Flylib.com
Check Point NG[s]AI
Check Point NG[s]AI
ISBN: 735623015
EAN: N/A
Year: 2004
Pages: 149
BUY ON AMAZON
Table of Contents
BackCover
Check Point NGAI - Next Generation with Application Intelligence Security Administration
Foreword
Chapter 1: Introduction to Check Point Next Generation with Application Intelligence
Introducing the Check Point Next Generation with Application Intelligence Suite of Products
Understanding VPN-1FireWall-1 SVN Components
Looking at Firewall Technology
Complete SVN Concept
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 2: Installing and Configuring VPN-1FireWall-1 Next Generation with Application Intelligence
Before You Begin
Installing Check Point VPN-1FireWall-1 NG AI on Windows
Uninstalling Check Point VPN-1FireWall-1 NG on Windows
Installing Check Point VPN-1FireWall-1 NG AI on Solaris
Uninstalling Check Point VPN-1FireWall-1 NG AI on Solaris
Installing Check Point VPN-1FireWall-1 NG AI on Nokia
Installing Check Point VPN-1FireWall-1 NG AI on SecurePlatform
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 3: Using the Graphical Interface
Managing Objects
Adding Rules
Global Properties
SmartUpdate
SmartView Tracker
SmartView Status
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 4: Creating a Security Policy
Reasons for a Security Policy
How to Write a Security Policy
Implementing a Security Policy
Installing a Security Policy
Policy Files
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 5: Applying Network Address Translation
Hiding Network Objects
Configuring Static Address Translation
Automatic NAT Rules
NAT Global Properties
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 6: Authenticating Users
FireWall-1 Authentication Schemes
Defining Users
User Authentication
Client Authentication
Session Authentication
LDAP Authentication
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 7: Open Security (OPSEC) and Content Filtering
OPSEC Applications
Content Vectoring Protocol
URI Filtering Protocol
Application Monitoring
Client Side OPSEC Applications
Other Resource Options
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 8: Managing Policies and Logs
Administering Check Point VPN-1FW-1 NG AI for Performance
Administering Check Point VPN-1FW-1 NG AI for Effectiveness
Administering Check Point VPN-1FW-1 NG for Recoverability
Performing Advanced Administration Tasks
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 9: Tracking and Alerts
Alerts Commands
User-Defined Tracking
Suspicious Activities Monitoring Protocol (SAMP)
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 10: Configuring Virtual Private Networks
Encryption Schemes
Simplified-Mode vs. Traditional-Mode VPNs
Configuring an IKE VPN in Traditional Mode
Configuring an IKE VPN in Simplified Mode
Configuring a SecuRemote VPN
Installing SecuRemote Client Software
Using SecuRemote Client Software
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 11: Securing Remote Clients
Installing and Configuring a Policy Server
Desktop Security Options
Installing SecureClient Software
Logging into the Policy Server
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 12: Advanced VPN Configurations
Check Point High Availability and Check Point Load Sharing
Single Entry Point VPN Configurations
Multiple Entry Point VPN Configurations
Other High Availability Methods
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 13: SmartDefense
Understanding the Theory of SmartDefense
Using SmartDefense
Understanding Network Security
Understanding Application Intelligence
Updating SmartDefense
Summary
Solutions Fast Track
Frequently Asked Questions
Appendix A: Class C Subnet Mask Cheat Sheet
Index
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
List of Figures
List of Tables
List of Illustations
List of Sidebars
Check Point NG[s]AI
ISBN: 735623015
EAN: N/A
Year: 2004
Pages: 149
BUY ON AMAZON
Network Security Architectures
The Attack Process
Network Security Platform Options
DNS
Site-to-Site Deployment Examples
Secure Management Design Options
SQL Hacks
Hack 3. Perform Conditional INSERTs
Hack 28. Avoid Dividing by Zero
Hack 30. Calculate the Maximum of Two Fields
Hack 63. Generate Rows Without Tables
Hack 73. Mix File and Database Storage
Managing Enterprise Systems with the Windows Script Host
Introduction
Shell Operations
Network Administration/WMI
Messaging Operations
System Administration
Making Sense of Change Management: A Complete Guide to the Models, Tools and Techniques of Organizational Change
Individual change
Leading change
Part II - The Applications
Mergers and acquisitions
IT-based process change
Professional Struts Applications: Building Web Sites with Struts ObjectRelational Bridge, Lucene, and Velocity (Experts Voice)
The Challenges of Web Application Development
Form Presentation and Validation with Struts
Templates and Velocity
Creating a Search Engine with Lucene
Building the JavaEdge Application with Ant and Anthill
Microsoft Visual Basic .NET Programmers Cookbook (Pro-Developer)
Reflection
Windows Services
ADO.NET
ASP.NET Web Applications
Remoting and Enterprise Services
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies