Most IT professionals rely on a small core of books that are specifically targeted to their job responsibilities. These dog-eared volumes are used daily and considered essential. But budgets and space commonly limit just how many books can be added to your core library. The 2008 Firewall Administration Professional CD solves this problem. It contains seven of our best-selling titles, providing the "next level" of reference you will need for about less than half the price of the hard-copy books purchased separately. The CD contains the complete PDF versions of the following Syngress titles: Configuring Juniper Networks NetScreen & SSG Firewalls; 1597491187 Designing and Building Enterprise DMZs; 1597491004 Configuring SonicWALL Firewalls; 1597492507 Firewall Policies and VPN Configurations; 1597490881 Configuring Check Point NGX VPN-1/FireWall-1; 1597490318 Cisco PIX Firewalls: Configure, Manage, & Troubleshoot; 1597490040 Dr. Tom Shinder's Configuring ISA Server 2004; 1931836191

Key Features

Adds over 4,136 pages to your Firewall bookshelf. Includes 7 best-selling SYNGRESS books in PDF format.


Information security officers, network administrators, system administrators, incident response teams, security researchers, law enforcement, and security/network software developers are the primary audience for this book. The secondary audience includes CIOs and IT managers and directors who are being questioned by board members and executives about this new threat.

Table of Contents

Designing and Building Enterprise DMZs DMZ Concepts, Layout and Conceptual Design|Windows 2000 DMZ Design|Solaris DMZ Design|Wireless DMZ’s (WDMZs)|Firewall Design: Cisco PIX|Firewall and DMZ Design: Checkpoint NG|Firewall and DMZ Design: Nokia Firewall|Firewall and DMZ Design: ISA Server 2000|DMZ Router and Switch Security|DMZ Based VPN Services |Wireless DMZ Implementation|Sun Solaris Bastion Hosts|Windows 2000 Bastion Hosts|Hacking the DMZ|Intrusion Detection in the DMZ Configuring SonicWALL Firewalls Introduction to Firewalls and the World of SonicWALL|Dissecting the SonicWALL Firewall|Deploying SonicWALL Firewalls|Policy Configuration|Routing|User Authentication|Advanced Policy Configuration|NAT|Transparent Mode|Attack Detection and Defense|VPN Theory|VPN Usage|Virtual Systems|High Availability| Troubleshooting the SonicWALL Firewall|Enterprise SonicWALL Management Configuring Check Point NGX VPN-1/FireWall-1 FW-1 NGX Operational changes|SmartClients and SmartManagement|Management Portal|Advanced Authentication|Advanced VPN Concepts and Tunnel Monitoring|Advanced VPN Client Installations|Multicast Security|Advanced DoS Protection|High Availability and Clustering|SecurePlatform|Management High Availability & Failover|Integration and configuration of CVP/UFP|SecureClient Packaging Tool|SmartDefense|SmartUpdate|Performance Pack|User Authority|Thin Client Support|Firewall Troubleshooting Cisco PIX Firewalls: Configure, Manage & Troubleshoot Introduction to Security and Firewalls|Introduction to PIX Firewalls|Passing Traffic| Advanced PIX Configurations|Configuring Authentication, Authorization, and Accouting|Configuring System Management|Configuring Virtual Private Networking Configuring Failover|PIX Device Manager|Troubleshooting and Performance Monitoring


© 2007
Print ISBN:
Electronic ISBN: