Firewall Policies and VPN Configurations


  • Syngress
  • Dale Liu, Dale Liu, (MCSE Security, CISSP, MCT, IAM/IEM, CCNA) has been working in the computer and networking field for over 20 years. Dale's experience ranges from programming to networking to information security and project management. He currently teaches networking, routing and security classes, while working in the field performing security audits and infrastructure design for medium to large companies.
  • Stephanie Miller
  • Mark Lucas
  • Abhishek Singh, Security Researcher on the Microsoft Malware Protection Center (MMPC) team
  • Jennifer Davis

A firewall is as good as its policies and the security of its VPN connections. The latest generation of firewalls offers a dizzying array of powerful options; they key to success is to write concise policies that provide the appropriate level of access while maximizing security. This book covers the leading firewall products: Cisco PIX, Check Point NGX, Microsoft ISA Server, Juniper’s NetScreen Firewall, and SonicWall. It describes in plain English what features can be controlled by a policy, and walks the reader through the steps for writing the policy to fit the objective. Because of their vulnerability and their complexity, VPN policies are covered in more depth with numerous tips for troubleshooting remote connections.
View full description


This book covers the top 5 market leading firewalls: Cisco PIX, Check Point NGX, Microsoft ISA Server, Juniper’s NetScreen Firewall, and SonicWall. System administrators and security professionals working with any of these five products are potential customers for this book.


Book information

  • Published: September 2006
  • Imprint: SYNGRESS
  • ISBN: 978-1-59749-088-7

Table of Contents

PART I: SECURITY POLICY1: Network Security Policy2: Using Your Policy to Implement Firewalls and VPNsPART II: FIREWALL CONCEPTS3: Definining a Firewall4: Deciding on a Firewall SolutionPART III: VPN CONCEPTS5: Defining a VPN6: Deciding on a VPNPART IV: Implementing Firewalls and VPNs (Case studies)7. IT Infrastructure Security Plan8: SOHO (Five Computers, Printer, Servers, Etc.)9: Medium-Sized Business (Fewer Than 2,000 People)