๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

Firewalls || Firewall Configuration

โœ Scribed by Vacca, John R.


Book ID
120461914
Publisher
Elsevier
Year
2005
Tongue
English
Weight
714 KB
Edition
1
Category
Article
ISBN
1555582974

No coin nor oath required. For personal study only.

โœฆ Synopsis


In this book, you will gain extensive hands-on experience installing and configuring a firewall. You will also learn how to allow access to key Web services while maintaining your organization's security, as well as how to implement firewall-to-firewall virtual private networks (VPNs). You will learn how to build a firewall to protect your network; provide access to HTTP and FTP services on the Internet, and implement publicly accessible servers without compromising security. Furthermore, throughout the book, extensive hands-on examples provide you with practical experience in establishing security with firewalls. Examples include, but are not limited to: Installing and configuring Check Point FireWall-1; scanning to validate configuration using ISS Internet Scanner; configuring the firewall to support simple and complex Web services; setting up a packet filtering router; enhancing firewall configurations to support split-DNS; authenticating remote users; and protecting browsers and servers with a proxy-based firewall.

ยท Install and configure proxy-based and stateful-filtering firewalls
ยท Protect internal IP addresses with NAT and deploy a secure DNS architecture
ยท Develop an Internet/intranet security policy to protect your organization's systems and data
ยท Reduce your susceptibility to an attack by deploying firewalls, data encryption and decryption and other countermeasures


๐Ÿ“œ SIMILAR VOLUMES


Configuring NetScreen Firewalls || Netwo
โœ Cameron, Rob ๐Ÿ“‚ Article ๐Ÿ“… 2005 ๐Ÿ› Elsevier ๐ŸŒ English โš– 535 KB

The first book on the market covering the #2 best-selling firewall appliances in the world from NetScreen. This book continues Syngress' history from ISA Server to Check Point to Cisco Pix of being first to market with best-selling firewall books for security professionals. Configuring NetScreen Fi

Firewalls || Firewall Types
โœ Vacca, John R. ๐Ÿ“‚ Article ๐Ÿ“… 2005 ๐Ÿ› Elsevier ๐ŸŒ English โš– 418 KB

In this book, you will gain extensive hands-on experience installing and configuring a firewall. You will also learn how to allow access to key Web services while maintaining your organization's security, as well as how to implement firewall-to-firewall virtual private networks (VPNs). You will lear

Firewalls || Firewall administration
โœ Vacca, John R. ๐Ÿ“‚ Article ๐Ÿ“… 2005 ๐Ÿ› Elsevier ๐ŸŒ English โš– 838 KB

In this book, you will gain extensive hands-on experience installing and configuring a firewall. You will also learn how to allow access to key Web services while maintaining your organization's security, as well as how to implement firewall-to-firewall virtual private networks (VPNs). You will lear

Configuring NetScreen Firewalls || High
โœ Cameron, Rob ๐Ÿ“‚ Article ๐Ÿ“… 2005 ๐Ÿ› Elsevier ๐ŸŒ English โš– 558 KB

The first book on the market covering the #2 best-selling firewall appliances in the world from NetScreen. This book continues Syngress' history from ISA Server to Check Point to Cisco Pix of being first to market with best-selling firewall books for security professionals. Configuring NetScreen Fi

Firewall Policies And VPN Configurations
โœ Laura E. Hunter ๐Ÿ“‚ Library ๐Ÿ“… 2005 ๐Ÿ› Apress ๐ŸŒ English โš– 7 MB

The security provided by firewalls and VPNs is only as strong as the protocol rules and policies that you create. The concepts of "defense-in-depth" and "least privilege" are merely holes in your perimeter waiting to be exploited, unless you can define and maintain protocol rules that allow only the