Flylib.com
Check Point NG[s]AI
Check Point NG[s]AI
ISBN: 735623015
EAN: N/A
Year: 2004
Pages: 149
BUY ON AMAZON
Table of Contents
BackCover
Check Point NGAI - Next Generation with Application Intelligence Security Administration
Foreword
Chapter 1: Introduction to Check Point Next Generation with Application Intelligence
Introducing the Check Point Next Generation with Application Intelligence Suite of Products
Understanding VPN-1FireWall-1 SVN Components
Looking at Firewall Technology
Complete SVN Concept
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 2: Installing and Configuring VPN-1FireWall-1 Next Generation with Application Intelligence
Before You Begin
Installing Check Point VPN-1FireWall-1 NG AI on Windows
Uninstalling Check Point VPN-1FireWall-1 NG on Windows
Installing Check Point VPN-1FireWall-1 NG AI on Solaris
Uninstalling Check Point VPN-1FireWall-1 NG AI on Solaris
Installing Check Point VPN-1FireWall-1 NG AI on Nokia
Installing Check Point VPN-1FireWall-1 NG AI on SecurePlatform
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 3: Using the Graphical Interface
Managing Objects
Adding Rules
Global Properties
SmartUpdate
SmartView Tracker
SmartView Status
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 4: Creating a Security Policy
Reasons for a Security Policy
How to Write a Security Policy
Implementing a Security Policy
Installing a Security Policy
Policy Files
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 5: Applying Network Address Translation
Hiding Network Objects
Configuring Static Address Translation
Automatic NAT Rules
NAT Global Properties
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 6: Authenticating Users
FireWall-1 Authentication Schemes
Defining Users
User Authentication
Client Authentication
Session Authentication
LDAP Authentication
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 7: Open Security (OPSEC) and Content Filtering
OPSEC Applications
Content Vectoring Protocol
URI Filtering Protocol
Application Monitoring
Client Side OPSEC Applications
Other Resource Options
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 8: Managing Policies and Logs
Administering Check Point VPN-1FW-1 NG AI for Performance
Administering Check Point VPN-1FW-1 NG AI for Effectiveness
Administering Check Point VPN-1FW-1 NG for Recoverability
Performing Advanced Administration Tasks
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 9: Tracking and Alerts
Alerts Commands
User-Defined Tracking
Suspicious Activities Monitoring Protocol (SAMP)
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 10: Configuring Virtual Private Networks
Encryption Schemes
Simplified-Mode vs. Traditional-Mode VPNs
Configuring an IKE VPN in Traditional Mode
Configuring an IKE VPN in Simplified Mode
Configuring a SecuRemote VPN
Installing SecuRemote Client Software
Using SecuRemote Client Software
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 11: Securing Remote Clients
Installing and Configuring a Policy Server
Desktop Security Options
Installing SecureClient Software
Logging into the Policy Server
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 12: Advanced VPN Configurations
Check Point High Availability and Check Point Load Sharing
Single Entry Point VPN Configurations
Multiple Entry Point VPN Configurations
Other High Availability Methods
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 13: SmartDefense
Understanding the Theory of SmartDefense
Using SmartDefense
Understanding Network Security
Understanding Application Intelligence
Updating SmartDefense
Summary
Solutions Fast Track
Frequently Asked Questions
Appendix A: Class C Subnet Mask Cheat Sheet
Index
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
List of Figures
List of Tables
List of Illustations
List of Sidebars
Check Point NG[s]AI
ISBN: 735623015
EAN: N/A
Year: 2004
Pages: 149
BUY ON AMAZON
CISSP Exam Cram 2
How to Prepare for the Exam
Electrical Power
The Risk of Poor Security Management
Software-Development Methods
Hack Attacks
Strategies for Information Technology Governance
Assessing Business-IT Alignment Maturity
Measuring and Managing E-Business Initiatives Through the Balanced Scorecard
Measuring ROI in E-Commerce Applications: Analysis to Action
Technical Issues Related to IT Governance Tactics: Product Metrics, Measurements and Process Control
Governance in IT Outsourcing Partnerships
The CISSP and CAP Prep Guide: Platinum Edition
Telecommunications and Network Security
Legal, Regulations, Compliance, and Investigations
Appendix A Answers to Assessment Questions
Appendix D The Information System Security Engineering Professional (ISSEP) Certification
Appendix G Control Baselines
Adobe After Effects 7.0 Studio Techniques
Optimizing After Effects
Effective Motion Tracking
Smoothing and Destabilizing
Light Source and Direction
Rolling Thine Own
Information Dashboard Design: The Effective Visual Communication of Data
Dispelling the Confusion
Exceeding the Boundaries of a Single Screen
Misusing or Overusing Color
Designing an Unattractive Visual Display
Gestalt Principles of Visual Perception
Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance
Deployment Scenarios Using ACLs
Application Inspection
NetBIOS
RSH
Introduction to the CIPS 5.x Command-Line Interface
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies