Firewall Policies and VPN ConfigurationsBy
- Dale Liu
- Stephanie Miller
- Mark Lucas
- Abhishek Singh
- Jennifer Davis
A firewall is as good as its policies and the security of its VPN connections. The latest generation of firewalls offers a dizzying array of powerful options; they key to success is to write concise policies that provide the appropriate level of access while maximizing security. This book covers the leading firewall products: Cisco PIX, Check Point NGX, Microsoft ISA Server, Juniperâs NetScreen Firewall, and SonicWall. It describes in plain English what features can be controlled by a policy, and walks the reader through the steps for writing the policy to fit the objective. Because of their vulnerability and their complexity, VPN policies are covered in more depth with numerous tips for troubleshooting remote connections.
This book covers the top 5 market leading firewalls: Cisco PIX, Check Point NGX, Microsoft ISA Server, Juniperâs NetScreen Firewall, and SonicWall. System administrators and security professionals working with any of these five products are potential customers for this book.
Paperback, 550 Pages
Published: September 2006
- PART I: SECURITY POLICY1: Network Security Policy2: Using Your Policy to Implement Firewalls and VPNsPART II: FIREWALL CONCEPTS3: Definining a Firewall4: Deciding on a Firewall SolutionPART III: VPN CONCEPTS5: Defining a VPN6: Deciding on a VPNPART IV: Implementing Firewalls and VPNs (Case studies)7. IT Infrastructure Security Plan8: SOHO (Five Computers, Printer, Servers, Etc.)9: Medium-Sized Business (Fewer Than 2,000 People)