Firewall Policies and VPN Configurations
- Dale Liu, Dale Liu, (MCSE Security, CISSP, MCT, IAM/IEM, CCNA) has been working in the computer and networking field for over 20 years. Dale's experience ranges from programming to networking to information security and project management. He currently teaches networking, routing and security classes, while working in the field performing security audits and infrastructure design for medium to large companies.
- Stephanie Miller
- Mark Lucas
- Abhishek Singh, Security Researcher on the Microsoft Malware Protection Center (MMPC) team
- Jennifer Davis
A firewall is as good as its policies and the security of its VPN connections. The latest generation of firewalls offers a dizzying array of powerful options; they key to success is to write concise policies that provide the appropriate level of access while maximizing security. This book covers the leading firewall products: Cisco PIX, Check Point NGX, Microsoft ISA Server, Juniperâs NetScreen Firewall, and SonicWall. It describes in plain English what features can be controlled by a policy, and walks the reader through the steps for writing the policy to fit the objective. Because of their vulnerability and their complexity, VPN policies are covered in more depth with numerous tips for troubleshooting remote connections.
This book covers the top 5 market leading firewalls: Cisco PIX, Check Point NGX, Microsoft ISA Server, Juniperâs NetScreen Firewall, and SonicWall. System administrators and security professionals working with any of these five products are potential customers for this book.