
Firewall Policies and VPN Configurations
Description
Key Features
· Included is a bonus chapter on using Ethereal, the most popular protocol analyzer, to monitor and analyze network traffic.
· Shows what features can be controlled by a policy, and walks you through the steps for writing the policy to fit the objective at hand
Readership
Table of Contents
- Acknowledgments
- Technical Editor
- Contributing Authors
- Part I: Security Policy
- Chapter 1: Network Security Policy
- Introduction
- Defining Your Organization
- Different Access for Different Organizations
- Untrusted Networks
- Summary
- Solutions Fast Track
- Frequently Asked Questions
- Chapter 2: Using Your Policies to Create Firewall and VPN Configurations
- Introduction
- What Is a Logical Security Configuration?
- Planning Your Logical Security Configuration
- Writing Logical Security Configurations
- Summary
- Solutions Fast Track
- Frequently Asked Questions
- Chapter 1: Network Security Policy
- Part II: Firewall Concepts
- Chapter 3: Defining a firewall
- Introduction
- Why Have Different Types of Firewalls?
- Back to Basics—Transmission Control Protocol/Internet Protocol
- Firewall Types
- Application Proxy
- Gateway
- Summary
- Solutions Fast Track
- Frequently Asked Questions
- Chapter 4: Deciding on a Firewall
- Introduction
- Appliance/Hardware Solution
- Software Solutions
- Summary
- Solutions Fast Track
- Frequently Asked Questions
- Chapter 3: Defining a firewall
- Part III: VPN Concepts
- Chapter 5: Defining a VPN
- Introduction
- What Is a VPN?
- Public Key Cryptography
- IPSec
- SSL VPNs
- Layer 2 Solutions
- SSH Tunnels
- Technical Description
- Others
- Summary
- Solutions Fast Track
- Frequently Asked Questions
- Chapter 6: Deciding on a VPN
- Introduction
- Appliance / Hardware Solution
- Software Solutions
- Summary
- Solutions Fast Track
- Frequently Asked Questions
- Chapter 5: Defining a VPN
- Part IV: Implementing Firewalls and VPNs (Case Studies)
- Chapter 7: IT Infrastructure Security Plan
- Introduction
- Infrastructure Security Assessment
- Project Parameters
- Project Team
- Project Organization
- Project Work Breakdown Structure
- Project Risks and Mitigation Strategies
- Project Constraints and Assumptions
- Project Schedule and Budget
- IT Infrastructure Security Project Outline
- Summary
- Solutions Fast Track
- Chapter 8: Case Study: SOHO (Five Computers, Printer, Servers, etc.)
- Introduction
- Determining More Information with lsof
- Employing a Firewall in a SOHO Environment
- Introducing the SOHO Firewall Case Study
- Designing the SOHO Firewall
- Summary
- Solutions Fast Track
- Frequently Asked Questions
- Chapter 9: Medium Business (< 2000 People)
- Introduction
- Mapping Your Systems
- Improving Accountability with Identity Management
- VPN Connectivity
- Summary
- Solutions Fast Track
- Frequently Asked Questions
- Chapter 7: IT Infrastructure Security Plan
- Index
Product details
- No. of pages: 550
- Language: English
- Copyright: © Syngress 2006
- Published: September 21, 2006
- Imprint: Syngress
- eBook ISBN: 9780080506517
About the Authors
Syngress
Dale Liu
Affiliations and Expertise
Stephanie Miller
Mark Lucas
Abhishek Singh
Abhishek was a leading inventor of various patent pending technologies in IDS/IPS and an algorithm for faster analysis of binaries and two-factor authentication. He served as Technical Editor for "Vulnerability Analysis and Defense for the Internet" and "Identifying Malicious Code Through Reverse Engineering." He has published Internet Drafts and security-related papers in primer journals and for various conferences.
Abhishek holds a Master of Science in Information Security and a Master of Science in Computer Science, both from the College of Computing, Georgia Institute of Technology and a B.Tech. in Electrical Engineering from Institute of Technology, BHU, India.
Affiliations and Expertise
Jennifer Davis
Ratings and Reviews
There are currently no reviews for "Firewall Policies and VPN Configurations"