Flylib.com
Check Point NG[s]AI
Check Point NG[s]AI
ISBN: 735623015
EAN: N/A
Year: 2004
Pages: 149
BUY ON AMAZON
Table of Contents
BackCover
Check Point NGAI - Next Generation with Application Intelligence Security Administration
Foreword
Chapter 1: Introduction to Check Point Next Generation with Application Intelligence
Introducing the Check Point Next Generation with Application Intelligence Suite of Products
Understanding VPN-1FireWall-1 SVN Components
Looking at Firewall Technology
Complete SVN Concept
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 2: Installing and Configuring VPN-1FireWall-1 Next Generation with Application Intelligence
Before You Begin
Installing Check Point VPN-1FireWall-1 NG AI on Windows
Uninstalling Check Point VPN-1FireWall-1 NG on Windows
Installing Check Point VPN-1FireWall-1 NG AI on Solaris
Uninstalling Check Point VPN-1FireWall-1 NG AI on Solaris
Installing Check Point VPN-1FireWall-1 NG AI on Nokia
Installing Check Point VPN-1FireWall-1 NG AI on SecurePlatform
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 3: Using the Graphical Interface
Managing Objects
Adding Rules
Global Properties
SmartUpdate
SmartView Tracker
SmartView Status
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 4: Creating a Security Policy
Reasons for a Security Policy
How to Write a Security Policy
Implementing a Security Policy
Installing a Security Policy
Policy Files
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 5: Applying Network Address Translation
Hiding Network Objects
Configuring Static Address Translation
Automatic NAT Rules
NAT Global Properties
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 6: Authenticating Users
FireWall-1 Authentication Schemes
Defining Users
User Authentication
Client Authentication
Session Authentication
LDAP Authentication
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 7: Open Security (OPSEC) and Content Filtering
OPSEC Applications
Content Vectoring Protocol
URI Filtering Protocol
Application Monitoring
Client Side OPSEC Applications
Other Resource Options
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 8: Managing Policies and Logs
Administering Check Point VPN-1FW-1 NG AI for Performance
Administering Check Point VPN-1FW-1 NG AI for Effectiveness
Administering Check Point VPN-1FW-1 NG for Recoverability
Performing Advanced Administration Tasks
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 9: Tracking and Alerts
Alerts Commands
User-Defined Tracking
Suspicious Activities Monitoring Protocol (SAMP)
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 10: Configuring Virtual Private Networks
Encryption Schemes
Simplified-Mode vs. Traditional-Mode VPNs
Configuring an IKE VPN in Traditional Mode
Configuring an IKE VPN in Simplified Mode
Configuring a SecuRemote VPN
Installing SecuRemote Client Software
Using SecuRemote Client Software
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 11: Securing Remote Clients
Installing and Configuring a Policy Server
Desktop Security Options
Installing SecureClient Software
Logging into the Policy Server
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 12: Advanced VPN Configurations
Check Point High Availability and Check Point Load Sharing
Single Entry Point VPN Configurations
Multiple Entry Point VPN Configurations
Other High Availability Methods
Summary
Solutions Fast Track
Frequently Asked Questions
Chapter 13: SmartDefense
Understanding the Theory of SmartDefense
Using SmartDefense
Understanding Network Security
Understanding Application Intelligence
Updating SmartDefense
Summary
Solutions Fast Track
Frequently Asked Questions
Appendix A: Class C Subnet Mask Cheat Sheet
Index
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
List of Figures
List of Tables
List of Illustations
List of Sidebars
Check Point NG[s]AI
ISBN: 735623015
EAN: N/A
Year: 2004
Pages: 149
BUY ON AMAZON
Image Processing with LabVIEW and IMAQ Vision
Line-Scan Cameras
Color Images
Image Standards
Frequency Filtering
Pattern Matching
Professional Java Native Interfaces with SWT/JFace (Programmer to Programmer)
Overview of Java UI Toolkits and SWT/JFace
SWT Event Handling, Threading, and Displays
Printing
Creating a Text Editor with JFace Text
Eclipse Forms
Cisco IP Telephony (CIPT) (Authorized Self-Study) (2nd Edition)
User Logon and Device Configuration
Cisco Trunk Concepts
Summary
Summary
Configuring the Device Security Mode
Introduction to 80x86 Assembly Language and Computer Architecture
Representing Data in a Computer
Basic Instructions
Branching and Looping
Decimal Arithmetic
Appendix D 80x86 Instructions (by Mnemonic)
Data Structures and Algorithms in Java
The Call Stack
Binary Search
Thinking Recursively
Projects
Projects
Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance
General Packet Radio Service Tunneling Protocol
Adaptive Inspection Prevention Security Services Module Overview (AIP-SSM)
Summary
System Maintenance
WebVPN
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies