewalls
Chapter 1: Introduction to Information Security
Insecurity and the Internet
Threats and Attacks
Security Policies
Creating a Security Policy
Protecting Information Technology
Using SSL and Secure Shell
Other Hardware Security Devices
Summary
Chapter 2: Firewall Concepts
Defining a Firewall
Networking and Firewalls
Popular Firewalls
Summary
Chapter 3: DMZ Concepts, Layout, and Conceptual Design
DMZ Basics
DMZ Design Fundamentals
Advanced Risks
Advanced Design Strategies
Summary
Chapter 4: Introduction to Intrusion Detection Systems
What Is Intrusion Detection?
What Is an Intrusion?
Why Are Intrusion Detection Systems Important?
What Else Can Be Done with Intrusion Detection?
Summary
Part II: Solaris Linux Firewalls
Chapter 5: Implementing a Firewall with Ipchains and Iptables
Understanding the Need for a Firewall
Deploying IP Forwarding and Masquerading
Configuring Your Firewall to Filter Network Packets
Understanding Tables and Chains in a Linux Firewall
Logging Packets at the Firewall
Configuring a Firewall
Counting Bandwidth Usage
Using and Obtaining Automated Firewall Scripts and Graphical Firewall Utilities
Summary
Chapter 6: Maintaining Open Source Firewalls
Testing Firewalls
Using Telnet, Ipchains, Netcat, and SendIP to Probe Your Firewall
Understanding Firewall Logging, Blocking, and Alert Options
Obtaining Additional Firewall Logging Tools
Summary
Chapter 7: Configuring Solaris as a Secure Router and Firewall
Configuring Solaris as a Secure Router
Routing IP Version 6
IP Version 6 Hosts
Configuring Solaris as a Firewall
Summary
Part III: PIX Firewalls
Chapter 8: Introduction to PIX Firewalls
PIX Firewall Features
PIX Hardware
Software Licensing and Upgrades
The Command-Line Interface
Summary
Chapter 9: Passing Traffic
Allowing Outbound Traffic
Allowing Inbound Traffic
TurboACLs
Object Grouping
Case Study
Summary
Chapter 10: Advanced PIX Configurations
Handling Advanced Protocols
Filtering Web Traffic
DHCP Functionality
Other Advanced Features
Summary
Chapter 11: Troubleshooting and Performance Monitoring
Troubleshooting Hardware and Cabling
Troubleshooting Connectivity
Troubleshooting IPsec
Capturing Traffic
Monitoring and Troubleshooting Performance
Summary
Part IV: Check Point NG and Nokia IP Series Appliances
Chapter 12: Installing and Configuring VPN-1FireWall-1 Next Generation
Before You Begin
Installing Check Point VPN-1FireWall-1 NG on Windows
Uninstalling Check Point VPN-1FireWall-1 NG on Windows
Installing Check Point VPN-1FireWall-1 NG on Solaris
Uninstalling Check Point VPN-1FireWall-1 NG on Solaris
Installing Check Point VPN-1FireWall-1 NG on Nokia
Summary
Chapter 13: Using the Graphical Interface
Managing Objects
Adding Rules
Global Properties
SecureUpdate
Log Viewer
System Status
Summary
Chapter 14: Creating a Security Policy
Reasons for a Security Policy
How to Write a Security Policy
Implementing a Security Policy
Installing a Security Policy
Policy Files
Summary
Chapter 15: Advanced Configurations
Check Point High Availability (CPHA)
Single Entry Point VPN Configurations (SEP)
Multiple Entry Point VPN Configurations (MEP)
Other High Availability Methods
Summary
Chapter 16: Configuring Virtual Private Networks
Encryption Schemes
Configuring an FWZ VPN
Configuring an IKE VPN
Configuring a SecuRemote VPN
Installing SecuRemote Client Software
Using SecuRemote Client Software
Summary
Chapter 17: Overview of the Nokia Security Platform
Introducing the Nokia IP Series Appliances
Administration Made Easy
Summary
Chapter 18: Configuring the Check Point Firewall
Preparing for the Configuration
Configuring the Firewall
Testing the Configuration
Upgrading the Firewall
Summary
Chapter 19: Introducing the Voyager Web Interface
Basic System Configuration, Out of the Box
Configuring the System for Security
Understanding Configuration Options
Summary
Chapter 20: Basic System Administration
Rebooting the System
Managing Packages
Managing IPSO Images
Managing Users and Groups
Configuring Static Routes
System Backup and Restore
System Logging
Scheduling Tasks Using cron
Summary
Chapter 21: High Availability and Clustering
Designing Your Cluster
Installing FireWall-1 NG FP3
Check Point ClusterXL
Nokia IPSO Clustering
Nokia IPSO VRRP Clusters
Clustering and HA Performance Tuning
Summary
Part V: ISA Server
Chapter 22: ISA Server Deployment Planning and Design
ISA Deployment: Planning and Designing Issues
Active Directory Implementation
Mission-Critical Considerations
Planning the Appropriate Installation Mode
Summary
Chapter 23: ISA Server Installation
Putting Together Your Flight Plan
Performing the Installation
Migrating from Microsoft Proxy Server 2.0
Summary
Chapter 24: Managing ISA Server
Understanding Integrated Administration
Performing Common Management Tasks
Using Monitoring, Alerting, Logging, and Reporting Functions
Understanding Remote Administration
Summary
Chapter 25: Optimizing, Customizing, Integrating, and Backing Up ISA Server
Optimizing ISA Server Performance
Customizing ISA Server
Integrating ISA Server with Other Services
Backing Up and Restoring the ISA Configuration
Summary
Chapter 26: Troubleshooting ISA Server
Troubleshooting Guidelines
Troubleshooting ISA Server Installation and Configuration Problems
Troubleshooting Authentication and Access Problems
Troubleshooting ISA Client Problems
Troubleshooting Caching and Publishing Problems
Summary
Chapter 27: Advanced Server Publishing with ISA Server
Disabling Socket Pooling
Server Publishing
Web Publishing
Summary
Chapter 28: Protecting Mail Services with ISA Server
Configuring Mail Services on the ISA Server
Configuring Mail Services on the Internal Network
GFI s Mail Security and Mail Essentials for SMTP Servers
Summary
Part VI: Intrusion Detection
Chapter 29: Introducing Snort
What Is Snort?
Snort System Requirements
Exploring Snort s Features
Using Snort on Your Network
Security Considerations with Snort
Summary
Chapter 30: Installing Snort
A Brief Word about Linux Distributions
Installing PCAP
Installing Snort
Summary
Chapter 31: Combining Firewalls and IDS
Policy-Based IDS
Inline IDS
IDS Functionality on the PIX Firewall
Summary
Index
Index_A
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
Index_X
List of Figures
List of Tables
The Best Damn Firewall Book Period
ISBN: 1931836906
EAN: 2147483647
Year: 2003
Pages: 240
Authors:
Cherie Amon
,
Thomas W. Shinder
,
Anne Carasik-Henmi
BUY ON AMAZON
Beginners Guide to DarkBASIC Game Programming (Premier Press Game Development)
Welcome to DarkBASIC
Looping Commands
Making Programs Think Branching Statements and Subroutines
More Power to the Numbers Data Sequences and Arrays
Epilogue
VBScript Programmers Reference
Windows Script Host
Windows Script Components
Appendix A VBScript Functions and Keywords
Appendix J VBA Features not in VBScript
Appendix L ActiveX Data Objects
Google Maps Hacks: Tips & Tools for Geographic Searching and Remixing
Hack 3. Navigate the World in Your Web Browser
Hack 29. Find the Best Gasoline Prices
Hack 41. How Google Maps Got Me Out of a Traffic Ticket
Hack 49. Generate Geocoded RSS from Any Google Map
Hack 58. Find the Right Zoom Level
Logistics and Retail Management: Emerging Issues and New Challenges in the Retail Supply Chain
Retail Logistics: Changes and Challenges
Relationships in the Supply Chain
The Internationalization of the Retail Supply Chain
Market Orientation and Supply Chain Management in the Fashion Industry
Rethinking Efficient Replenishment in the Grocery Sector
Information Dashboard Design: The Effective Visual Communication of Data
Exceeding the Boundaries of a Single Screen
Supplying Inadequate Context for the Data
Cluttering the Display with Useless Decoration
Understanding the Limits of Short-Term Memory
Maintain Consistency for Quick and Accurate Interpretation
Lean Six Sigma for Service : How to Use Lean Speed and Six Sigma Quality to Improve Services and Transactions
Executing Corporate Strategy with Lean Six Sigma
The Value in Conquering Complexity
Phase 3 Mobilization
Phase 4 Performance and Control
Service Process Challenges
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies