๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Firewall Policies and VPN Configurations

โœ Scribed by Syngress, Dale Liu, Stephanie Miller, Mark Lucas, Abhishek Singh, Jennifer Davis


Publisher
Syngress
Year
2006
Tongue
English
Leaves
476
Edition
1
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


A firewall is as good as its policies and the security of its VPN connections. The latest generation of firewalls offers a dizzying array of powerful options; they key to success is to write concise policies that provide the appropriate level of access while maximizing security.

This book covers the leading firewall products: Cisco PIX, Check Point NGX, Microsoft ISA Server, Juniper's NetScreen Firewall, and SonicWall. It describes in plain English what features can be controlled by a policy, and walks the reader through the steps for writing the policy to fit the objective. Because of their vulnerability and their complexity, VPN policies are covered in more depth with numerous tips for troubleshooting remote connections.

ยท The only book that focuses on creating policies that apply to multiple products.
ยท Included is a bonus chapter on using Ethereal, the most popular protocol analyzer, to monitor and analyze network traffic.
ยท Shows what features can be controlled by a policy, and walks you through the steps for writing the policy to fit the objective at hand

โœฆ Table of Contents


Content:
Acknowledgments, Page v
Technical Editor, Page vii
Contributing Authors, Pages vii-xi
Chapter 1 - Network Security Policy, Pages 3-45
Chapter 2 - Using Your Policies to Create Firewall and VPN Configurations, Pages 47-70
Chapter 3 - Defining a Firewall, Pages 73-122
Chapter 4 - Deciding on a Firewall, Pages 123-207
Chapter 5 - Defining a VPN, Pages 211-265
Chapter 6 - Deciding on a VPN, Pages 267-304
Chapter 7 - IT Infrastructure Security Plan, Pages 307-383
Chapter 8 - Case Study: SOHO (Five Computers, Printer, Servers, etc.), Pages 385-408
Chapter 9 - Medium Business (<2000 People), Pages 409-463
Index, Pages 465-482


๐Ÿ“œ SIMILAR VOLUMES


Firewall Policies and VPN Configurations
โœ Syngress, Dale Liu, Stephanie Miller, Mark Lucas, Abhishek Singh, Jennifer Davis ๐Ÿ“‚ Library ๐Ÿ“… 2006 ๐Ÿ› Syngress ๐ŸŒ English

A firewall is as good as its policies and the security of its VPN connections. The latest generation of firewalls offers a dizzying array of powerful options; they key to success is to write concise policies that provide the appropriate level of access while maximizing security. <br><br>This book co

Firewall Policies And VPN Configurations
โœ Laura E. Hunter ๐Ÿ“‚ Library ๐Ÿ“… 2005 ๐Ÿ› Apress ๐ŸŒ English

The security provided by firewalls and VPNs is only as strong as the protocol rules and policies that you create. The concepts of "defense-in-depth" and "least privilege" are merely holes in your perimeter waiting to be exploited, unless you can define and maintain protocol rules that allow only the

Nokia Firewall, VPN, and IPSO Configurat
โœ Andrew Hay, Keli Hay, Peter Giannoulis ๐Ÿ“‚ Library ๐Ÿ“… 2008 ๐ŸŒ English

"While Nokia is perhaps most recognized for its leadership in the mobile phone market, they have successfully demonstrated their knowledge of the Internet security appliance market and its customers requirements."--Chris Christiansen, Vice President, Internet Infrastructure and Security Software, ID

Nokia Firewall, VPN, and IPSO Configurat
โœ Andrew Hay, Keli Hay, Peter Giannoulis ๐Ÿ“‚ Library ๐Ÿ“… 2008 ๐Ÿ› Syngress ๐ŸŒ English

"While Nokia is perhaps most recognized for its leadership in the mobile phone market, they have successfully demonstrated their knowledge of the Internet security appliance market and its customers requirements."<br>--Chris Christiansen, Vice President, Internet Infrastructure and Security Software

Nokia Firewall, VPN, and IPSO Configurat
โœ Andrew Hay, Keli Hay, Peter Giannoulis ๐Ÿ“‚ Library ๐Ÿ“… 2008 ๐Ÿ› Syngress ๐ŸŒ English

While Nokia is perhaps most recognized for its leadership in the mobile phone market, they have successfully demonstrated their knowledge of the Internet security appliance market and its customers requirements. --Chris Christiansen, Vice President, Internet Infrastructure and Security Software, IDC